{"title":"An MSS-based non-blocking coordinated checkpointing approach for mobile computing systems","authors":"M. Asgari, M. Dehghan, M. Salehnamadi","doi":"10.1109/AHICI.2011.6113927","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113927","url":null,"abstract":"Mobile computing systems consist of different components while Mobile Support Stations (MSSs) act a key role among others. This paper presents an efficient MSS-based non-blocking coordinated checkpointing scheme, in witch checkpointing overheads are forwarded to the MSSs and therefore workload of Mobile Hosts (MHs) would be reduced substantially. We also enhanced the proposed scheme to have much less propagating checkpoint requests and avoid avalanche effect. Simulation results show that compared to other existing algorithms, the scheme's average number of propagating requests and checkpoints are significantly lower so it would be suitable for mobile computing environment.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125560387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint power and subcarrier allocation in multi-hop OFDMA network: A cross-layer approach","authors":"S. C. Jha, Umesh Phuyal, V. Bhargava","doi":"10.1109/AHICI.2011.6113934","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113934","url":null,"abstract":"Resource wastage due to loss of a packet in a multi-hop wireless network greatly depends on number of hops the packet has already traveled. Hence, consideration of hop-count information is crucial while optimizing overall resource utilization of such network. Therefore, we propose a cross-layer resource allocation approach for an orthogonal frequency division multiple access based multi-hop network which jointly allocates subcarriers and transmit power prioritizing packets with higher hop-counts. Simulation results show that the proposed scheme is capable of minimizing network-wide resource wastage significantly without degradation in goodput and system outage performance.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130313791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Radhika Srikanth, Suthikshn Kumar, S. A. Junjarampalli
{"title":"Cisco Smart Automation Tool","authors":"Radhika Srikanth, Suthikshn Kumar, S. A. Junjarampalli","doi":"10.1109/AHICI.2011.6113953","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113953","url":null,"abstract":"This paper concentrates on the generic automation tool development for automating the process of validation of tools developed by Cisco. Cisco Smart Automation Tool can be used by engineers to automate the process of validating the tools that were developed by them. Cisco Smart Automation Tool reads the validation statements written by the developer or execution engineer from a text file or an excel sheet. These statements are written in plain English language following certain syntax.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133599683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SSENet-2011: A Network Intrusion Detection System dataset and its comparison with KDD CUP 99 dataset","authors":"Dataset Vasudevan, E. Harshini, S. Selvakumar","doi":"10.1109/AHICI.2011.6113948","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113948","url":null,"abstract":"In recent years the attack vectors in the network world have increased many fold with the increased usage of Internet and with the exponential growth of various applications. Network Intrusion Detection System (NIDS) is one of the most sought after system by security experts in safeguarding the network from both external and internal attacks. NIDS works mainly in two modes: Online and Offline. Online or real-time NIDS, such as Snort, Bro, etc., examines the packet structure to find intrusions, if any, and alerts the administrator. On the other hand, offline NIDS logs the packets flowing to and from the network, constructs features based on connections, and creates a dataset. Such NIDS datasets are used in research purposes for applying data mining, machine learning, evolutionary algorithms, etc., to detect attacks. KDD CUP 99 is one such widely used popular IDS dataset. KDD CUP 99 dataset is obsolete because many of the attacks performed to create the dataset do not exist now. Moreover, the features constructed do not pertain to network activities. It is a mixture of host based as well as network based features. So, the need for a new dataset, conforming to the present network activities and attack vectors, is inevitable. This motivated us to come out with a NIDS dataset, SSENet-2011 dataset, in this paper. SSENet-2011 dataset was constructed using Tstat tool. A real time experiment was performed, the network packets were captured, features were constructed, and the dataset was created. The created SSENet-2011 dataset was compared with the KDD CUP 99 dataset. From the experiments it is evident that a closed and secluded network such as SSENet and Tstat tool help researchers in developing and analyzing a new dataset which reflects the changing scenario of network activities.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127028935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for improving search efficiency in unstructured peer to peer network","authors":"M. Sendil, N. Nagarajan","doi":"10.1109/AHICI.2011.6113946","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113946","url":null,"abstract":"P2P has become a popular application among the Internet. The searching of the content and file sharing is perhaps the most popular application. An application uses flooding as their prevailing resource location method for content searching and file sharing. The basic problem with the flooding mechanism is that it creates a large volume of unnecessary traffic in the network mainly because a peer may receive the same queries multiple times through different paths. In this paper, the performance of the searching is improved using super peer based search with improved searching technique (A novel approach). When the performance of the search method improves, then automatically the P2P traffic can be reduced.