首页 > 最新文献

2011 18th International Conference on Telecommunications最新文献

英文 中文
Multi-constraint physical topology design for all optical networks 全光网络的多约束物理拓扑设计
Pub Date : 2011-05-08 DOI: 10.1109/CTS.2011.5898970
N. Dharmaweera, R. Parthiban, Y. Sekercioglu
In optical networks, physical topology design is critically important, and key underlying parameters to be considered are cost, power consumption, and resilience. Optimization of these parameters is a difficult problem to solve. In this paper, we present a new heuristic algorithm that successfully minimizes the cost and power consumption of an optical network without compromising its resilience. The algorithm's results were demonstrated against two topologies obtained from real-life optical networks covering Australia.
在光网络中,物理拓扑设计非常重要,需要考虑的关键基本参数是成本、功耗和弹性。这些参数的优化是一个难以解决的问题。在本文中,我们提出了一种新的启发式算法,成功地将光网络的成本和功耗降至最低,而不影响其弹性。该算法的结果通过从覆盖澳大利亚的实际光网络中获得的两种拓扑进行了验证。
{"title":"Multi-constraint physical topology design for all optical networks","authors":"N. Dharmaweera, R. Parthiban, Y. Sekercioglu","doi":"10.1109/CTS.2011.5898970","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898970","url":null,"abstract":"In optical networks, physical topology design is critically important, and key underlying parameters to be considered are cost, power consumption, and resilience. Optimization of these parameters is a difficult problem to solve. In this paper, we present a new heuristic algorithm that successfully minimizes the cost and power consumption of an optical network without compromising its resilience. The algorithm's results were demonstrated against two topologies obtained from real-life optical networks covering Australia.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125817417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Selective sub-carrier relaying and power allocation for multi-relay-assisted cooperative OFDM systems with outdated CSI 具有过时CSI的多中继辅助合作OFDM系统的选择性子载波中继和功率分配
Pub Date : 2011-05-08 DOI: 10.1109/CTS.2011.5898982
S. Biyanwilage, U. Gunawardana, R. Liyanapathirana
In this paper, we investigate the relay selection, sub-carrier pairing, and power allocation problems in a two-hop, multi-relay-assisted cooperative OFDM system with amplify-and-forward (AF) relays. We study the application of selective sub-carrier relaying, where the relays collectively forward only a subset of the available sub-carriers, in a multi-relay-assisted environment. Transmit power allocation is performed such that the end-to-end system capacity is maximized under individual power constraints at each node. We evaluate the system performance when the available channel state information (CSI) is outdated and compare the performance with the all sub-carrier relaying method.
本文研究了一种两跳多中继辅助OFDM系统的中继选择、子载波配对和功率分配问题。我们研究了选择性子载波中继在多中继辅助环境中的应用,其中中继仅转发可用子载波的子集。传输功率分配的执行使得端到端系统容量在每个节点的单独功率约束下最大化。我们评估了可用信道状态信息(CSI)过时时的系统性能,并与全子载波中继方法进行了性能比较。
{"title":"Selective sub-carrier relaying and power allocation for multi-relay-assisted cooperative OFDM systems with outdated CSI","authors":"S. Biyanwilage, U. Gunawardana, R. Liyanapathirana","doi":"10.1109/CTS.2011.5898982","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898982","url":null,"abstract":"In this paper, we investigate the relay selection, sub-carrier pairing, and power allocation problems in a two-hop, multi-relay-assisted cooperative OFDM system with amplify-and-forward (AF) relays. We study the application of selective sub-carrier relaying, where the relays collectively forward only a subset of the available sub-carriers, in a multi-relay-assisted environment. Transmit power allocation is performed such that the end-to-end system capacity is maximized under individual power constraints at each node. We evaluate the system performance when the available channel state information (CSI) is outdated and compare the performance with the all sub-carrier relaying method.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129710557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AD-ZRP: Ant-based routing algorithm for dynamic wireless sensor networks AD-ZRP:基于蚁群的动态无线传感器网络路由算法
Pub Date : 2011-05-08 DOI: 10.1109/CTS.2011.5898910
Alexandre Massayuki Okazaki, A. A. Fröhlich
