In this paper the issue of transmission range in homogeneous wireless networks (HWNs) is addressed. In such networks, wireless mobile nodes are assumed to use the same transmission ranges. In HWNs, higher transmission ranges reduce the number of hops that packets need to reach their destinations, but they also increase the number of nodes that locally compete for the medium access. On the other hand, shorter transmission ranges allow simultaneous transmissions in different areas of the network. However, for such short transmission ranges the probability of a disconnected network increases. To deal with the fore mentioned dilemma, a new approach based on analytically defining an initial transmission range that keeps the network connected is presented herein. The simulation carried out under various network loads has focused on a set of metrics, namely: packets delivery ratio, average end to end delay and normalized routing overhead. The simulation results have shown that using short transmission range may not lead always to optimal performance.
{"title":"Impacts of Transmission Range in Homogeneous Wireless Networks","authors":"M. Djoudi","doi":"10.1109/ICSNC.2008.64","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.64","url":null,"abstract":"In this paper the issue of transmission range in homogeneous wireless networks (HWNs) is addressed. In such networks, wireless mobile nodes are assumed to use the same transmission ranges. In HWNs, higher transmission ranges reduce the number of hops that packets need to reach their destinations, but they also increase the number of nodes that locally compete for the medium access. On the other hand, shorter transmission ranges allow simultaneous transmissions in different areas of the network. However, for such short transmission ranges the probability of a disconnected network increases. To deal with the fore mentioned dilemma, a new approach based on analytically defining an initial transmission range that keeps the network connected is presented herein. The simulation carried out under various network loads has focused on a set of metrics, namely: packets delivery ratio, average end to end delay and normalized routing overhead. The simulation results have shown that using short transmission range may not lead always to optimal performance.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114062907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this study, we propose a gradual adaption model for estimation of user information access behavior. A variety of userspsila information access data are collected by unit of a day for each user, and analyzed in terms of short, medium, long periods, and by remarkable and exceptional categories. The proposed model is then established by analyzing the pre-processed data based on Full Bayesian Estimation. We further present experimental simulation results, and show the operability and effectiveness of our proposed model.
{"title":"Gradual Adaption Model for Estimation of User Information Access Behavior","authors":"Jing Chen, Roman Y. Shtykh, Qun Jin","doi":"10.1109/ICSNC.2008.56","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.56","url":null,"abstract":"In this study, we propose a gradual adaption model for estimation of user information access behavior. A variety of userspsila information access data are collected by unit of a day for each user, and analyzed in terms of short, medium, long periods, and by remarkable and exceptional categories. The proposed model is then established by analyzing the pre-processed data based on Full Bayesian Estimation. We further present experimental simulation results, and show the operability and effectiveness of our proposed model.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120938147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a new bandwidth preemption algorithm supporting differentiated services aware traffic engineering (DS-TE) in the multi-protocol label switching (MPLS). The paper presents the following contributions. Firstly, we look at the problem of organizing the mapping of label switching paths (LSPs) in an optimal way such that we can compromise between several traffic engineering (TE) objectives: load-balancing, avoiding network bottlenecks, reducing routing cost, and minimizing path hop count. Secondly, we introduce DS-TE bandwidth management and admission control mechanisms by proposing a new bandwidth preemption algorithm for the maximum allocation model (MAM). Finally, in our proposed scheme, we conduct preemption in tow dimensions: class type (CT) and preemption level so that an LSP of CT ct and priority p can not be preempted as long as any LSP of weaker precedence remains. A case study is also provided to show how our algorithm performs in MPLS networks where DS-TE is applied.
