2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)最新文献

筛选
英文 中文
QoS associated path selection in wireless mesh networks 无线网状网络中QoS相关路径选择
Sandip Chakraborty, Sukumar Nandi
{"title":"QoS associated path selection in wireless mesh networks","authors":"Sandip Chakraborty, Sukumar Nandi","doi":"10.1109/ANTS.2014.7057283","DOIUrl":"https://doi.org/10.1109/ANTS.2014.7057283","url":null,"abstract":"This paper proposes an improved mesh path selection protocol for QoS support in wireless mesh network, while avoiding the inherent problems of proactive and reactive path selection elements. The proposed `Advanced Selective Greedy' (SelG+) path selection protocol operates in two phases. In the first phase it constructs a set of potential forwarders for every mesh stations. In the second phase during the actual data communication, a candidate is selected from the set of potential forwarders based on a local greedy optimization approach. A new routing metric is designed for the construction of the set of potential forwarders, that considers the queuing delay during data forwarding. Further, a path differentiation mechanism is introduced during the greedy selection to avoid interference among different traffic classes. The proposed scheme improves the performance of delay sensitive traffics by reducing the forwarding delay, and the throughput of background and best effort elastic traffics by reducing the inter-traffic class interference. The performance of the proposed scheme is evaluated using a practical indoor mesh testbed, and compared with other schemes.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123750112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Early detection of VoIP network flows based on sub-flow statistical characteristics of flows using machine learning techniques 基于子流统计特征的VoIP网络流的早期检测
Tejmani Sinam, Nandarani Ngasham, Pradeep Lamabam, Irengbam Tilokchan Singh, Sukumar Nandi
{"title":"Early detection of VoIP network flows based on sub-flow statistical characteristics of flows using machine learning techniques","authors":"Tejmani Sinam, Nandarani Ngasham, Pradeep Lamabam, Irengbam Tilokchan Singh, Sukumar Nandi","doi":"10.1109/ANTS.2014.7057227","DOIUrl":"https://doi.org/10.1109/ANTS.2014.7057227","url":null,"abstract":"Network traffic classification plays an important role in the areas of network security, network monitoring, QoS and traffic engineering. In this paper, we design a network traffic classifier based on the statistical features extracted from network flows. Instead of deriving the statistical characteristics per flow, our model make use of features extracted from the first few seconds of each flows. The first few seconds of each flow is divided into overlapping time-based windows. This approach enables our classifier to classify each flow early. Attribute selection algorithms Chi-Square, CON and CFS are used to obtain the optimal subset of features. We give a comparative analysis of the result on the said approach based on the classification algorithms (Decision tree (C4.5), Naive Bayes, Bayesian Belief Network and SVM). We also present a single class classifier implementation of C4.5 algorithm. The experimental results show that the proposed method can achieve over 99% accuracy for all testing dataset. Using the proposed method, C4.5 algorithm delivers high speed and accuracy. By taking inference from these offline classifiers, we build an online standalone classifier using C/C++. We used the following applications: Skype, Gtalk and Asterisk.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal resource allocation scheme for LTE-A systems with carrier aggregation 载波聚合LTE-A系统的最优资源分配方案
Madan Pande, G. Piro
{"title":"Optimal resource allocation scheme for LTE-A systems with carrier aggregation","authors":"Madan Pande, G. Piro","doi":"10.1109/ANTS.2014.7057230","DOIUrl":"https://doi.org/10.1109/ANTS.2014.7057230","url":null,"abstract":"To significantly enhance the overall capacity of future cellular systems, LTE-A specifications have recently introduced the possibility to make available multiple carriers for a given base station (this technique is known as Carrier Aggregation), thus increasing the number of physical resources available for mobile users. The Radio Resource Management process, which aims at distributing physical resources among users, as well as defining the most suitable transmission settings in terms of both modulation and coding schemes, takes place at layer 2 of the base station and it is performed by the packet scheduler entity. Without any doubt, the implementation of enhanced radio resource methodologies, able to jointly improve the overall network capacity and the quality of service offered to mobile terminals, becomes more challenging when the Carrier Aggregation configuration is enabled. This paper proposes a novel approach, namely the 3 Dimensional Scheduler, which is built on 3 different layers interact each other to optimally distributing radio resources by taking into account users position, the experienced channel qualities, and requirements of active requirements. The effectiveness of the proposed approach have been evaluated through computer simulations carried out with the LTE-Sim simulator. Obtained results demonstrate that the proposed solution outperforms other well-known strategies, thus guaranteeing the highest throughput, the lowest packet loss ratio, the lowest packet delays, and highest MOS.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129844546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Network adaptability under resource crunch 资源紧张下的网络适应性