In this paper, we introduce Ant-based Dynamic Zone Routing Protocol (AD-ZRP), a self-configuring reactive routing protocol for Wireless Sensor Networks (WSNs). Our approach is based on HOPNET, a multi-hop and self-configuring hybrid routing protocol based on Ant Colony Optimization (ACO) and Zone Routing Protocol (ZRP) for Mobile Ad Hoc Networks (MANETs). There are many challenges in designing routing protocols for WSNs, and topology change is a factor that affects the network lifetime of WSNs. And with the robustness of routing protocols for MANETs, dealing with dynamic topologies becomes a less arduous task. However, WSNs tend to be more stringent than MANETs in respect to resource availability, then the AD-ZRP design must consider several restrictions including energy consumption, processing power, memory, and bandwidth. AD-ZRP also consists of ZRP, but it is based on dynamic zones which, acting together with ACO, allows us to deal with the restrictions of WSNs and yet improve the route discovery and the route maintenance through pheromone. We have evaluated and compared our algorithm to the original HOPNET and obtained better results in terms of data delivery ratio, routing overhead, and congestion avoidance for environments of dynamic topology.
本文介绍了基于蚁群的动态区域路由协议(AD-ZRP),这是一种用于无线传感器网络(WSNs)的自配置响应路由协议。我们的方法基于HOPNET,一种基于蚁群优化(ACO)和区域路由协议(ZRP)的多跳自配置混合路由协议,用于移动自组织网络(manet)。无线传感器网络路由协议的设计存在诸多挑战,而拓扑变化是影响无线传感器网络生存期的一个因素。由于路由协议的鲁棒性,动态拓扑的处理变得不那么困难。然而,在资源可用性方面,wsn往往比manet更严格,因此AD-ZRP设计必须考虑几个限制,包括能耗、处理能力、内存和带宽。AD-ZRP也由ZRP组成,但它基于动态区域,与蚁群算法(ACO)共同作用,使我们能够处理wsn的限制,并通过信息素改进路由发现和路由维护。我们已经将我们的算法与原始的HOPNET进行了评估和比较,并在动态拓扑环境下的数据传输比、路由开销和拥塞避免方面获得了更好的结果。
{"title":"AD-ZRP: Ant-based routing algorithm for dynamic wireless sensor networks","authors":"Alexandre Massayuki Okazaki, A. A. Fröhlich","doi":"10.1109/CTS.2011.5898910","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898910","url":null,"abstract":"In this paper, we introduce Ant-based Dynamic Zone Routing Protocol (AD-ZRP), a self-configuring reactive routing protocol for Wireless Sensor Networks (WSNs). Our approach is based on HOPNET, a multi-hop and self-configuring hybrid routing protocol based on Ant Colony Optimization (ACO) and Zone Routing Protocol (ZRP) for Mobile Ad Hoc Networks (MANETs). There are many challenges in designing routing protocols for WSNs, and topology change is a factor that affects the network lifetime of WSNs. And with the robustness of routing protocols for MANETs, dealing with dynamic topologies becomes a less arduous task. However, WSNs tend to be more stringent than MANETs in respect to resource availability, then the AD-ZRP design must consider several restrictions including energy consumption, processing power, memory, and bandwidth. AD-ZRP also consists of ZRP, but it is based on dynamic zones which, acting together with ACO, allows us to deal with the restrictions of WSNs and yet improve the route discovery and the route maintenance through pheromone. We have evaluated and compared our algorithm to the original HOPNET and obtained better results in terms of data delivery ratio, routing overhead, and congestion avoidance for environments of dynamic topology.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129645460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Combating persistent adversaries in wireless sensor networks using directional antennas 利用定向天线对抗无线传感器网络中的顽固对手
Pub Date : 2011-05-08 DOI: 10.1109/CTS.2011.5898964
Eliana Stavrou, A. Pitsillides
Security is an important property in applications offering services in mission-critical areas, such as in healthcare, military, transportation, etc. Wireless sensor networks (WSN) support the mission of these applications by monitoring the environment and reporting observations to appropriate authorities that are responsible for decision-making. Often, their operation can be at risk by adversaries that launch attacks against the WSN with the aim of compromising the reliability and availability of the network and the respective application. The outcome of an attack highly depends on the experience of the adversary and his capabilities in terms of programming skills, security knowledge and resources. From the network perspective, the challenge is to reliably recover to a normal operation as soon as the adversary is been detected and allow for packet delivery to destination. The challenge is even greater in the presence of adversaries that adapt their intrusion