{"title":"A New Preemption Algorithm Supporting Differentiated Services Aware Traffic Engineering","authors":"A. Kotti, R. Hamza, K. Bouleimen","doi":"10.1109/ICSNC.2008.19","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.19","url":null,"abstract":"This paper presents a new bandwidth preemption algorithm supporting differentiated services aware traffic engineering (DS-TE) in the multi-protocol label switching (MPLS). The paper presents the following contributions. Firstly, we look at the problem of organizing the mapping of label switching paths (LSPs) in an optimal way such that we can compromise between several traffic engineering (TE) objectives: load-balancing, avoiding network bottlenecks, reducing routing cost, and minimizing path hop count. Secondly, we introduce DS-TE bandwidth management and admission control mechanisms by proposing a new bandwidth preemption algorithm for the maximum allocation model (MAM). Finally, in our proposed scheme, we conduct preemption in tow dimensions: class type (CT) and preemption level so that an LSP of CT ct and priority p can not be preempted as long as any LSP of weaker precedence remains. A case study is also provided to show how our algorithm performs in MPLS networks where DS-TE is applied.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper a new clustering algorithm for vehicular ad-hoc networks (VANET) is presented. The proposed solution is a modification of the Basagnipsilas distributed and mobility-adaptive clustering (DMAC) algorithm. Some additional conditions that have to be fulfilled before the cluster head change, are introduced to better suit the road traffic. Tests performed in the simulation environment consisting of VanetMobiSim and JiST/SWANS++ show that algorithm performs better than the original solution - the clusters stability is significantly increased.
{"title":"Modified DMAC Clustering Algorithm for VANETs","authors":"G. Wolny","doi":"10.1109/ICSNC.2008.28","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.28","url":null,"abstract":"In this paper a new clustering algorithm for vehicular ad-hoc networks (VANET) is presented. The proposed solution is a modification of the Basagnipsilas distributed and mobility-adaptive clustering (DMAC) algorithm. Some additional conditions that have to be fulfilled before the cluster head change, are introduced to better suit the road traffic. Tests performed in the simulation environment consisting of VanetMobiSim and JiST/SWANS++ show that algorithm performs better than the original solution - the clusters stability is significantly increased.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Mozumdar, F. Gregoretti, L. Lavagno, Laura Vanzago
Data aggregation is a basic mechanism that is used to reduce the traffic flow in sensor networks. In this mechanism, one node basically the cluster leader collects data from surrounding nodes and then sends the summarized information to upstream nodes. In this paper, we propose an algorithm to select cluster leader that will perform data aggregation in a partially connected sensor network. The algorithm also reduces the traffic flow inside the network by adaptively selecting the shortest route for packet routing to the cluster leader.
{"title":"An Algorithm for Selecting the Cluster Leader in a Partially Connected Sensor Network","authors":"M. Mozumdar, F. Gregoretti, L. Lavagno, Laura Vanzago","doi":"10.1109/ICSNC.2008.50","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.50","url":null,"abstract":"Data aggregation is a basic mechanism that is used to reduce the traffic flow in sensor networks. In this mechanism, one node basically the cluster leader collects data from surrounding nodes and then sends the summarized information to upstream nodes. In this paper, we propose an algorithm to select cluster leader that will perform data aggregation in a partially connected sensor network. The algorithm also reduces the traffic flow inside the network by adaptively selecting the shortest route for packet routing to the cluster leader.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a validation model for the DSR routing protocol that includes a specification of the protocol and a test scenario. The scenario tests the conformance of a system implementation. The specification has been performed using the SDL language that developed by ITU-T and the scenario has been generated from the specification in a tool like Cinderella SDL. The test generation method is based on a set of test purposes that express specific system properties and is completely automated.
{"title":"Testing Methodology Using SDL for an On-demand Routing Protocol in MANET","authors":"F. Rookhosh, A. Haghighat, S. Nickmanesh","doi":"10.1109/ICSNC.2008.43","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.43","url":null,"abstract":"This paper presents a validation model for the DSR routing protocol that includes a specification of the protocol and a test scenario. The scenario tests the conformance of a system implementation. The specification has been performed using the SDL language that developed by ITU-T and the scenario has been generated from the specification in a tool like Cinderella SDL. The test generation method is based on a set of test purposes that express specific system properties and is completely automated.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128434695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PON (passive optical network) is the most promising technology applicable to TPS (triple play service). To improve processing the packet, MAC (multiple access control) is the most important technology in the PON. The core of MAC is DBA(dynamic bandwidth assignment), it classifies SR-DBA (status report DBA) and NSR-DBA (non status report DBA). However, it's bad in network efficiency because GPON DBA is using BPONpsilas DBA This study develop BR (borrow-refund)-DBA for improve network efficiency and prompt process. For take the gauge of performance evaluation, estimate about throughput, fairness and queue delay in SR-DBA and NSR-DBA environment.
