{"title":"Differentiation between Different Traffic Categories Using Multi-level of Priority in DCF-WLAN","authors":"M. Ahmed, Gamal Abdel Fadeel, I. I. Ibrahim","doi":"10.1109/AICT.2010.50","DOIUrl":"https://doi.org/10.1109/AICT.2010.50","url":null,"abstract":"The IEEE802.11 protocol defines access techniques to wireless medium using CSMA/CA, and defines two modes of operation in WLAN DCF and PCF. DCF does not provide any QoS, so that throughput and delay of real-time traffic, such as voice and video cannot be guaranteed over WLAN. IEEE 802.11e introduces a service differentiation mechanism based on prioritized contention access, which causes throughput degradation if the network becomes high loaded by high priority traffic. This paper proposes service differentiation for multiple access categories by using multilevel priority mechanisms in MAC layer, using multilevel priority controllability to network performance according to throughput of each traffic category.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115415915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Konstantinidis, T. Tsiatsos, S. Demetriadis, A. Pomportsis
{"title":"Collaborative Learning in OpenSim by Utilizing SLoodle","authors":"A. Konstantinidis, T. Tsiatsos, S. Demetriadis, A. Pomportsis","doi":"10.1109/AICT.2010.75","DOIUrl":"https://doi.org/10.1109/AICT.2010.75","url":null,"abstract":"The paper introduces and proposes a hybrid approach to computer supported collaborative learning. The approach suggests a combined use of the open source systems Moodle and OpenSim through the Sloodle module, in order to facilitate the fruitful execution of the collaborative learning techniques Jigsaw and Fishbowl, and examines their online transferability. In the concluding section, it is surmised that the successful combination of specific approaches and systems can surpass particular shortcomings inherent in their isolated use.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124486412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Corral, J. Selga, A. Zaballos, David González-Tarragó, L. M. Torres, Berthold Haberler
{"title":"Security in OPERA Specification Based PLC Systems","authors":"G. Corral, J. Selga, A. Zaballos, David González-Tarragó, L. M. Torres, Berthold Haberler","doi":"10.1109/AICT.2010.26","DOIUrl":"https://doi.org/10.1109/AICT.2010.26","url":null,"abstract":"Power Line Communication (PLC) is a broadband telecommunication technology that enables the use of the existing electricity networks for high speed data transmission purposes. European project OPERA (Open PLC European Research Alliance) is a project whose strategic objective is to push PLC technology in all the different and relevant aspects. Within this framework, security is an important aspect that should be taken into account and integrated into the specifications from the very beginning. The project was scheduled in two phases with a duration of two years each. Phase1 produced a first PLC specification, including security. Phase2 produced an improved specification which was submitted to the IEEE as the OPERA PLC proposal within the contest organized by WG P1901. The paper presents the studies related to security in the PLC access technology made within this process that led to the second security specification of OPERA. Finally, an analysis of this specification is performed.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124752787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Matrix Convolutions and Clustering for Energy Efficient Routing Algorithm in Sensor Networks","authors":"Yaser A. Yousef, Marc Gilg, P. Lorenz","doi":"10.1109/AICT.2010.18","DOIUrl":"https://doi.org/10.1109/AICT.2010.18","url":null,"abstract":"The performance of the Wireless Sensor Networks (WSNs) is strongly affected by the limited capacity of the sensor nodes which form these networks. In fact, this limited capacity has a great influence on the lifetime of the wireless sensor networks. So an effective management of the consumed power of the nodes can increase the network lifetime. Various algorithms have been proposed to optimize the energy conservation. Most of these algorithms try to achieve this goal by focusing on energy efficient routing. In this paper, we propose a new centralized routing algorithm, in which we have represented the energy capacity of a wireless sensor network as an image. Then we have used the matrix convolution to choose the more economical energy path to minimize energy consumption in the entire network.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122652561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision Support for the Usage of Multicast versus Unicast in Broadband TV Networks","authors":"Alireza Abdollahpouri, B. Wolfinger","doi":"10.1109/AICT.2010.57","DOIUrl":"https://doi.org/10.1109/AICT.2010.57","url":null,"abstract":"Internet Protocol Television (IPTV) is undoubtedly a killer application and when offered via wireless networks, it paves the way for quad-play in next generation networks. It has been argued for a long time that the popularity of TV channels can be modeled quite realistically using a Zipf-like distribution in which the top 10% of channels account for nearly 90% of viewers. Therefore, most channels are unpopular or rarely watched and it is not efficient to multicast a channel as long as there are less than a given number of viewers tuned into it. The interesting question arises at which bound multicast and unicast channels should be separated. In this article, we want to first introduce a performance criterion, called multicast gain, which can be used for computing multicast efficiency. Based on the measured gain, we define a threshold in order to identify cases in which unicasting might be a better choice. We show that although multicasting can usually outperform multiple unicasting in terms of bandwidth usage, due to the inherent overhead in establishing and maintaining multicast connections, in special cases, using multiple unicast flows can be preferable.