strategy to break the deployed recovery countermeasures and continue affecting the network. Proposed recovery countermeasures typically assume the use of omni-directional antennas, which cannot take advantage of antenna directivity in order to manipulate communication paths between WSN nodes for the purpose of (physically) bypassing an adversary. This paper presents an intrusion recovery protocol in WSNs that uses directional antennas to create controlled communication paths, thus routing, and enhancing the reliability, self-healingness and resilience of the network. The proposed protocol is implemented within the AODV context and evaluated using ns-2. We demonstrate the effectiveness of the proposed protocol to deliver packets to the destination in the presence of multiple persistent adversaries that deploy different types of simple to extended attacks.
在关键任务领域(如医疗保健、军事、运输等)提供服务的应用程序中,安全性是一个重要属性。无线传感器网络(WSN)通过监测环境和向负责决策的适当当局报告观察结果来支持这些应用程序的任务。通常,它们的操作可能会受到攻击者的威胁,这些攻击者针对WSN发起攻击,目的是破坏网络和各自应用程序的可靠性和可用性。攻击的结果在很大程度上取决于对手的经验和他在编程技能、安全知识和资源方面的能力。从网络的角度来看,挑战在于一旦检测到攻击者,就可靠地恢复到正常操作,并允许数据包发送到目的地。当对手调整其入侵策略以破坏已部署的恢复对策并继续影响网络时,挑战就更大了。所提出的恢复对策通常假设使用全向天线,它不能利用天线的指向性来操纵WSN节点之间的通信路径,以(物理地)绕过对手。本文提出了一种无线传感器网络入侵恢复协议,该协议利用定向天线创建可控的通信路径,从而实现路由,增强网络的可靠性、自愈性和弹性。提议的协议在AODV上下文中实现,并使用ns-2进行评估。我们演示了所提议的协议在多个持久对手存在的情况下将数据包发送到目的地的有效性,这些对手部署了不同类型的简单攻击到扩展攻击。
{"title":"Combating persistent adversaries in wireless sensor networks using directional antennas","authors":"Eliana Stavrou, A. Pitsillides","doi":"10.1109/CTS.2011.5898964","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898964","url":null,"abstract":"Security is an important property in applications offering services in mission-critical areas, such as in healthcare, military, transportation, etc. Wireless sensor networks (WSN) support the mission of these applications by monitoring the environment and reporting observations to appropriate authorities that are responsible for decision-making. Often, their operation can be at risk by adversaries that launch attacks against the WSN with the aim of compromising the reliability and availability of the network and the respective application. The outcome of an attack highly depends on the experience of the adversary and his capabilities in terms of programming skills, security knowledge and resources. From the network perspective, the challenge is to reliably recover to a normal operation as soon as the adversary is been detected and allow for packet delivery to destination. The challenge is even greater in the presence of adversaries that adapt their intrusion strategy to break the deployed recovery countermeasures and continue affecting the network. Proposed recovery countermeasures typically assume the use of omni-directional antennas, which cannot take advantage of antenna directivity in order to manipulate communication paths between WSN nodes for the purpose of (physically) bypassing an adversary. This paper presents an intrusion recovery protocol in WSNs that uses directional antennas to create controlled communication paths, thus routing, and enhancing the reliability, self-healingness and resilience of the network. The proposed protocol is implemented within the AODV context and evaluated using ns-2. We demonstrate the effectiveness of the proposed protocol to deliver packets to the destination in the presence of multiple persistent adversaries that deploy different types of simple to extended attacks.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127100372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PAPR reduction of OFDM signals using harmony search algorithm 利用和谐搜索算法降低OFDM信号的PAPR
Pub Date : 2011-05-08 DOI: 10.1109/CTS.2011.5898991
Emad Meimand Kermani, H. Salehinejad, S. Talebi
Orthogonal frequency division multiplexing (OFDM) is one of the widely used multiplexing techniques in wireless communications and especially cognitive radio networks. One of the key challenges of this technique is its high peak to average power ratio (PAPR) of the transmitted signal. This paper, introduces a new approach to PAPR reduction of OFDM signals using harmony search algorithm (HSA) based on the partial transmit sequence (PTS) method. The simulation results demonstrate that the proposed algorithm has better PAPR reduction performance as an accurate and low complexity approach for OFDM systems.
