{"title":"Putting SHIM6 into practice","authors":"H. Naderi, B. Carpenter","doi":"10.1109/ATNAC.2014.7020867","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020867","url":null,"abstract":"SHIM6 is a host-centric solution for multihoming in IPv6 networks. It is fully implemented in hosts and does not affect the Internet routing system. We present the results of experiments with SHIM6 in the lab and over the Internet. The aim is to evaluate the behaviour of SHIM6 in case of link failure. We tried two transport protocols, TCP and DCCP, measuring traffic and recovery time, two important performance metrics. In addition, the experiments revealed some operational issues which must be addressed before SHIM6 can be deployed world-wide.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster based femtocell efficiency evaluation","authors":"O. Arafat, M. Gregory, Afaz Uddin Ahmed","doi":"10.1109/ATNAC.2014.7020881","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020881","url":null,"abstract":"Femtocell networks are a cost-effective way to deliver the bandwidth needed to support advanced mobile data services in heavily congested urban and indoor locations. Locally-networked femtocell arrays are used to enhance mobile network coverage and capacity in crowded urban and indoor locations. Cluster based femtocell deployments in large indoor environments provide a flexible approach to improve localized coverage and performance. In this paper, the performance of cluster based femtocell deployments along with a capacity based cognitive resource allocation scheme is analysed under different channel configurations in a hybrid access control network. The results of a performance analysis of the cluster based femtocell configurations in a priority based users' network are presented.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126475931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust cooperation in mobile ad hoc networks","authors":"A. Krzesinski","doi":"10.17972/AJICTA2015114","DOIUrl":"https://doi.org/10.17972/AJICTA2015114","url":null,"abstract":"Consider a mobile ad hoc network where the nodes belong to different authorities. The nodes must be given incentives to spend their resources (battery power and transmission bandwidth) in forwarding packets that originate at nodes belonging to another authority. This can be done by assigning a credit balance to each node: when a node acts as an originating node it uses its credits to pay for the costs of sending its own traffic; when a node acts as a transit node it earns credits by forwarding traffic from other nodes. This paper presents a credit-based incentive scheme which assists nodes when they lack the credits necessary to transmit their data. An essential part of the credit-based scheme is a decentralised credit redistribution mechanism to destroy (create) credit at nodes that are over (under) supplied with credit. The goal of this paper is to investigate the effect of various fraudulent activities on the performance of the credit-based incentive scheme. We show that the credit-based scheme is inherently robust with respect to a number of fraudulent activities, provided the nodes behave in a rational manner. We show that credit redistribution is the main reason why the credit-based incentive scheme is relatively immune to fraud.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134179482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Basnet, U. Gunawardana, S. Biyanwilage, R. Liyanapathirana
{"title":"Interference analysis in digital TV reception with LTE systems in adjacent bands in Australian context","authors":"S. Basnet, U. Gunawardana, S. Biyanwilage, R. Liyanapathirana","doi":"10.1109/ATNAC.2014.7020878","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020878","url":null,"abstract":"Digital dividend spectrum, that is released after the digitalisation of analog TV broadcasting is harmonized internationally for the use of Long Term Evolution (LTE) technology. When LTE and digital television services operate in adjacent UHF bands, LTE transmitters can cause harmful interference to television reception. Thus in this paper, we study the compatibility of operating LTE services in the digital dividend spectrum identified in Australia based on the recently allocated band plan. We have used interference analysis method to calculate the minimum separation distance between LTE and DVB-T system and Monte Carlo Simulation for outage probability.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"34 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125717330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Towfiqur Rahman, A. Abdullah, M. Alam, M. Jamil, M. R. Islam, K. Abdullah
{"title":"An efficient modulation technique to mitigate nonlinearities in optical OFDM","authors":"Muhammad Towfiqur Rahman, A. Abdullah, M. Alam, M. Jamil, M. R. Islam, K. Abdullah","doi":"10.1109/ATNAC.2014.7020896","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020896","url":null,"abstract":"The optical OFDM (O-OFDM) system is a growing technology for next generation high-speed optical communication. Two types of O-OFDM; CO-OFDM (Coherent-Optical OFDM) and Direct-current-based optical OFDM (DC-OFDM) are discussed. Mach-Zehnder modulators (MZMs) are used in up-converter part of CO-OFDM system to convert the RF signal to optical signal when the light cannot directly modulate for higher speed. The MZM has a cosine behavior with high nonlinear characteristic that affects the system performance. This paper aims to investigate an efficient pulse modulation technique for mitigating nonlinearity effect in the Mach-Zehnder modulator of CO-OFDM system. It also highlights the proposed method, an efficient CO-OFDM system to solve the existing nonlinearity issue. This technique influences positively on OSNR to reduce non linearity over different distances of optical channel and improve the system performance in terms of power consumption and bandwidth efficiency.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128664106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Okechukwu Onubogu, K. Ziri-Castro, D. Jayalath, S. Demmel, Hajime Suzuki