A. Roy, M. F. Habib, B. Mukherjee
{"title":"Network adaptability under resource crunch","authors":"A. Roy, M. F. Habib, B. Mukherjee","doi":"10.1109/ANTS.2014.7057273","DOIUrl":"https://doi.org/10.1109/ANTS.2014.7057273","url":null,"abstract":"We study a novel scheme to manage networks with heterogeneous traffic efficiently under resource crunch. We consider different types of revenue models for different service classes. We show that degradation of services and redistribution of resources while satisfying QoS under resource crunch can improve both availability and revenue.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129204649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On multipath routing algorithm for software defined networks 软件定义网络的多路径路由算法研究
Siddharth S. Kulkarni, Venkataramana Badarla
{"title":"On multipath routing algorithm for software defined networks","authors":"Siddharth S. Kulkarni, Venkataramana Badarla","doi":"10.1109/ANTS.2014.7057278","DOIUrl":"https://doi.org/10.1109/ANTS.2014.7057278","url":null,"abstract":"Software Defined Networking (SDN) is an emerging phenomenon in computer networking. SDN splits control element and forwarding element of a network. It has characteristics such as centralized management, programmability, more security, granularity and reliability. Therefore SDN is suitable for data center, cloud computing and carrier networks. As reliability and fault tolerance are main concerns, these networks inherently add multiple paths between any two nodes in the network, thus creating opportunities for potential gain in network capacity (throughput). Back-pressure algorithm which uses all possible paths between the source and destination nodes is proven as a throughput optimal routing and scheduling algorithm. However, it exhibits excessively high delays and jitter. In order to realize the key benefit of gain in network capacity, in this work we propose to use back-pressure routing in software-defined networks. However, we address the problem of high delays and jitter associated with back-pressure algorithm by using centralized control and monitoring feature of SDN. The modified backpressure algorithm is evaluated through extensive simulations and observed a significant reduction in delays while retaining throughput optimality of the basic back-pressure algorithm.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115909900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Power efficient event detection scheme in wireless sensor networks for railway bridge health monitoring system 铁道桥梁健康监测系统无线传感器网络中的高能效事件检测方案
Soumendu Kumar Ghosh, M. Suman, R. Datta, P. Biswas
{"title":"Power efficient event detection scheme in wireless sensor networks for railway bridge health monitoring system","authors":"Soumendu Kumar Ghosh, M. Suman, R. Datta, P. Biswas","doi":"10.1109/ANTS.2014.7057276","DOIUrl":"https://doi.org/10.1109/ANTS.2014.7057276","url":null,"abstract":"Railway Bridge Health Monitoring is of paramount importance as damages in bridges can lead to huge casualties and have huge underlying economic consequences. This monitoring can be performed using wireless sensor networks. In this paper, we propose an event detection strategy for wireless sensor networks deployed for railway bridge health monitoring. Our proposed scheme takes care of different constraints of sensor networks and efficiently uses the limited resources of sensors like battery power and memory. Theoretical and experimental results show that our proposed scheme can greatly increase the service lifetime of sensor networks and aid in automating the bridge health monitoring.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114190585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Circularly polarized dual band micro strip patch antenna for vehicular wireless network communications 车用无线网络通信用圆极化双频微带贴片天线
R. Vijay, T. Rao
{"title":"Circularly polarized dual band micro strip patch antenna for vehicular wireless network communications","authors":"R. Vijay, T. Rao","doi":"10.1109/ANTS.2014.7057235","DOIUrl":"https://doi.org/10.1109/ANTS.2014.7057235","url":null,"abstract":"A circularly polarized dual band micro strip patch antenna for vehicular wireless communication at 2.45 GHz and 5.5 GHz is designed and studied its performance. To obtain the circular polarization, slots have been introduced at the sides of the rectangular patch. Axial Ratio bandwidth of 700 MHz and 230 MHz at lower (1.9 GHz-2.6 GHz) and higher (5.4 GHz-5.63 GHz) frequency bands are observed using electromagnetic (EM) simulation tools. The proposed antenna gives 2.24 dB at 2.45 GHz and 4.97 dB gain at 5.5 GHz and impedance bandwidth of 320 MHZ at 2.4 GHz band and 450 MHz at 5 GHz band. Omnidirectional radiation pattern, improved Circular polarization, small dimensions and low cross polarization at both bands make this antenna particularly suitable for vehicular wireless communication networks.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114360507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Block the blocker: A blocker-tag agnostic ALOHA-based tag reading protocol in dense RFID system 阻塞阻塞器:密集RFID系统中基于aloha的阻塞标签不可知标签读取协议
