{"title":"The Mobile Edge Computing (MEC)-Based VANET Data Offloading Using the Staying-Time-Oriented k-Hop Away Offloading Agent","authors":"Chung-Ming Huang, Zhong-You Wu, Shih-Yang Lin","doi":"10.1109/ICOIN.2019.8718188","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718188","url":null,"abstract":"This paper proposed a Mobile Edge Computing (MEC)-based k-hop away IEEE 802.11p Road Side Unit (RSU) Vehicular-to-Infrastructure (V2I) offloading method. Let a vehicle X regularly use LTE cellular network to communicate with the peer entity in the infrastructure side, i.e., in Internet. When there is a k-hop V2V path that can connect X with the ahead RSU, the V2I offloading can be enabled; additionally, when X has left the signal coverage of the corresponding RSU, if there is a k-hop V2V path that can connect X with the rear RSU, the V2I offloading can still be continued. In the proposed method, a MEC server is used to compute whether the k-hop V2I offloading can be enabled and maintained or not. This work also shows the performance analysis for different offloading scenarios in situations of different vehicular density.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130259807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sangwoo Han, Yunmin Go, Hyunmin Noh, Hwangjun Song
{"title":"Cooperative Server-Client HTTP Adaptive Streaming System for Live Video Streaming","authors":"Sangwoo Han, Yunmin Go, Hyunmin Noh, Hwangjun Song","doi":"10.1109/ICOIN.2019.8718151","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718151","url":null,"abstract":"In this work, we propose a cooperative server-client HTTP adaptive streaming system to provide a high-quality live video streaming service. In the proposed system, the server adaptively encodes the video segment to improve the bandwidth utilization of clients according to the bandwidth information collected from clients. Additionally, the client selects the segment bitrate by considering the bandwidth utilization, quality difference, and buffered playback time. The performance of the proposed system is verified through a simulation. The simulation results show that the proposed system can provide higher bandwidth utilization and lower quality difference than existing HTTP adaptive streaming systems","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114809126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gigabit Ethernet with Wireless Extension: OPNET Modelling and Performance Study","authors":"N. Sarkar, Sonia Gul, B. Anderton","doi":"10.1109/ICOIN.2019.8718141","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718141","url":null,"abstract":"Gigabit Ethernet (GbE) backbone network with wireless extension is gaining much popularity in campus, small businesses, and corporate network environments worldwide. A good understanding on the impact of wireless extension to a wired backbone network is required for proper design and deployment of such systems. In this paper we investigate the effect of wireless extension (i.e. increasing wireless nodes) on the performance of a GbE backbone network by extensive simulation. We develop a simulation model (using OPNET simulation tool) to study the system performance with and without wireless extension under FTP, VoIP and Video Conferencing traffics for various network scenarios. Results show that FTP download response time and Video packet delays increased about 61% and 94%, respectively as a result of a wireless extension to the GbE backbone network. The findings reported in this paper provide some insights into the design and deployment of GbE-Wireless networks that may help network planners and engineers to contribute further towards developing next generation wireless networks.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128343532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Gateway Routing Scheme for Disaster Recovery Scenario","authors":"N. Mahiddin, N. Sarkar","doi":"10.1109/ICOIN.2019.8718189","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718189","url":null,"abstract":"Natural disaster can strike at any time and can ruin large regions damaging houses, buildings, as well as physical communication infrastructure. Therefore, a network backup is essential in the disaster recovery areas as victims can contact their loved one in order to update the current situation as soon as possible. A mobile ad hoc network (MANET) is a collection of mobile devices that dynamically communicate with each other without any physical infrastructure. This feature offers a solution for communication problems in disaster recovery and keeping the communication going in disaster areas. In this paper we propose an efficient routing selection scheme (GWRS) to overcome traffic congestion problems due to huge calls in disaster areas network. This new scheme provides a flexible and feasible approach in determining the best route. The routing scheme will simplify the selection of routes and prevent nodes from broadcasting packets to the entire network. In addition, this scheme eradicates any redundant nodes in each level of the routing table. Ad-Hoc On-Demand Distance Vector (AODV) and Destination Sequenced Distance Vector (DSDV) routing schemes was chose because the schemes show the best performance for reactive and proactive categories respectively in emergency scenarios. These schemes simulated in the same realistic environment of disaster recovery area. Then, the performance of the proposed scheme is compared to these two schemes.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"415 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124161854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks","authors":"Mee Hong Ling, K. Yau","doi":"10.1109/ICOIN.2019.8718163","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718163","url":null,"abstract":"This paper investigates the effectiveness of reinforcement learning (RL) model in clustering as an approach to achieve higher network scalability in distributed cognitive radio networks. Specifically, it analyzes the effects of RL parameters, namely the learning rate and discount factor in a volatile environment, which consists of member nodes (or secondary users) that launch attacks with various probabilities of attack. The clusterhead, which resides in an operating region (environment) that is characterized by the probability of attacks, countermeasures the malicious SUs by leveraging on a RL model. Simulation results have shown that in a volatile operating environment, the RL model with learning rate α= 1 provides the highest network scalability when the probability of attacks ranges between 0.3 and 0.7, while the discount factor γ does not play a significant role in learning in an operating environment that is volatile due to attacks.