{"title":"A predictive road traffic management system based on vehicular ad-hoc network","authors":"N. Nafi, Reduan H. Khan, J. Khan, M. Gregory","doi":"10.1109/ATNAC.2014.7020887","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020887","url":null,"abstract":"With an increasing number of vehicles on the road, demand for intelligent transportation systems is on the rise. In this paper, we present a predictive road traffic management system (PRTMS) based on the Vehicular Ad-hoc Network (VANET) architecture. The proposed PRTMS uses a novel communications scheme to estimate the future traffic intensities at different intersections based on a modified linear prediction algorithm. Based on the prediction, a central controller reduces the congestion level by re-routing the vehicles and adaptively changing the signaling cycles. An IEEE 802.11p based vehicle to-infrastructure communications system is used to collect trip information and transmit control signals to enforce multi-junction traffic flow control. Simulations are conducted using an integrated OPNET model comprised of road infrastructure, vehicular mobility management and communications networking to jointly examine the performances of the proposed PRTMS and the VANET. The results indicate that the proposed scheme provides a significant performance improvement in terms of total journey time and waiting time of the vehicles. In addition, the performance of the prediction algorithm is also investigated.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123218036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards fine-grained traffic classification for web applications","authors":"Po-Ching Lin, Shian-Yi Chen, Chi-Hung Lin","doi":"10.1109/ATNAC.2014.7020869","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020869","url":null,"abstract":"Web applications, such as video streaming, map services and office applications, have become very popular due to the advances of web technology. Traditional traffic classification methods based on port numbers and payload signatures barely work because the applications run on the same port numbers (usually port 80 and 443) and the payloads are usually encrypted. Furthermore, a web application may provide multiple functions, and the traffic from them has diverse characteristics. In this work, we use statistical features from application messages to characterize the traffic from individual functions of web applications, and perform fine-grained classification to identify the application functions. The experimental results show the classification can achieve high accuracy up to 98.30% for the interaction functions and 92.72% for the download functions.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117005394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amirhossein Moravejosharieh, E. T. Yazdi, A. Willig, K. Pawlikowski
{"title":"Adaptive channel utilisation in IEEE 802.15.4 wireless body sensor networks: Continuous hopping approach","authors":"Amirhossein Moravejosharieh, E. T. Yazdi, A. Willig, K. Pawlikowski","doi":"10.1109/ATNAC.2014.7020880","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020880","url":null,"abstract":"IEEE 802.15.4 is arguably considered as a well designed standard protocol to address the need for low-rate, low-power and low-cost Wireless Body Sensor Networks (WBSNs). Within a WBSN, Node's communication occurs during their confined active periods. The increase in number of active WBSNs would consequently result in the elevation of the overlapping ratio between the active periods of neighbouring WBSNs. In this paper, we address the interference caused by neighbouring WBSNs and its devastating consequences. Frequency hopping could be considered as a possible approach to alleviate the WBSNs performance degradation due to such interference. Our proposed “Continuous-Choice” scheme is compared with previously introduced “Initial-Choice” and “Blind-Choice” schemes in terms of channel utilisation, success rate, Satisfaction rate and energy consumption (both sensors and coordinator). Eventually, it is concluded that Continuous-Choice outperforms both Initial-Choice and Blind-Choice schemes in terms of above-mentioned performance measures.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving video quality in congested networks through deferred discard","authors":"Dennis Ong, T. Moors","doi":"10.1109/ATNAC.2014.7020885","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020885","url":null,"abstract":"Video already constitutes more than half of Internet traffic, and is expected to expand to 86% of Internet traffic by 2016. The dominance of video traffic justifies router features that optimise performance when video loads are high, in particular features that can deal with the congestion that video can create. In this paper, we exploit a characteristic of video, namely that video streams consist of recurring patterns of packets of varying importance, to create a new Deferred Discard (DD) queue management scheme. DD keeps important video packets when queue management would otherwise have discarded them, and substitutes their discard with the discard of later less important packets. We simulated different queue management schemes with a set of three test videos and measured their performance in terms of the average picture signal to noise ratio (PSNR). DiffServ improved the video PSNR by 2.1dB compared to best effort, while DD further improved the video PSNR (of DiffServ) by 3.9dB, i.e. DD improves video quality over DS more than DS improves video quality over BE.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intelligent hybrid spread spectrum MAC protocol for increasing the transmission capacity of wireless ad-hoc networks","authors":"S. Ajmal, Samra Adnan, Asim Rasheed, A. Hasan","doi":"10.1109/ATNAC.2014.7020872","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020872","url":null,"abstract":"Unmanaged interference is a threat to reliable communication in ad hoc networks. Currently, ad hoc networks suppress or inhibit interferers around an active receiver to meet a minimum required signal-to-interference-plus-noise ratio threshold. Techniques like carrier sensing, random back-offs, spread spectrum, guard zone based inhibition, etc. are being used for interference management. We have developed a MAC protocol that works on the principle of not inhibiting any interferer near an active receiver. The proposed scheme uses Direct Sequence Spread Spectrum network-wide and intelligent Frequency Hopping within a zone around the receiver. Mathematical model based on stochastic geometry is validated through simulation. It is observed that proposed MAC protocol shows performance improvement over other MACs, in terms of Transmission Capacity normalized by the used spectrum.