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131072246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developments in orthogonal frequency division multiplexing (OFDM) system-a survey","authors":"M. Suma, B. Kanmani","doi":"10.1109/AHICI.2011.6113955","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113955","url":null,"abstract":"In today's communication scenario, high data rate single-carrier transmission may not be feasible due to too much complexity of the equalizer in the receiver. To overcome the frequency selectivity of the wideband channel experienced by single-carrier transmission, multiple carriers can be used for high rate data transmission. Orthogonal frequency division multiplexing (OFDM) , is multicarrier system which has become a modulation in physical layer of next generation WiMAX, LTE system. In this paper effort is made to present challenges in OFDM and work done so far in channel equalisation and different transforms used in OFDM system.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126236981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS routing in MANET through cross-layer design with BER and modifying AODV","authors":"R. Dahal, T. Sanguankotchakorn","doi":"10.1109/AHICI.2011.6113940","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113940","url":null,"abstract":"Many shortest path routing protocols have been proposed neglecting the effect of lower layers. Here, the Modified Ad-hoc On Demand Distance Vector routing based on Bit Error Rate (MAODV-BER) is proposed, where the route discovery of AODV has been modified to achieve the stable route by obtaining Bit Error Rate (BER) information from physical layer through cross-layer approach. Due to the use of multimedia applications in Mobile Ad-hoc Networks (MANET) strict Quality of Service (QoS) is required. So, for QoS fulfillment, the bandwidth and delay requirements are added in each route message. Finally, the path having minimum BER as well as minimum hop count and fulfilling QoS requirements is selected.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122302982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shortest Path Routing Protocol (SPRP) for Highly Data Centric Wireless Sensor Networks","authors":"N. Doohan, D. Mishra, S. Tokekar","doi":"10.1109/AHICI.2011.6113925","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113925","url":null,"abstract":"Wireless Sensor Networks (WSNs) are composed of many sensors which are densely or sparsely deployed to get the necessary information. They are constraint on resources such as energy, memory, computational speed and communications bandwidth. Particularly power is another major issue in WSNs, therefore main stress has been given to minimize the number of transmission to extend sensor service time in the network and support to discover multiple paths and multiple events simultaneously in any direction. Here we are proposing a new approach “Shortest Path Routing Protocol for Highly Data Centric Wireless Sensor Networks (SPRP)” which is based on the best part of protocols used for wired network i.e. TCP/IP. SPRP a new routing mechanism for wireless environment has been designed and proposed which is inspired from various routing like RIP, OSPF and a shortest path using Dijkstra's algorithm. Possible unforeseen scenarios in Wireless Sensor Networks domain like energy level status, damage of some node accidently/intensely has been considered and bypass to such occurrence has been integrated in the proposed solution.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120954227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MPEG-4 video transmission over IEEE 802.11e EDCA in multihop OLSR MANET using cross layer approach","authors":"Amit Kumar Tamang, T. Sanguankotchakorn","doi":"10.1109/AHICI.2011.6113936","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113936","url":null,"abstract":"This research aims to improve the quality of MPEG-4 video transmission over MANET using cross layer paradigm that transfer the MPEG-4 video priority information from application to medium access control (MAC) layer. This information is used by proposed adopting dynamic mapping algorithm (ADMA) along with other information as access category (AC) congestion from MAC and hop count to destination from network layer to map the video frames in proper ACs. The proposed ADMA is compared with the existing Enhanced Distributed Channel Access (EDCA) and static mapping approaches based on Peak Signal-to-Noise Ratio (PSNR), Throughput and Average end-to-end delay evaluation parameters.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134207754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study of synchronization algorithms in distributed systems","authors":"A.S. Kavitha Bai, J. Mungara","doi":"10.1109/AHICI.2011.6113958","DOIUrl":"https://doi.org/10.1109/AHICI.2011.6113958","url":null,"abstract":"A distributed system is a collection of independent computers that appears to its users as a single coherent system and sharing the common resources. Multiple processes do not simultaneously access a shared resource so, requires the synchronization. We are having the four synchronization algorithms in distributed systems. This paper describes the pros & cons of each algorithm. In this we are comparing these four algorithms (Centralized, Decentralized, Distributed and Token Ring algorithms) with appropriate comparative measurements such as time complexity, delay, redundancy, scalability, failure rate & recovery. Based on this comparative study in future we are going to address the problems in the existing synchronization algorithms.","PeriodicalId":371011,"journal":{"name":"2011 Second Asian Himalayas International Conference on Internet (AH-ICI)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134410689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}