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128624823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative Agent Based Vertical Handover Scheme for Heterogeneous Networks","authors":"Atiq Ahmed, L. Merghem, D. Gaïti","doi":"10.1109/AICT.2010.43","DOIUrl":"https://doi.org/10.1109/AICT.2010.43","url":null,"abstract":"The increasing demand for all time and every where services requires the network operators to integrate different kinds of wireless and cellular networks. To enable this integration, it is important that users can roam freely across networks. But, as different technologies are involved, the problem of vertical handover (VHO) needs to be addressed. Solutions in the literature lack intelligence and are not adaptable for reducing the packet loss and latency involved in the handover. An intelligent technique is needed in order to perform the service continuity. This paper presents a cooperative agent based approach for the VHO. We propose to introduce the agents in the mobile nodes (MNs) and Access Points (APs) to collect the necessary information from the environment. Based on this information, agents will anticipate the handover in order to reduce the handover latency and packet loss. We have defined three behaviors for the agents that will assist us in performing this task.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectral Enhancement of Whispered Speech Based on Probability Mass Function","authors":"H. Sharifzadeh, I. Mcloughlin, Farzaneh Ahmadi","doi":"10.1109/AICT.2010.47","DOIUrl":"https://doi.org/10.1109/AICT.2010.47","url":null,"abstract":"Whispered speech can be effectively used for quiet and private communications over mobile phones and is also the communication means for ENT patients under a regime of voice rest. The reconstruction of natural sounding speech from such whispers can be useful for several types of application across different scientific fields ranging from communications to biomedical engineering. Despite the useful applications for a such technology, the reconstruction of natural speech from whispers has received relatively little research effort to date. This paper presents novel methods for spectral enhancement and formant smoothing with the aim of attaining more natural sounding speech within the reconstruction process. The proposed approach uses a probability mass-density function to identify a reliable formant trajectory through whispers and apply vocal modifications accordingly. Subjective evaluation experiments were performed, and are reported, to assess the performance of the techniques. A method for the near real-time conversion of whispers to normal phonated speech through a modified CELP codec has been discussed in our previously published work which, the proposed formant modification approach in this paper builds upon.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127757423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collateral Damage in the Last Big Internet Storm","authors":"P. Gutiérrez","doi":"10.1109/AICT.2010.16","DOIUrl":"https://doi.org/10.1109/AICT.2010.16","url":null,"abstract":"The Internet is in a transition phase. Migrating to IPv6 is currently the centre of many studies, since the IPv4 address space exhaustion is starting to be noticeable by facts like the slowdown in the growth of the IPv4 routing table. Another less advertised but equally important challenge for the Internet is the exhaustion of the current 16 bit Autonomous System Numbers. The solution adopted by the IETF has to introduce 32-bit Autonomous System Numbers in order to get a reasonable breathing space. This implies another transition process, which is less public because it has no direct impact on the end users. But this process is not being as smooth as many people would desire and is at the root of several routing storms, which have lately shaken the Internet. This paper analyses the last Internet routing storm, which occurred on August, 2009 from a location which is geographically and topographically distant from the storm's textit{epicentre}. The data captured by RIPE'S BGP probes at the London Internet Exchange are decomposed for this study and the traffic profiles of the different probes is analysed separately. This study looks at traces produced by BGP-4 traffic engineering techniques based on changes in the ASPATH attribute and discovers one probe which mainly collected traffic which was induced by a change in the ASPATH prepending behaviour of a neighbouring Autonomous System.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Link Quality and Local Load Balancing Routing Mechanisms in Wireless Sensor Networks","authors":"C. Diallo, M. Marot, M. Becker","doi":"10.1109/AICT.2010.27","DOIUrl":"https://doi.org/10.1109/AICT.2010.27","url":null,"abstract":"The choice of a routing protocol in a wireless sensor network (WSN) depends on the nature of the application and on its primary mission. Lot of works addressed the problem of routing mechanisms with more or less effectiveness, some of which pointed out the use of the link quality indicator (LQI) as a route selection criterion (metric). In a previous work, following an experimental study, we have shown [1], under some conditions, the inefficiency of the LQI based routing. In this paper, we propose a simple way, to improve reliability and efficiency of the LQI based routing in WSN. We also evaluate other route selection criteria including the \"remaining energy level\" and the \"sensor proximity with respect to the Base Station (BS)\". The proposed local load balancing routing protocol is aimed to help source nodes to exploit potential capabilities of their respective neighbors without having any knowledge of their properties such as the position or the energy level. Simulation results show that our adaptation of the LQI metric is among the best route selection criteria regardless of the performance criterion under consideration, and that the load balancing significantly improves the routing efficiency by lengthening the network lifetime while minimizing packet losses.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133233190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}