The Third Advanced International Conference on Telecommunications (AICT'07)最新文献

筛选
英文 中文
A New Optimization Approach for Energy Consumption within Wireless Sensor Networks 一种新的无线传感器网络能耗优化方法
F. Shebli, I. Dayoub, J. Rouvaen, A. Zaouche
{"title":"A New Optimization Approach for Energy Consumption within Wireless Sensor Networks","authors":"F. Shebli, I. Dayoub, J. Rouvaen, A. Zaouche","doi":"10.1109/AICT.2007.2","DOIUrl":"https://doi.org/10.1109/AICT.2007.2","url":null,"abstract":"The use of sensor networks should keep developing, mainly in such fields as scientific, logistic, military or healthcare applications. However, sensor size represents a significant limitation mainly in terms of energy autonomy and therefore of life period, for the batteries have to be too tiny. This is the reason why intensive research is being conducted nowadays on how to control sensor energy consumption within a network, taking communications into account as a priority. For this purpose we have proposed a method to calculate energy consumption within the wireless sensor networks, according to the number of information packets sent, the number of nodes. Furthermore, we have succeeded in reducing energy consumption within the sensor networks made up with nodes featuring differing data flow rates.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121017568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Ontologies to Support Call Control Policies 支持呼叫控制策略的本体
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.34
G.A. Campbell, K. Turner
{"title":"Ontologies to Support Call Control Policies","authors":"G.A. Campbell, K. Turner","doi":"10.1109/AICT.2007.34","DOIUrl":"https://doi.org/10.1109/AICT.2007.34","url":null,"abstract":"The topic of policy-based management is introduced. Its specific application by the Accent project to call control is then discussed. The Appel policy language supports regular policies as well as resolution policies that deal with conflict handling. The core Appel language can be specialised, e.g. for call control. Ontologies are introduced as a means of capturing domain-specific knowledge - here, about calls. It is seen how this has allowed the Accent policy system to be generalised for use in a variety of domains. This is supported by a stack of interrelated ontologies: for generic policy aspects, for a policy definition wizard, and for call control. The approach has been integrated with the Accent system, allowing its extension for policy-based management in new domains.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129749385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Ant-DSR: Cache Maintenance Based Routing Protocol for Mobile Ad-Hoc Networks 基于缓存维护的移动Ad-Hoc网络路由协议
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.14
M. Aissani, Messaoud Fenouche, Hadi Sadour, A. Mellouk
{"title":"Ant-DSR: Cache Maintenance Based Routing Protocol for Mobile Ad-Hoc Networks","authors":"M. Aissani, Messaoud Fenouche, Hadi Sadour, A. Mellouk","doi":"10.1109/AICT.2007.14","DOIUrl":"https://doi.org/10.1109/AICT.2007.14","url":null,"abstract":"Dynamic source routing (DSR) is a reactive routing protocol designed for mobile ad-hoc networks. It is based on two mechanisms including route discovery and route maintenance. In highly dynamic networks, the surplus use of expired routes in the cache of DSR increases the latency and the frequent diffusion of route request packets consumes bandwidth. Consequently, DSR presents handicap in terms of end- to-end delay and overhead. In this paper, we propose a new routing protocol, called Ant-DSR, which implements a distributed topology discovery mechanism through mobile agents to maintain DSR cache. Implemented and simulated on ns-2, Ant-DSR shows a better resistance in high mobility and huge load environments in comparison to DSR.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116080208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Implementation and Performance Evaluation of an Energy Constraint Routing Protocol for Mobile Ad Hoc Networks 移动Ad Hoc网络能量约束路由协议的实现与性能评价
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.24
M. Frikha, F. Ghandour
{"title":"Implementation and Performance Evaluation of an Energy Constraint Routing Protocol for Mobile Ad Hoc Networks","authors":"M. Frikha, F. Ghandour","doi":"10.1109/AICT.2007.24","DOIUrl":"https://doi.org/10.1109/AICT.2007.24","url":null,"abstract":"The aim of this paper is to evaluate the performance of an energy aware routing protocol, called ECB-AODV (Energy Constraint protocol Based on AODV) which derives from the AODV protocol and which is based on the local decisions of intermediate stations to maintain the connectivity of the network as long as possible. The results obtained using the network Simulator NS-2 demonstrate how small changes in the principle of the AODV protocol can efficiently balance the energy consumption between nodes, which increases the network lifetime.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125598421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Design and Implementation of a Monitoring System Based on IPFIX Protocol 基于IPFIX协议的监控系统的设计与实现
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.18
Farzaneh Fatemipour, M. Moghaddam
{"title":"Design and Implementation of a Monitoring System Based on IPFIX Protocol","authors":"Farzaneh Fatemipour, M. Moghaddam","doi":"10.1109/AICT.2007.18","DOIUrl":"https://doi.org/10.1109/AICT.2007.18","url":null,"abstract":"Today measuring traffic is an essential tool for controlling and engineering communication networks and must provide useful information about flow states for network administrator. In this paper we present a measurement system for monitoring IP networks based on IPFIX (IP Flow Information eXport Protocol). This passive monitoring system can provide network operators with detailed information about the traffic traversing a network. Packet traces can provide information about the performance experienced by flows and other characteristics of the traffic, such as packet sizes, packet loss, one way delay and delay variation. We used the well-known database MySQL to store and retrieve data. The meter/exporter and collector process were implemented in the Linux operating system environment. The proposed monitoring system was tested in a campus network.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134276136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Analytical Modeling of the Influence of Connection Handoff on UMTS Traffic Characteristics 连接切换对UMTS业务特性影响的分析建模
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.13
M. Głąbowski, M. Sobieraj, M. Stasiak