{"title":"Doppler and pathloss characterization for vehicle-to-vehicle communications at 5.8 GHz","authors":"Okechukwu Onubogu, K. Ziri-Castro, D. Jayalath, S. Demmel, Hajime Suzuki","doi":"10.1109/ATNAC.2014.7020874","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020874","url":null,"abstract":"Due to significant increase in vehicular accident and traffic congestions, vehicle to vehicle (V2V) communication based on the intelligent transport system (ITS) was introduced aiming to significantly reduce vehicular accident and traffic congestion. However, to carry out efficient design and implementation of a reliable vehicular communication systems, a deep knowledge of the propagation channel characteristics in different environments is crucial, in particular the Doppler and pathloss parameters. This paper presents an empirical V2V channel characterization and measurement performed under realistic urban, suburban and highway driving conditions in Brisbane, Australia. Based on Lin Cheng statistical Doppler Model (LCDM), values for the RMS Doppler spread and coherence time due to time selective nature of V2V channels are presented. Also, based on log-distance power law model, values for the mean pathloss exponent and the standard deviation of shadowing were reported for urban, suburban and highway environments. The V2V channel parameters can be useful to system designers for the purpose of evaluating, simulating and developing new protocols and systems.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125241420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of delay-line buffers for asynchronous optical packet switched networks","authors":"Shuna Yang, N. Stol","doi":"10.1109/ATNAC.2014.7020899","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020899","url":null,"abstract":"Optical buffering is one major challenge in realizing all-optical packet switching. In this paper we focus on a delay-line buffer architecture, called a Multiple-Input Single-Output (MISO) buffer, which is realized by cascaded fiber delay lines (FDLs). We consider the MISO buffers in a network scenario where the incoming packets are asynchronous and of fixed length. Instead of matching the fixed packet length, the length of basic FDL is adjusted to minimize the packet loss under different scenarios. A novel Markov model is proposed to analyze the performance of our buffering scheme, in terms of packet loss ratio, average packet delay and the output link utilization. Both simulation and analytical results show that the optimal basic FDL length is equal to the fixed packet length under low system load. However, under high system load, the basic FDL length is much smaller than fixed packet length for minimum packet loss. In addition, this paper gives clear guidelines for designing optimal basic FDL lengths under different network scenarios. It is noticeable that this optimal length value is independent of the buffer sizes.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115869049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enterprise security architecture for accessing SaaS cloud services with BYOD","authors":"V. Samaras, S. Daskapan, R. Ahmad, S. K. Ray","doi":"10.1109/ATNAC.2014.7020886","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020886","url":null,"abstract":"In contemporary times IT plays a major role in enterprises' business processes. Companies pursue the adoption of new technological trends in order to improve their business in terms of both performance and efficiency so that they can keep up with the fierce market competition. However, the emergence of cloud computing technology and the opportunity for employees to work using their personal smart phones through the adoption of Bring your own Device (BYOD) policies introduce additional risk for the enterprise. In this paper we propose an enterprise information security architecture for accessing SaaS cloud services by Smartphone BYOD. This architecture is based on the SABSA security architecture framework, which consists of the hardware, software and service-oriented security components that can reduce the aforementioned risks to acceptable levels.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122149925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frame based back-off for Q-learning RACH access in LTE networks","authors":"L. Bello, P. Mitchell, D. Grace","doi":"10.1109/ATNAC.2014.7020894","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020894","url":null,"abstract":"This paper introduces a novel back-off scheme to improve the performance of a Q-learning based RACH access (QL-RACH) scheme. A Frame-based Back-off with QL-RACH (FB-QL-RACH) scheme is proposed. The scheme reduces the probability of collision between Human-to-Human (H2H) and Machine-to-Machine (M2M) users when sharing the same frame for both the initial access and the back-off. Also the probability of idle slots caused by M2M back-off in the QL-RACH scheme is eliminated. In addition the paper also considers the interaction of Poisson and Periodic traffic models in sharing the RACH. Simulation results show that the new back-off scheme improves the overall RACH throughput by around 70%. The results also show that both traffic distributions can be controlled using QL-RACH.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123905030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced coding and decoding method for raptor codes over fading channels","authors":"Lingyi Han, Yuexing Peng, H Zhao","doi":"10.1109/ATNAC.2014.7020875","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020875","url":null,"abstract":"In this paper, an improved decoding algorithm is developed for Raptor codes in fading channels to enhance its error performance. As the classic decoding algorithm of the Raptor codes is designed for erasure channels and its error performance degrades severely over the fading channels, a modified coding and decoding algorithm is developed for Raptor codes with short codeword length in fading channels. A random interleaver is introduced between the inner LT code and the outer LDPC code, and then an iterative soft information upgrading and transferring-based decoding algorithm under Turbo principle is employed to combat the fading. Simulation results show the presented coding and decoding algorithm can enhance the bit error rate(BER) performance of Raptor codes in fading channels.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130614011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}