正交频分复用(OFDM)是无线通信特别是认知无线网络中应用最广泛的复用技术之一。该技术的关键挑战之一是其传输信号的峰值平均功率比(PAPR)高。介绍了一种基于部分发射序列(PTS)方法的谐波搜索算法(HSA)降低OFDM信号PAPR的新方法。仿真结果表明,该算法对OFDM系统具有较好的PAPR降低性能,是一种精确、低复杂度的方法。
{"title":"PAPR reduction of OFDM signals using harmony search algorithm","authors":"Emad Meimand Kermani, H. Salehinejad, S. Talebi","doi":"10.1109/CTS.2011.5898991","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898991","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is one of the widely used multiplexing techniques in wireless communications and especially cognitive radio networks. One of the key challenges of this technique is its high peak to average power ratio (PAPR) of the transmitted signal. This paper, introduces a new approach to PAPR reduction of OFDM signals using harmony search algorithm (HSA) based on the partial transmit sequence (PTS) method. The simulation results demonstrate that the proposed algorithm has better PAPR reduction performance as an accurate and low complexity approach for OFDM systems.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132458199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance evaluation of pre-computation algorithms for inter-domain QoS routing 域间QoS路由预计算算法的性能评价
Pub Date : 2011-05-08 DOI: 10.1109/CTS.2011.5898944
A. Frikha, S. Lahoud
Inter-domain QoS routing is a very challenging problem area. This problem combines the complexity of QoS routing, with the limitations of inter-domain routing, such as domain heterogeneity and information confidentiality. The pre-computation offers a very promising solution for addressing this problem. Although the pre-computation scheme has been investigated in several previous studies for a single routing domain, applying pre-computation on an inter-domain level is not straightforward and necessitates deeper investigation. In this work, we study different algorithms for QoS routing based on pre-computation. First, we investigate an exact algorithm. This algorithm provides an optimal solution for the QoS routing problem. However, its application in large scale networks is not always practical. Second, heuristic solutions are also investigated in this work. Particularly, a detailed study of the ID-MEFPA and the ID-PPPA heuristics is provided. Analytical studies and extensive simulations confirm that the exact algorithm achieves the best success rate, but has a very high computational complexity. The ID-MEFPA heuristic has a lower complexity and provides a success rate always close to the exact algorithm. When inter-domain connectivity is high, the ID-PPPA heuristic is the most appropriate with the lowest computation complexity and a success rate very close to the exact algorithm.
