{"title":"QoE prediction model for multimedia services in IP network applying queuing policy","authors":"L. Sevcik, M. Voznák, J. Frnda","doi":"10.1109/SPECTS.2014.6879998","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879998","url":null,"abstract":"This paper proposes a QoE (Quality of Experience) assessment model which can estimate voice and video quality. Based on the proposed model, speech or video quality is calculated with regard to policies applied for packet processing by routers and to the level of total network utilization. The contribution of this paper lies in designing a new computational model capable of predicting the quality of multimedia services respecting queuing policy and transmission speed of interfaces on routers in IP networks.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Bisio, Alessandro Delfino, S. Delucchi, F. Lavagetto, M. Marchese, G. Portomauro, S. Zappatore
{"title":"Hybrid simulated-emulated platform for heterogeneous access networks performance investigations","authors":"I. Bisio, Alessandro Delfino, S. Delucchi, F. Lavagetto, M. Marchese, G. Portomauro, S. Zappatore","doi":"10.4304/jnw.10.4.265-272","DOIUrl":"https://doi.org/10.4304/jnw.10.4.265-272","url":null,"abstract":"The availability of different access technologies enables the creation of heterogeneous networks supporting users mobility and assuring several different services. Meanwhile these networks require complex control techniques to assure Quality of Service (QoS) to users. Before implementing such networks, a deep performance analysis, through the use of network simulators or real models, is necessary. In particular the first ones (e.g. Network Simulator 3 - ns-3 among the others) are quite simple and easy to manage and configure, while the second ones assure the handling of real traffic flows. The main contribution of this paper is the description of an hybrid simulated and emulated network evaluation platform, developed by the authors. The platform purpose is to execute a performance analysis of different wireless networks such as Long Term Evolution (LTE) and Wi-Fi, connected to a core network implementing the Differentiated Service (DiffServ) protocol. The paper contains also the results of preliminary validation tests.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of discrete-event simulation in acute care's capacity analysis","authors":"Hongbiao Yang, Rupy Sawhney, Wolday Abrha","doi":"10.1109/SPECTS.2014.6879989","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879989","url":null,"abstract":"Deploying nurses based on fixed shift could mitigate scarce availability during peak now of patients, but idle time should be resolved. This paper presents the analysis of nurses scheduling for minimal cost and reduced patient waiting time. An acute care unit of a local hospital is thecase study. The main sources to collect the data are historical data of patients' medical records as well as staff activity reports of their daily duty. Arena simulation software is applied to identify an optimum nurse scheduling. A base case model is built and several scenarios with different schedules and resources are compared: the results of these scenarios such as total pay cost and the resource utilization implied an optimal solution. A three shift system that comprises of all registered nurses, reducing the number of chest pain outpatients' rooms. and increasing the common rooms results optimal.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127416388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of short-term radio signal disturbances in industrial wireless sensor networks","authors":"M. Eskola, T. Heikkilä","doi":"10.4304/jnw.10.4.201-208","DOIUrl":"https://doi.org/10.4304/jnw.10.4.201-208","url":null,"abstract":"The performance of wireless sensor networks (WSNs) in industrial applications may be degraded due to harsh radio signal propagation conditions. Mobile heavy machines and large metal and concrete surfaces usually worsen the signal fading effects resulting in deep fades. We have studied the effects of certain industrial environmental disturbances on the quality of the transmitted signals in real-life industrial environments. We used software defined radio (SDR) as the receiver to capture the transmitted signals and analyzed the statistical properties of the captured signals with Matlab/Simulink tools. Our studies led us to a method which aims to identify the transmission problems related to signal multipath propagation by calculating the probability density function (PDF) of the received signal and comparing it to the simulated theoretical Rician distributions. The results show that tracking the transformations of the PDF of the received signal helps to recognize the temporal changes in radio link environment and in that way can help to choose the right actions in order to overcome the communication problems.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"54 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130692010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danilo Amendola, N. Cordeschi, M. Shojafar, V. Abate, F. Rango
{"title":"Performance evaluation of a multi-frame persistent neighbor discovery strategy based on Sift-distribution in DTN RFID networks","authors":"Danilo Amendola, N. Cordeschi, M. Shojafar, V. Abate, F. Rango","doi":"10.1109/SPECTS.2014.6880006","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6880006","url":null,"abstract":"A multi-frame Neighbor Discovery Protocol over a DTN network with RFID Devices is proposed. This protocol is based on a Sift-distribution (s-Persistent) in order to differentiate the access probability to slots among RFID devices. Moreover, our approach has been considered in a mono-frame and multi-frame scenario. Our s-Persistent approach is applied in a simulated test and in a real test-bed in order to see the effectiveness of the proposal in comparison with a well-known technique such as p-Persistent protocol. Performance Evaluation has been evaluated in terms of number discovered neighbors under different numbers of nodes and frames. Obtained results shows that s-Persistent performs better than p-Persistent increasing the number of discovered neighbors.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131082535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Meyer, Daniel Raumer, F. Wohlfart, B. Wolfinger, G. Carle