{"title":"Analytical Modeling of the Influence of Connection Handoff on UMTS Traffic Characteristics","authors":"M. Głąbowski, M. Sobieraj, M. Stasiak","doi":"10.1109/AICT.2007.13","DOIUrl":"https://doi.org/10.1109/AICT.2007.13","url":null,"abstract":"The paper presents a model of a group of cells, exploiting the effects of connection handoff between cells, aimed at increasing the traffic capacity of a system. The analytical model proposed is based on the model of limited-availability group, which makes it possible to determine basic traffic characteristics in the system under consideration. The results of analytical calculations of blocking in a group of UMTS cells were compared with simulation data.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115896723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Queue Priority Based on Cross-Layer Collaboration for Motorway Mobile Ad Hoc Networks 基于跨层协作的高速公路移动自组网队列优先级
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.38
S. Almajnooni, B. Sharif, C. Tsimenidis
{"title":"Queue Priority Based on Cross-Layer Collaboration for Motorway Mobile Ad Hoc Networks","authors":"S. Almajnooni, B. Sharif, C. Tsimenidis","doi":"10.1109/AICT.2007.38","DOIUrl":"https://doi.org/10.1109/AICT.2007.38","url":null,"abstract":"The data link layer of the open system interconnection (OSI) model organizes departure packets into queues depending on their predefined priority. Typically, in ad hoc networks, priority is given to routing packets over data packets and data packets are served in first-in-first-out (FIFO) bases. In this paper, for an inter-vehicular mobile ad hoc network, we introduce data packets' queue priority equal to that of routing packets, based on the driving direction of the data packets' source and destination. The ad hoc on demand distance vector (AODV) protocol is used as the routing protocol in this work. Simulation results of 200 vehicles driving at speeds between 61 tilde119 km/h on a 2-lane motorway demonstrate a performance increase in data packet delivery ratio and decrease in average end-to-end packet delay and routing overhead for the proposed algorithm.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"49 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132241255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stochastic Bounds for Loss Rates 损失率的随机界
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.40
J. Fourneau, L. Mokdad, N. Pekergin, S. Youcef
{"title":"Stochastic Bounds for Loss Rates","authors":"J. Fourneau, L. Mokdad, N. Pekergin, S. Youcef","doi":"10.1109/AICT.2007.40","DOIUrl":"https://doi.org/10.1109/AICT.2007.40","url":null,"abstract":"We propose to use stochastic comparison method in order to compute packet loss rates in IP routers for MPLS networks. We study an IP buffer with finite capacity B and we consider two kinds of packets. Those who are delay sensitive and those who are loss sensitive. We propose a new service discipline which we denoted by \"LATIN\" service discipline and for buffer management; we propose to use push-out. The state of the buffer can be represented by a discrete Markov chain defined on a large state space size O(B3). We propose bounded models with HOL disciplines, which are easier models to solve and using stochastic comparisons, we prove that the bounded models provide really upper and lower bounds on the packet loss rates. We present some numerical results to show the accurate bounds on loss rates.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121049205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BPTraSha: A Novel Algorithm for Shaping Bursty Nature of Internet Traffic BPTraSha:一种塑造互联网流量突发特性的新算法
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.16
K. Rezaul, V. Grout
{"title":"BPTraSha: A Novel Algorithm for Shaping Bursty Nature of Internet Traffic","authors":"K. Rezaul, V. Grout","doi":"10.1109/AICT.2007.16","DOIUrl":"https://doi.org/10.1109/AICT.2007.16","url":null,"abstract":"Various researchers have reported that traffic measurements demonstrate considerable burstiness on several time scales, with properties of self-similarity. Also, the rapid development of technologies has widened the scope of network and Internet applications and, in turn, increased traffic. The self-similar nature of this data traffic may exhibit spikiness and burstiness on large scales with such behaviour being caused by strong dependence characteristics in data: that is, large values tend to come in clusters and clusters of clusters and so on. Several studies have shown that TCP, the dominant network (Internet) transport protocol, contributes to the propagation of self-similarity. Bursty traffic can affect the Quality of Service of all traffic on the network by introducing inconsistent latency. It is easier to manage the workloads under less bursty (i.e. smoother) conditions. In this paper, we introduce a novel algorithm for traffic shaping, which can smooth out the traffic burstiness. We name it the Bursty Packet Traffic Shaper (BPTraSha). Experimental results show that this approach allows significant traffic control by smoothing the incoming traffic. BPTraSha can be implemented on the distribution router buffer so that the traffic's bursty nature can be modified before it is transmitted over the core network (Internet).","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
False-Path Reduction in Downlink WCDMA Channel Estimation by Threshold Algorithm 基于阈值算法的下行WCDMA信道估计中的误路抑制
The Third Advanced International Conference on Telecommunications (AICT'07) Pub Date : 2007-05-13 DOI: 10.1109/AICT.2007.22
D. Cibaud, L. Fathi, M. Arndt, G. Jourdain
{"title":"False-Path Reduction in Downlink WCDMA Channel Estimation by Threshold Algorithm","authors":"D. Cibaud, L. Fathi, M. Arndt, G. Jourdain","doi":"10.1109/AICT.2007.22","DOIUrl":"https://doi.org/10.1109/AICT.2007.22","url":null,"abstract":"In this paper, an iterative algorithm for multipath channel estimation is proposed for the downlink of the WCDMA systems. The estimation is performed by extracting the parameters of the channel impulse response. The channel impulse response is obtained by cross-correlation between the pilot symbols known at the receiver and the portion of the received signal which hold emitted pilot symbols. Channel estimation errors, and more particularly the false-path detection, damages the performances of coherent receiver. To avoid the false-path detection, we introduce a novel criterion which depend on signal-to-noise ratio and cross- correlation imperfections. The simulation results reveal optimum thresholds to have a better channel estimation.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117040738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信