域间QoS路由是一个非常具有挑战性的问题领域。该问题结合了QoS路由的复杂性和域间路由的局限性,如域异构性和信息保密性。预计算为解决这个问题提供了一个非常有前途的解决方案。虽然之前的一些研究已经对单个路由域的预计算方案进行了研究,但是在域间级别上应用预计算并不简单,需要进行更深入的研究。在这项工作中,我们研究了基于预计算的不同QoS路由算法。首先,我们研究了一个精确的算法。该算法为QoS路由问题提供了最优解决方案。然而,它在大规模网络中的应用并不总是可行的。其次,本文还研究了启发式解决方案。特别对ID-MEFPA和ID-PPPA启发法进行了详细的研究。分析研究和大量的仿真结果表明,精确的算法达到了最佳的成功率,但具有很高的计算复杂度。ID-MEFPA启发式算法复杂度较低,成功率始终接近精确算法。当域间连通性较高时,ID-PPPA启发式算法计算复杂度最低,成功率非常接近精确算法,是最合适的算法。
{"title":"Performance evaluation of pre-computation algorithms for inter-domain QoS routing","authors":"A. Frikha, S. Lahoud","doi":"10.1109/CTS.2011.5898944","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898944","url":null,"abstract":"Inter-domain QoS routing is a very challenging problem area. This problem combines the complexity of QoS routing, with the limitations of inter-domain routing, such as domain heterogeneity and information confidentiality. The pre-computation offers a very promising solution for addressing this problem. Although the pre-computation scheme has been investigated in several previous studies for a single routing domain, applying pre-computation on an inter-domain level is not straightforward and necessitates deeper investigation. In this work, we study different algorithms for QoS routing based on pre-computation. First, we investigate an exact algorithm. This algorithm provides an optimal solution for the QoS routing problem. However, its application in large scale networks is not always practical. Second, heuristic solutions are also investigated in this work. Particularly, a detailed study of the ID-MEFPA and the ID-PPPA heuristics is provided. Analytical studies and extensive simulations confirm that the exact algorithm achieves the best success rate, but has a very high computational complexity. The ID-MEFPA heuristic has a lower complexity and provides a success rate always close to the exact algorithm. When inter-domain connectivity is high, the ID-PPPA heuristic is the most appropriate with the lowest computation complexity and a success rate very close to the exact algorithm.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"59 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129271572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An amendment to IEEE 802.17 (RPR) for wireless transport 针对无线传输的IEEE 802.17 (RPR)的修订
Pub Date : 2011-05-08 DOI: 10.1109/CTS.2011.5898966
S. Athanasiadou, G. Stamatelos
The Resilient Packet Ring (RPR) is a packet network technology designed to provide broadband traffic transport in a metropolitan area according to IEEE 802.17 specifications. Its advantages include flexibility in bandwidth allocation, fairness and traffic shaping criteria for the acceptance of elastic transit traffic, as well as highly reliable transport. Here we focus on possible future amendments to these specifications (such as inclusion of efficient coding / modulation schemes) that would allow RPRs to support reliably wireless traffic as well.
弹性分组环(RPR)是一种分组网络技术,旨在根据IEEE 802.17规范在城域网内提供宽带业务传输。它的优点包括带宽分配的灵活性、公平性和接受弹性传输流量的流量整形标准,以及传输的高可靠性。在这里,我们将重点关注这些规范未来可能的修订(例如包含有效的编码/调制方案),这些规范也将允许RPRs支持可靠的无线通信。
{"title":"An amendment to IEEE 802.17 (RPR) for wireless transport","authors":"S. Athanasiadou, G. Stamatelos","doi":"10.1109/CTS.2011.5898966","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898966","url":null,"abstract":"The Resilient Packet Ring (RPR) is a packet network technology designed to provide broadband traffic transport in a metropolitan area according to IEEE 802.17 specifications. Its advantages include flexibility in bandwidth allocation, fairness and traffic shaping criteria for the acceptance of elastic transit traffic, as well as highly reliable transport. Here we focus on possible future amendments to these specifications (such as inclusion of efficient coding / modulation schemes) that would allow RPRs to support reliably wireless traffic as well.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122550935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-line optimization and control of the buffer sizes in a cellular network communication system 蜂窝网络通信系统中缓冲区大小的在线优化与控制
Pub Date : 2011-05-08 DOI: 10.1109/CTS.2011.5898942
M. Markou, C. Panayiotou
Motivated by the cellular model paradigm, this paper develops a distributed on-line algorithm for determining the values of the control parameters (in this case, the buffer sizes) that optimize some predefined performance metrics of interest (e.g. average queue length, average loss probability). Stochastic Fluid Model (SFM) framework is adopted to model the queuing systems. Using this framework, we derive Infinitesimal Perturbation Analysis (IPA) estimates of the performance metrics of interest with respect to the control parameters. These estimates are shown to be unbiased which means that they can be used in a Stochastic Approximation (SA) based algorithm to drive the system to the optimal solution. Subsequently, these estimators are evaluated based on data observed from the sample path of the “real” system and used in the SA algorithm to dynamically control the buffer sizes in a distributed manner, allowing the network to work continuously at an optimal point. The correctness of the algorithm is verified through simulations using a network model of two tightly coupled nodes. The contribution of this paper is that it derives the fluid-based IPA algorithms for the specific communication network investigated, which can eventually lead to distributed protocols for controlling the buffer size of the nodes of a cellular network to optimize the overall network's performance.
