Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360783
Li He, Jieming Wu, Xiao-Ling Fu
With the development of GPS, GIS and mobile network communication technology, it has been becoming possible for mobile phone users to acquire the geographical information anytime and anywhere. This paper proposes a novel solution of embedded navigation system based on GPS/GIS that realizes some functions such as PDA data enquiry and parsing, terminal communication service, map application service, geographic information collection, embedded navigation electronic map etc. In this paper, we discuss the system topology architecture, technical scheme and the key realization technologies. At last, test results prove that the solution of embedded navigation system based on GPS/GIS is feasible and valid, and it can be installed in PDA, mobile phones and other portable information terminals.
{"title":"Design and implementation of GPS&GIS -based mobile navigation system","authors":"Li He, Jieming Wu, Xiao-Ling Fu","doi":"10.1109/ICNIDC.2009.5360783","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360783","url":null,"abstract":"With the development of GPS, GIS and mobile network communication technology, it has been becoming possible for mobile phone users to acquire the geographical information anytime and anywhere. This paper proposes a novel solution of embedded navigation system based on GPS/GIS that realizes some functions such as PDA data enquiry and parsing, terminal communication service, map application service, geographic information collection, embedded navigation electronic map etc. In this paper, we discuss the system topology architecture, technical scheme and the key realization technologies. At last, test results prove that the solution of embedded navigation system based on GPS/GIS is feasible and valid, and it can be installed in PDA, mobile phones and other portable information terminals.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360977
Yuanxin Jiang, Doohyun Kim, S. Cho
In this paper, we propose a method to save energy consumption for the rejoin procedure of ZigBee networks. By skipping the active scan process, a rejoining node and its neighbors are able to save a large amount of energy. In addition, the rejoining node chooses the suitable potential parent by reserving and utilizing original neighbor table. This method is capable of reducing the number of rejoin request command frames, thus reducing the network traffic to some extent. Simulation results demonstrate that the proposed rejoin procedure contributes to more effective and efficient energy consumption.
{"title":"An improved rejoin procedure in ZigBee networks","authors":"Yuanxin Jiang, Doohyun Kim, S. Cho","doi":"10.1109/ICNIDC.2009.5360977","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360977","url":null,"abstract":"In this paper, we propose a method to save energy consumption for the rejoin procedure of ZigBee networks. By skipping the active scan process, a rejoining node and its neighbors are able to save a large amount of energy. In addition, the rejoining node chooses the suitable potential parent by reserving and utilizing original neighbor table. This method is capable of reducing the number of rejoin request command frames, thus reducing the network traffic to some extent. Simulation results demonstrate that the proposed rejoin procedure contributes to more effective and efficient energy consumption.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360880
Yinghua Zhou, Xuemei Cai
The huge volume of history sensing data of a wireless sensor network need to be processed and discriminated to help the users of the data to analyze and judge the different situations of the monitored object and environment. A novel approach is proposed to first divide the history sensing data into partitions so that the data, measured when the monitored object or environment is normal, are roughly distinguishable from those measured when the object or environment is abnormal. Then the method uses a new centroid-based clustering algorithm to group the data in the partitions into different clusters. Finally the clusters of data are labeled “normal” or “abnormal” by applying the suggested heuristics.
{"title":"Discrimination of sensing data in normal and abnormal situations of the monitored object or environment","authors":"Yinghua Zhou, Xuemei Cai","doi":"10.1109/ICNIDC.2009.5360880","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360880","url":null,"abstract":"The huge volume of history sensing data of a wireless sensor network need to be processed and discriminated to help the users of the data to analyze and judge the different situations of the monitored object and environment. A novel approach is proposed to first divide the history sensing data into partitions so that the data, measured when the monitored object or environment is normal, are roughly distinguishable from those measured when the object or environment is abnormal. Then the method uses a new centroid-based clustering algorithm to group the data in the partitions into different clusters. Finally the clusters of data are labeled “normal” or “abnormal” by applying the suggested heuristics.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125107357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360854
Shiguo Wang
In single relay non-cooperative amplify-and-forward (AaF) system, taking into account both long-term path loss and short-term Rayleigh fading, a closed form expression to distribute total power optimally among source and relay is obtained, which minimize end-to-end BER. The simulation results under various channel conditions and scenarios show that it is consistent with theoretical analysis, and optimal power allocation is realized to minimize BER in a simple way.