Mahendran Veeramani, Chandrika J. Satyavolu, S. Radhakrishnan, V. Sarangan
{"title":"Block the blocker: A blocker-tag agnostic ALOHA-based tag reading protocol in dense RFID system","authors":"Mahendran Veeramani, Chandrika J. Satyavolu, S. Radhakrishnan, V. Sarangan","doi":"10.1109/ANTS.2014.7057281","DOIUrl":"https://doi.org/10.1109/ANTS.2014.7057281","url":null,"abstract":"Blocker tags are special-tags conceived to protect the customers privacy from unauthorized readers that viciously attempt to read the RFID tagged products carried by them. Unlike normal RFID tags, the blocker tag participates repeatedly in a tag-reading process and generates fake tag-IDentifiers (IDs). In all other respects it behaves well like a normal tag so that a reader invariably treats each fake ID as if it were a true ID from an actual tag. In other words, the blocker tag emulates multiple tags in the system. The reader's output is therefore obscured with an indistinguishable mix of fake-IDs and actual tag IDs. In an ALOHA-based tag reading system, a blocker tag probabilistically participates in the MAC protocol arbitrated by the reader. The higher the probability more contaminated the reader's result (with fake-IDs), and higher degree of protection from privacy snooping. Despite the salient use of the blocker tags, they can also be used maliciously to perform a Denial-of-Service attack on a trusted reader. As a result, the reader indefinitely interrogates the tags, and also incapable of isolating the actual tags in the system. While existing works detect and/or identify blocker tags in the system; to the best of our knowledge, there is no automated solution proposed to enable an authorized industry-compatible ALOHA-based RFID reader to perform a time-bounded effective tag-reading in the presence of a malicious blocker tag. In this paper, we present a simple yet novel solution to detect and jam the blocker tag from interrupting an on-going ALOHA-based tag-reading process. Through mathematical investigation and subsequent validation by simulation, we demonstrate the effectiveness of our solution.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121616240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulative analysis of multimedia traffic over LTE with real time scenarios in network simulator-3 网络模拟器-3中具有实时场景的LTE多媒体流量仿真分析
T. S. Nandu, N. Krishnan, K. Theja, B. Pattnaik, P. Anilal, S. SivaSankaraSai
{"title":"Simulative analysis of multimedia traffic over LTE with real time scenarios in network simulator-3","authors":"T. S. Nandu, N. Krishnan, K. Theja, B. Pattnaik, P. Anilal, S. SivaSankaraSai","doi":"10.1109/ANTS.2014.7057250","DOIUrl":"https://doi.org/10.1109/ANTS.2014.7057250","url":null,"abstract":"Scheduling is very important in real time environment, where users must be provided services by considering factors like QoS and channel quality. A novel analysis on the performance of downlink packet scheduling algorithms in Long Term Evolution (LTE) networks is presented. LTE with multimedia traffic is modelled with Network Simulator (NS-3) in compliance to 3GPP specifications. This paper analyses the performance and efficiency of different scheduling algorithms in various scenarios that includes single cell as well as multi cell environment users utilizing multimedia traffic like VoIP, Video, Gaming and Downloads.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of pointing error on cooperative free space optical communication systems under different channel conditions 不同信道条件下指向误差对协同自由空间光通信系统的影响
Vineeta Dubey, D. Chadha, V. Chandra
{"title":"Effect of pointing error on cooperative free space optical communication systems under different channel conditions","authors":"Vineeta Dubey, D. Chadha, V. Chandra","doi":"10.1109/ANTS.2014.7057224","DOIUrl":"https://doi.org/10.1109/ANTS.2014.7057224","url":null,"abstract":"We have investigated the performance improvement of cooperative free space optical (FSO) communication over single input single output (SISO) system in this paper. Bit error rate (BER) analysis for gamma-gamma channel model, pointing error and additive white Gaussian noise (AWGN) has been demonstrated for SISO and cooperative system, as well as, where the performance improvement with different combining techniques in cooperative system has been discussed in this paper. Significant performance improvement is achieved in case of cooperative communication with the use of Maximal Ratio combining as compared to Equal Gain combining and Selection combining diversity combining techniques as reported in literature where pointing error deteriorates the system performance. Different channel environments, where direct and indirect links are facing different turbulence, are also analyzed in this paper.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信