在细胞模型范式的激励下,本文开发了一种分布式在线算法,用于确定控制参数(在这种情况下,缓冲区大小)的值,从而优化一些预定义的感兴趣的性能指标(例如,平均队列长度,平均损失概率)。采用随机流体模型(SFM)框架对排队系统进行建模。使用这个框架,我们推导出有关控制参数的性能指标的无穷小摄动分析(IPA)估计。这些估计被证明是无偏的,这意味着它们可以用于基于随机近似(SA)的算法来驱动系统到最优解。随后,根据从“真实”系统的样本路径中观察到的数据对这些估计量进行评估,并将其用于SA算法中,以分布式方式动态控制缓冲区大小,从而使网络在最优点连续工作。通过两个紧耦合节点的网络模型仿真,验证了算法的正确性。本文的贡献在于,它导出了针对所研究的特定通信网络的基于流体的IPA算法,最终可以导致用于控制蜂窝网络节点缓冲区大小的分布式协议,以优化整个网络的性能。
{"title":"On-line optimization and control of the buffer sizes in a cellular network communication system","authors":"M. Markou, C. Panayiotou","doi":"10.1109/CTS.2011.5898942","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898942","url":null,"abstract":"Motivated by the cellular model paradigm, this paper develops a distributed on-line algorithm for determining the values of the control parameters (in this case, the buffer sizes) that optimize some predefined performance metrics of interest (e.g. average queue length, average loss probability). Stochastic Fluid Model (SFM) framework is adopted to model the queuing systems. Using this framework, we derive Infinitesimal Perturbation Analysis (IPA) estimates of the performance metrics of interest with respect to the control parameters. These estimates are shown to be unbiased which means that they can be used in a Stochastic Approximation (SA) based algorithm to drive the system to the optimal solution. Subsequently, these estimators are evaluated based on data observed from the sample path of the “real” system and used in the SA algorithm to dynamically control the buffer sizes in a distributed manner, allowing the network to work continuously at an optimal point. The correctness of the algorithm is verified through simulations using a network model of two tightly coupled nodes. The contribution of this paper is that it derives the fluid-based IPA algorithms for the specific communication network investigated, which can eventually lead to distributed protocols for controlling the buffer size of the nodes of a cellular network to optimize the overall network's performance.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122674260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HomeWeb: An application framework for Web-based smart homes HomeWeb:基于web的智能家居的应用程序框架
Pub Date : 2011-05-08 DOI: 10.1109/CTS.2011.5898905
A. Kamilaris, V. Trifa, A. Pitsillides
Household appliances are being equipped with embedded micro-controllers and wireless transceivers, offering smart behavior. These augmented appliances form wireless networks and transform residential areas into smart homes. Advancements such as the effective penetration of the Internet in embedded computing and the promising practice of the Web of Things, allow the realization of Web-oriented smart homes. In a previous work, we developed a Web-based application framework for smart homes, supporting concurrent interaction from multiple family members. In this paper, we improve the functionality of our system by including a 6LoWPAN-based wireless sensor network inside the home environment, addressing issues such as device discovery and service description. Web techniques such as HTTP caching and push messaging, facilitate the efficient operation of a fully Web-based smart home. Through a technical evaluation, we show the benefits of directly Web-enabling embedded sensors in terms of performance and energy conservation. The development of a Web-based graphical application abstracts home automation procedure for typical residents.