{"title":"BER-optimized power allocation for amplify-and-forward in single relay system","authors":"Shiguo Wang","doi":"10.1109/ICNIDC.2009.5360854","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360854","url":null,"abstract":"In single relay non-cooperative amplify-and-forward (AaF) system, taking into account both long-term path loss and short-term Rayleigh fading, a closed form expression to distribute total power optimally among source and relay is obtained, which minimize end-to-end BER. The simulation results under various channel conditions and scenarios show that it is consistent with theoretical analysis, and optimal power allocation is realized to minimize BER in a simple way.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127849213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360928
Yuncai Wang
There are many latent dangers in Digital Library (DL) Information System. To protect the information resources and the continuity of information service effectively, it is necessary to construct Digital Library Remote Disaster Recovery System (RDRS). Firstly, this paper discusses the role of disaster recovery in digital library information security system, the classification & technique parameters of disaster recovery system, and its domestic application status quo. Secondly, this paper focuses on the design principles of RDRS, network structure, and the realization of RDRS functions as well. Meanwhile, it sketches the network structure and platform of RDRS. Finally, this article expounds the management and maintenance for the RDRS.
{"title":"Research on remote disaster Recovery System of Digital Library","authors":"Yuncai Wang","doi":"10.1109/ICNIDC.2009.5360928","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360928","url":null,"abstract":"There are many latent dangers in Digital Library (DL) Information System. To protect the information resources and the continuity of information service effectively, it is necessary to construct Digital Library Remote Disaster Recovery System (RDRS). Firstly, this paper discusses the role of disaster recovery in digital library information security system, the classification & technique parameters of disaster recovery system, and its domestic application status quo. Secondly, this paper focuses on the design principles of RDRS, network structure, and the realization of RDRS functions as well. Meanwhile, it sketches the network structure and platform of RDRS. Finally, this article expounds the management and maintenance for the RDRS.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116716971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360896
S. Prabhavat, Hiroki Nishiyama, N. Ansari, N. Kato
Owing to the heterogeneity and high degree of connectivity of various networks, there likely exist multiple available paths between a source and a destination. To be able to simultaneously and efficiently use such parallel paths, it is essential to facilitate high quality network services at high speeds. So, traffic splitting, having a significant impact on quality of services (QoS), is an important means to achieve load balancing. In general, most existing models can be classified into flow-based or packet-based models. Unfortunately, both classes exhibit some drawbacks, such as low efficiency under the high variance of flow size in flow-based models and the phenomenon of packet reordering in packet-based models. In contrast, Table-based Hashing with Reassignment (THR) and Flowlet Aware Routing Engine (FLARE), both belonging to the class of flow-based models, attempt to achieve both efficient bandwidth utilization and packet order preservation. An original flow can be split into several paths. As compared to the traditional flow-based models, load balancing deviation from ideal distribution decreases while the risk of packet reordering increases. In this paper, we introduce analytical models of THR and FLARE, and derive the probabilities of traffic splitting and packet reordering for each model. Our analysis shows that FLARE is superior to THR in packet order preservation. Also, the performance of FLARE on bursty traffic is demonstrated and discussed.
{"title":"On the performance analysis of traffic splitting on load imbalancing and packet reordering of bursty traffic","authors":"S. Prabhavat, Hiroki Nishiyama, N. Ansari, N. Kato","doi":"10.1109/ICNIDC.2009.5360896","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360896","url":null,"abstract":"Owing to the heterogeneity and high degree of connectivity of various networks, there likely exist multiple available paths between a source and a destination. To be able to simultaneously and efficiently use such parallel paths, it is essential to facilitate high quality network services at high speeds. So, traffic splitting, having a significant impact on quality of services (QoS), is an important means to achieve load balancing. In general, most existing models can be classified into flow-based or packet-based models. Unfortunately, both classes exhibit some drawbacks, such as low efficiency under the high variance of flow size in flow-based models and the phenomenon of packet reordering in packet-based models. In contrast, Table-based Hashing with Reassignment (THR) and Flowlet Aware Routing Engine (FLARE), both belonging to the class of flow-based models, attempt to achieve both efficient bandwidth utilization and packet order preservation. An original flow can be split into several paths. As compared to the traditional flow-based models, load balancing deviation from ideal distribution decreases while the risk of packet reordering increases. In this paper, we introduce analytical models of THR and FLARE, and derive the probabilities of traffic splitting and packet reordering for each model. Our analysis shows that FLARE is superior to THR in packet order preservation. Also, the performance of FLARE on bursty traffic is demonstrated and discussed.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117027400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360950
Sanghyeon Lee, Kyongkuk Cho, Kwanghun Kim, D. Yoon, T. Kim
IMT-Advanced system proposed by ITU-R for next generation mobile communications has the technical requirements of the performances of an improved broadcast, a multicast and a VoIP by supporting the transmission rates up to 100 Mbps for high mobility and 1 Gbps for low mobility. LTE-Advanced system is one of the leading candidates of IMT-Advanced systems and many telecommunications industries will introduce LTE-Advanced system widely. Therefore it is important to examine the performance of the technologies applied in LTE-Advanced system. In this paper, we analyze the performances of the transmission modes in the downlink spatial channel model of LTE-Advanced system.