{"title":"Improvement of GPON MAC Protocol for IP TV Service","authors":"SeungKun Lee, Jong-Wook Jang, MoonHan Bae","doi":"10.1109/ICSNC.2008.73","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.73","url":null,"abstract":"PON (passive optical network) is the most promising technology applicable to TPS (triple play service). To improve processing the packet, MAC (multiple access control) is the most important technology in the PON. The core of MAC is DBA(dynamic bandwidth assignment), it classifies SR-DBA (status report DBA) and NSR-DBA (non status report DBA). However, it's bad in network efficiency because GPON DBA is using BPONpsilas DBA This study develop BR (borrow-refund)-DBA for improve network efficiency and prompt process. For take the gauge of performance evaluation, estimate about throughput, fairness and queue delay in SR-DBA and NSR-DBA environment.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Transmission Control Protocol (TCP) is known to suffer from performance degradation in mobile wireless environments. This is because such environments are prone to packet losses due to high bit error rates and mobility induced disconnections. TCP interprets packet losses as an indication of congestion and inappropriately invokes congestion control mechanisms, leading to degraded performance.In this paper, we propose a new mechanism that improves TCP performance in a wireless ad hoc network where we use multi-metric joint identification for congestion detection based on end-to-end measurements. On the other hand, in this paper we utilizes network layer feedback for identification of disconnection state furthermore when packets are lost due to channel error, the TCP sender retransmits packets without invoking congestion control.
{"title":"Improvement of TCP Performance in Ad Hoc Networks Using Cross Layer Approach","authors":"S. M. Mirhosseini, F. Torgheh","doi":"10.1109/ICSNC.2008.47","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.47","url":null,"abstract":"Transmission Control Protocol (TCP) is known to suffer from performance degradation in mobile wireless environments. This is because such environments are prone to packet losses due to high bit error rates and mobility induced disconnections. TCP interprets packet losses as an indication of congestion and inappropriately invokes congestion control mechanisms, leading to degraded performance.In this paper, we propose a new mechanism that improves TCP performance in a wireless ad hoc network where we use multi-metric joint identification for congestion detection based on end-to-end measurements. On the other hand, in this paper we utilizes network layer feedback for identification of disconnection state furthermore when packets are lost due to channel error, the TCP sender retransmits packets without invoking congestion control.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper addresses issues of service access, and policies to control access to these services. It introduces the mobile phone as a service aggregator and control centre for sensor networks. Semantic policies are used to extend the encryption-based radio link protection by an application layer protection. Two scenarios are introduced, covering home access and content access in the home. The implementation of key elements such as mobile-based key distribution and semantic-based policies are performed in order to show the feasibility of the approach.
{"title":"Semantic Policies for Service Access in Mobile Supported Sensor Networks","authors":"Sarfraz Alam, Josef Noll, D. Roman","doi":"10.1109/ICSNC.2008.18","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.18","url":null,"abstract":"This paper addresses issues of service access, and policies to control access to these services. It introduces the mobile phone as a service aggregator and control centre for sensor networks. Semantic policies are used to extend the encryption-based radio link protection by an application layer protection. Two scenarios are introduced, covering home access and content access in the home. The implementation of key elements such as mobile-based key distribution and semantic-based policies are performed in order to show the feasibility of the approach.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"R-30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126631258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper focuses on the telecommunications sector in Bosnia and Herzegovina providing a brief overview of the regulatory and legislative framework, as well as achieved level of development of several segments of the telecommunications market, particularly highlighting the market of mobile telecommunications. Since 2001 the policy actions have contributed to the mobile penetration rise from 15% in 2001 to almost 60% in 2007.
{"title":"Regulatory Models in Telecommunications Market in Bosnia and Herzegovina","authors":"M. Skrbic, K. Huseinovic, Zlatko Lagumdzija","doi":"10.1109/ICSNC.2008.34","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.34","url":null,"abstract":"The paper focuses on the telecommunications sector in Bosnia and Herzegovina providing a brief overview of the regulatory and legislative framework, as well as achieved level of development of several segments of the telecommunications market, particularly highlighting the market of mobile telecommunications. Since 2001 the policy actions have contributed to the mobile penetration rise from 15% in 2001 to almost 60% in 2007.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126698797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}