家用电器正配备嵌入式微控制器和无线收发器,提供智能行为。这些增强的设备形成无线网络,将住宅区转变为智能家居。诸如互联网在嵌入式计算中的有效渗透和物联网的有前途的实践等进步,使面向网络的智能家居成为可能。在之前的工作中,我们为智能家居开发了一个基于web的应用框架,支持多个家庭成员的并发交互。在本文中,我们通过在家庭环境中包含一个基于6lowpan的无线传感器网络来改进系统的功能,解决诸如设备发现和服务描述等问题。HTTP缓存和推送消息等Web技术促进了完全基于Web的智能家居的高效运行。通过技术评估,我们展示了直接支持web的嵌入式传感器在性能和节能方面的好处。开发了一个基于web的图形化应用程序,抽象了典型居民的家庭自动化过程。
{"title":"HomeWeb: An application framework for Web-based smart homes","authors":"A. Kamilaris, V. Trifa, A. Pitsillides","doi":"10.1109/CTS.2011.5898905","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898905","url":null,"abstract":"Household appliances are being equipped with embedded micro-controllers and wireless transceivers, offering smart behavior. These augmented appliances form wireless networks and transform residential areas into smart homes. Advancements such as the effective penetration of the Internet in embedded computing and the promising practice of the Web of Things, allow the realization of Web-oriented smart homes. In a previous work, we developed a Web-based application framework for smart homes, supporting concurrent interaction from multiple family members. In this paper, we improve the functionality of our system by including a 6LoWPAN-based wireless sensor network inside the home environment, addressing issues such as device discovery and service description. Web techniques such as HTTP caching and push messaging, facilitate the efficient operation of a fully Web-based smart home. Through a technical evaluation, we show the benefits of directly Web-enabling embedded sensors in terms of performance and energy conservation. The development of a Web-based graphical application abstracts home automation procedure for typical residents.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132339029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
User dependent cryptography for security in future mobile telecommunication systems 未来移动通信系统中基于用户的安全加密技术
Pub Date : 2011-05-08 DOI: 10.1109/CTS.2011.5898962
Ahmad Sabouri, N. Komninos, C. Douligeris
In this paper we propose a user dependent scheme for enhancing security of the transmitted content in the future telecommunication systems. In order to achieve a higher level of security we introduce a scheme where the user identity gets involved in the encryption/decryption processes using an additional component for the block cipher which represents the user's behavioural model. Applying such a scheme, in addition to introducing more difficulties to an attacker due to the user dependency of the cipher algorithm, gives the mobile operator the opportunity to ensure that a licensed service has not been shared by the customer. To show the feasibility of our approach we use the concept of invertible Boolean functions as an example.
为了在未来的通信系统中提高传输内容的安全性,本文提出了一种与用户相关的方案。为了实现更高级别的安全性,我们引入了一种方案,其中用户身份参与加密/解密过程,使用代表用户行为模型的块密码的附加组件。应用这样的方案,除了由于用户对密码算法的依赖性而给攻击者带来更多困难之外,还使移动运营商有机会确保客户没有共享许可服务。为了证明我们的方法的可行性,我们使用可逆布尔函数的概念作为一个例子。
{"title":"User dependent cryptography for security in future mobile telecommunication systems","authors":"Ahmad Sabouri, N. Komninos, C. Douligeris","doi":"10.1109/CTS.2011.5898962","DOIUrl":"https://doi.org/10.1109/CTS.2011.5898962","url":null,"abstract":"In this paper we propose a user dependent scheme for enhancing security of the transmitted content in the future telecommunication systems. In order to achieve a higher level of security we introduce a scheme where the user identity gets involved in the encryption/decryption processes using an additional component for the block cipher which represents the user's behavioural model. Applying such a scheme, in addition to introducing more difficulties to an attacker due to the user dependency of the cipher algorithm, gives the mobile operator the opportunity to ensure that a licensed service has not been shared by the customer. To show the feasibility of our approach we use the concept of invertible Boolean functions as an example.","PeriodicalId":142306,"journal":{"name":"2011 18th International Conference on Telecommunications","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115600495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 18th International Conference on Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1