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130989273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication","authors":"R. Khalid, Z. Zukarnain","doi":"10.1109/ATNAC.2014.7020888","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020888","url":null,"abstract":"Classical cryptography is mainly about the challenge to compute the secret key using current computing system. We tend to hide our information from being stealing by others. In order to do so, in this research paper we are proposing a method that use the law of physics in communication in terms of cryptography and key distribution by applying quantum theorems and principle. Using BB84 protocol as a base in quantum key distribution together with the implementation of tight finite key that compress the Shannon entropy and Von Neumann theory. Our multiparty system would be a new area of authentication. Throughout this paper, we are going to prove that our method will give a small error rate between the initial key rates with the final key rate then will impact the attack resilient. Yet the key cannot be formed and transferred simply.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124092964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sobrun Jamal, A. Abdullah, Towfiqur Rahman, K. Abdullah, H. A. Ramli, A. F. Ismail
{"title":"BER performance of OFDM system with the effect of error control code","authors":"Sobrun Jamal, A. Abdullah, Towfiqur Rahman, K. Abdullah, H. A. Ramli, A. F. Ismail","doi":"10.1109/ATNAC.2014.7020903","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020903","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is one of the promising modulation techniques suitable for high data rates in a wireless communication system. OFDM is the most effective modulation technique suitable for multipath communication channel and fading environment at reasonable complexity. However, the existence of Error Control Coding (ECC) in OFDM system is necessary for the reliable data transmission. This is due to the capability of ECC which can detect and correct the data received. Two types of ECC performance which are Hamming code and convolutional code are investigated in this paper. The simulation system and parameter are described and the results are discussed.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"No more hidden backoff: Advertise backoff in frequency domain","authors":"S. Alvi, A. Baig","doi":"10.1109/ATNAC.2014.7020901","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020901","url":null,"abstract":"IEEE 802.11 standard backoff mechanism is vulnerable to selfish MAC layer misbehavior. A greedy node cheating on backoff rules can attain higher bandwidth and cause unfairness among nodes. In addition, selfish behavior is severe when honest nodes use longer contention window size. Contention overhead and unshared backoff value makes backoff mechanism vulnerable. Various studies have addressed misbehavior and overhead problems separately. In this paper, we address both of these problems by proposing a frequency-domain backoff mechanism to mitigate both backoff misbehavior and contention overhead. In this mechanism, the non-interfering capability of OFDM based PHY data-subcarriers is exploited and RTS packets are transmitted using single randomly chosen data-subcarrier. Using RTS, transmitters advertise their backoff value which in-turn is used to monitor selfish behavior at the receiver. Performance analysis suggest that the proposed mechanism promises lower overhead and higher efficiency gains over standard protocol in various network scenarios.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing the capacity of ad-hoc networks","authors":"R. Hunjet, A. Coyle","doi":"10.1109/ATNAC.2014.7020877","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020877","url":null,"abstract":"This paper shows that although simultaneous transmissions on the same frequency can cause interference to one another, they may still benefit network capacity if adequate separation conditions between nodes are met. We define this separation and show that it decreases as the number of simultaneous transmissions increases. We further show, through an example of three simultaneous transmissions, that optimisation of network capacity is dependent on this separation and path loss exponent. The findings are verified through simulations which demonstrate how separation can be utilised to simultaneously increase the capacity and power efficiency of military ad-hoc networks. It is also shown through optimisation that the use of additional nodes can increase these benefits.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125264824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of stimulated Raman scattering-aware algorithm for routing and wavelength assignment","authors":"W. S. Sim, S. C. Tan, Z. Yusoff","doi":"10.1109/ATNAC.2014.7020897","DOIUrl":"https://doi.org/10.1109/ATNAC.2014.7020897","url":null,"abstract":"In this paper, the implication of Stimulated Raman Scattering in Routing Wavelength Assignment (RWA) is investigated and identified by analyzing the SRS parameters that related to RWA in the network and its capabilities of influence the network performance. Then, a SRS-aware RWA scheme, called Assign Minimum Interference and Shortest (AMINS) algorithm is proposed to minimize the effect of SRS in the network. Finally the proposed SRS-aware RWA scheme is tested in 15-node Mesh and 14-node NSF under different setting of input power and wavelength capacity for performance evaluation. The result shows that AMINS outperform First-Fit in the mentioned topologies.","PeriodicalId":396850,"journal":{"name":"2014 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124060927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}