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124409037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Reinforcement Learning Based Sensor Data Management for Vehicles","authors":"Jeongmin Moon, Mukoe Cheong, I. Yeom, Honguk Woo","doi":"10.1109/ICOIN.2019.8718108","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718108","url":null,"abstract":"Sensing the surroundings and processing the sensed data in a timely manner are critical as part of the perception process of autonomous vehicles that are getting closer to reality. This paper addresses the issues of managing the data streams generated from a variety of sensors embedded in a vehicle. To do so, we first adopt the real-time database structure that provides the clear programming abstraction over time-varying heterogeneous sensor data, and then exploit deep reinforcement learning (DRL) that can deal with highly dynamic data updates with underlying system restrictions such as limited in-vehicle network bandwidth. The experiments demonstrate that our DRL-based approach performs steadily against rapidly changing data and is able to efficiently suppress unnecessary data updates.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"White Visor: Support of White-Box Switch in SDN-Based Network Hypervisor","authors":"Bong-yeol Yu, Gyeongsik Yang, Heesang Jin, C. Yoo","doi":"10.1109/ICOIN.2019.8718167","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718167","url":null,"abstract":"Network virtualization is a fundamental technology for datacenters and upcoming wireless communications (e.g., 5G). It takes advantage of software-defined networking (SDN) that provides efficient network management by converting networking fabrics into SDN-capable devices. Moreover, white-box switches, which provide flexible and fast packet processing, are broadly deployed in commercial datacenters. A white-box switch requires a specific and restricted packet processing pipeline; however, to date, there has been no SDN-based network hypervisor that can support the pipeline of white-box switches. Therefore, in this paper, we propose WhiteVisor: a network hypervisor which can support the physical network composed of white-box switches. WhiteVisor converts a flow rule from the virtual network into a packet processing pipeline compatible with the white-box switch. We implement the prototype herein and show its feasibility and effectiveness with pipeline conversion and overhead.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127544043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protected Coordination of Service Mesh for Container-Based 3-Tier Service Traffic","authors":"Moonjoong Kang, Junsik Shin, JongWon Kim","doi":"10.1109/ICOIN.2019.8718120","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718120","url":null,"abstract":"With the rapid expansion of cloud-native computing paradigm, a growing number of applications are adopting container-based microservices architecture (MSA). The resulting container-based MSA functions are required to be tightly stitched together and therefore the stitching interconnections need persistent monitor/control coordination. Recent service mesh approaches are trying to solve this maintenance problem in a transparent manner. However, with the popular Istio-based service mesh realization, the monitor/control traffic for coordination is exposed to application tenants, which could be a potential security concern. Typically, containers are limited with a single network interface and thus it is not possible to isolate control / monitor traffic from application data traffic. Thus, in this paper, we propose a protected coordination scheme for service mesh as a work-around solution. For this protected coordination of service mesh, the monitor/control traffic for coordination is separated and encrypted while data traffic is treated in the same way with the existing service mesh approach.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131154897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accurate Position Estimation of a Drifting Wireless LAN Communication Device in a 200mm-Diameter Small Sewer Pipe","authors":"Yuki Takei, Zhi Liu, Hiroaki Sawano, S. Ishihara","doi":"10.1109/ICOIN.2019.8718116","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718116","url":null,"abstract":"Sewer pipe deterioration is a severe problem in many countries, and sewer pipe inspections are essential for maintaining sewer systems. Various sewer inspection methods, such as a visual check, boat-type video cameras, and remote robots with or without a wired connection, exist. However, they each suffer from problems, such as high labor costs, long waiting times when using boat-type video cameras, and the purchasing cost of robots. To achieve low-cost, safe, and near real-time inspections of sewer pipes, we have proposed a sewer inspection method based on a drifting wireless camera and sensor nodes. Drifting nodes capture a video of the inside of pipe while drifting on a current in the sewer and access points (AP) installed under manholes receive video data from drifting nodes and send data to an online server on the Internet. For the video inspection using our proposed system, the information of the position of camera/sensor nodes while they drifting is essential because video data need to link to the location information to help to detect damaged points of pipes. However, the camera/sensor nodes cannot utilize the GNSS because signals from GNSS satellite do not reach to the space in underground sewer pipes. In this paper, to investigate the usefulness of the receive signal strength indicator (RSSI) observed by drifting camera/sensor nodes for the position estimation in 200mm-diameter pipes, we performed experiments to measure the RSSI of a wireless communication device drifting on water in an experimental underground pipe. The measurement results show that RSSI monotonically increases when a drifting device approaches the AP and monotonically decreases when it leaves the AP, and the distribution of measurement value suggests that possibility of position estimation with an error of lm order.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MQTT over VLAN for Reduction of Overhead on Information Discovery","authors":"Yuya Sasaki, T. Yokotani, H. Mukai","doi":"10.1109/ICOIN.2019.8718125","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718125","url":null,"abstract":"The development of communication protocols for Internet of Things (IoT) has been widely discussed. These protocols should be applied to various IoT services. Message Queuing Telemetry Transport (MQTT) is one of the promising options. However, due to the expansion of IoT networks, coexistence with legacy services is required. In essence, this protocol should be used on the IP infrastructure where various services converge. This requires high efficiency such as highspeed communication and minimal delay on the wide-area IoT network to be one of the important research subjects. Therefore, we propose a mechanism for improvements in wide-area networks for MQTT communication using virtual LAN (VLAN) technology. The results demonstrate that the proposed mechanism reduces the communication delay to 1/10 of its current value.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}