{"title":"Performance analysis of LTE-Advanced system in the downlink spatial channel model","authors":"Sanghyeon Lee, Kyongkuk Cho, Kwanghun Kim, D. Yoon, T. Kim","doi":"10.1109/ICNIDC.2009.5360950","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360950","url":null,"abstract":"IMT-Advanced system proposed by ITU-R for next generation mobile communications has the technical requirements of the performances of an improved broadcast, a multicast and a VoIP by supporting the transmission rates up to 100 Mbps for high mobility and 1 Gbps for low mobility. LTE-Advanced system is one of the leading candidates of IMT-Advanced systems and many telecommunications industries will introduce LTE-Advanced system widely. Therefore it is important to examine the performance of the technologies applied in LTE-Advanced system. In this paper, we analyze the performances of the transmission modes in the downlink spatial channel model of LTE-Advanced system.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"111 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117249493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360828
Junying Sun, Boli Liu
RS (255, 223) is used as the outer code of concatenated system in CCSDS standard and its speed affects the speed of the whole system. This paper designs the decoder in frequency domain and introduces Good-Thomas prime factor algorithm to realize FFT of 255 point and 15 point, which impoves the decoding speed. The flow chart based on DSP is also presented.
{"title":"RS fast decoding in frequency domain based on DSP","authors":"Junying Sun, Boli Liu","doi":"10.1109/ICNIDC.2009.5360828","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360828","url":null,"abstract":"RS (255, 223) is used as the outer code of concatenated system in CCSDS standard and its speed affects the speed of the whole system. This paper designs the decoder in frequency domain and introduces Good-Thomas prime factor algorithm to realize FFT of 255 point and 15 point, which impoves the decoding speed. The flow chart based on DSP is also presented.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"219 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132914849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360943
Eun-su Kim, Sooyong Park, Jae-il Jung
In this paper, we studied the multi-hop broadcast algorithms for delivery of safety message in inter vehicle communication environment. In MANET environment, there are three multi-hop broadcasting schemes such as probability based methods, area based methods and topology based methods. We simulate MANET based multi-hop broadcasting schemes and evaluate the performance of our work in order to analyze the suitable of these schemes for vehicular environment.
{"title":"Performance comparison of the multi-hop broadcast schemes for safety message in V2V communication","authors":"Eun-su Kim, Sooyong Park, Jae-il Jung","doi":"10.1109/ICNIDC.2009.5360943","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360943","url":null,"abstract":"In this paper, we studied the multi-hop broadcast algorithms for delivery of safety message in inter vehicle communication environment. In MANET environment, there are three multi-hop broadcasting schemes such as probability based methods, area based methods and topology based methods. We simulate MANET based multi-hop broadcasting schemes and evaluate the performance of our work in order to analyze the suitable of these schemes for vehicular environment.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134432735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/ICNIDC.2009.5360861
Xiaoxiao Xu, Guochu Shou, Yihong Hu
The frame error at the data link layer in high-speed optical access network was investigated. The Gigabit Ethernet test bed was established including a network tester, a variable optical attenuator, optical link and a purpose-built tool which allows us to examine errors on a per-octet basis. The test bed transmits pre-constructed test data frames in a standard format and captures error-containing frames for purpose-built tool and statistical tool later analysis. From the experiment results we find that bit error, fragments and extra-bit frame all lead to frame error, resulting in packet loss in high-speed optical network. The distributions of frame error, byte error and extra-bit frame are distinct on the different attenuation conditions and the same happens with different frame lengths. We also find that regardless of the extra-bit frame effect, the packet loss and bit error obey the Poisson distribution in the different parameters, and that the distribution of extra-bit frame varies depending on the length of the frames transmitted.
{"title":"Time domain analysis for the packet loss and bit error distribution in high-speed network","authors":"Xiaoxiao Xu, Guochu Shou, Yihong Hu","doi":"10.1109/ICNIDC.2009.5360861","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360861","url":null,"abstract":"The frame error at the data link layer in high-speed optical access network was investigated. The Gigabit Ethernet test bed was established including a network tester, a variable optical attenuator, optical link and a purpose-built tool which allows us to examine errors on a per-octet basis. The test bed transmits pre-constructed test data frames in a standard format and captures error-containing frames for purpose-built tool and statistical tool later analysis. From the experiment results we find that bit error, fragments and extra-bit frame all lead to frame error, resulting in packet loss in high-speed optical network. The distributions of frame error, byte error and extra-bit frame are distinct on the different attenuation conditions and the same happens with different frame lengths. We also find that regardless of the extra-bit frame effect, the packet loss and bit error obey the Poisson distribution in the different parameters, and that the distribution of extra-bit frame varies depending on the length of the frames transmitted.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133106608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}