{"title":"Low latency packet processing in software routers","authors":"T. Meyer, Daniel Raumer, F. Wohlfart, B. Wolfinger, G. Carle","doi":"10.1109/SPECTS.2014.6879993","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879993","url":null,"abstract":"Commodity hardware can be used to build a software router that is capable of high-speed packet processing while being programmable and extensible. Therefore, software routers provide a cost-efficient alternative to expensive, special hardware routers. The efficiency of packet processing in resource-constrained nodes (e.g. software routers) can be strongly increased through parallel processing with commodity hardware based on multi-core processors. However, intra-node resource contention can have a strong negative impact on the corresponding network node. We describe how multi-core software routers can be optimized for low latency support by utilizing the technologies available in commodity PC hardware. For the analysis we used our approach for modeling of resource contention in resource-constrained nodes which is also implemented as the resource-management extension module for ns-3. Based on that, we derived a specific software router model which we used to optimize the performance. Our measurements show that the configuration of a software router has significant influence on the performance. The results can be used for parameter tuning in such systems.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of secure AODV with trust management under an energy aware perspective","authors":"Andrea Lupia, F. Rango","doi":"10.1109/SPECTS.2014.6879999","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879999","url":null,"abstract":"Ad-hoc networks allow nodes communication without an infrastructure, so they can be used in many environments. This lack of infrastructure introduces many security threats to the nodes in the network. Communication between nodes must be reliable, and protocols for MANETs need to make it possible. Due to the wireless channel and to the possible malicious behavior of nodes, it is necessary to introduce security mechanisms to avoid possible attacks in the network. The introduction of a trust management system on a well-known protocol such as SAODV protocol can protect against more attacks from malicious nodes, making wireless communication reliable and more secure. In this contribution Black hole and gray hole attacks will be detected, so communication will not be disrupted. Moreover, in order to understand as the energy consumption due to additional introduced security mechanisms, an energetic analysis is also performed on SAODV with and without trust management.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On a mechanism of detection of coalitions for reputation systems in P2P networks","authors":"Grzegorz Orynczak, Z. Kotulski","doi":"10.1109/SPECTS.2014.6879996","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879996","url":null,"abstract":"One of the most common types of attacks on reputation systems is made by reporting unfair ratings. They can be performed by the individual malicious members or by a group of agents forming a coalition and cooperating together in order to achieve particular purpose (e.g, to gain higher position in the community or to discredit the competition). Due to the fact, that such attacks are performed often by intelligent coalitions, they are much more harmful and harder to detect. This paper describes a novel algorithm for coalition detecting in reputation systems. By observing the agents which are controversially rated by the community it is possible to construct agents cooperation matrices and identify harmful coalitions. Detailed description of the algorithm is provided and presented simulation results confirm the effectiveness of the detection.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115225112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulating billion-task parallel programs","authors":"K. Perumalla, Alfred Park","doi":"10.1109/SPECTS.2014.6879997","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879997","url":null,"abstract":"In simulating large parallel systems, bottom-up approaches exercise detailed hardware models with effects from simplified software models or traces, whereas top-down approaches evaluate the timing and functionality of detailed software models over coarse hardware models. Here, we focus on the top-down approach and significantly advance the scale of the simulated parallel programs. Via the direct execution technique combined with parallel discrete event simulation, we stretch the limits of the top-down approach by simulating parallel programs with hundreds of millions of tasks. Although the scaling issues and solutions presented here are generally applicable, we focus on message passing interface (MPI) programs. Using a timing-validated benchmark application, a proof-of-concept scaling level is achieved to over 0.22 billion virtual MPI processes on 216,000 cores of a Cray XTS supercomputer, representing one of the largest direct execution simulations to date, combined with a multiplexing ratio of 1024 simulated tasks per real task.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121159395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A partially centralized messaging control scheme using star topology in delay and disruption tolerant networks","authors":"Shoki Oiyama, Hiroki Nishiyama, N. Kato","doi":"10.1109/SPECTS.2014.6879995","DOIUrl":"https://doi.org/10.1109/SPECTS.2014.6879995","url":null,"abstract":"Terminal-to-terminal communication technology has been studied to make communication and information distribution possible in an area, where communication infrastructure has been damaged or is not present, such as disaster area or rural area. Since mobile communication devices have short transmission range and high mobility owing to it bringing held by human beings, the network consisting of those nodes suffers from challenging conditions such as intermittent connectivity and absence of the end-to-end path between source and destination. To conquer that, Delay and Disruption Tolerant Networks (DTNs) using store-and-forward approach has attracted much research attention. In general routing algorithms, DTNs nodes exchange the control messages, e.g. the summary vector messages and request messages to know which messages each node possesses and to request replicated messages. However, the number of control messages being exchanged increases with the increase of node density. Furthermore, the size of a control message is proportional according to the number of replicas that shows. To reduce the number of control messages, we propose a partially centralized control scheme using star topology networks. Through our simulations, we show that our proposed method dramatically reduces control overhead in high node density scenarios.","PeriodicalId":429912,"journal":{"name":"International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123948262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}