RFID is a key technology that can be used to create the pervasive society. The tag is an important part of the RFID system and most popular tags are some low-cost passive tags. These tags have limited computing and storing resources, and no more attentions are paid to their security and privacy. So the application of these tags is not secure. Lightweight authentication protocols are considered as an effective method to solve the security and privacy of low-cost RFID tags. We propose a novel lightweight authentication protocol by means of some functions provided by EPCglobal Class-1 Gen-2 tags. The protocol enhances the difficulty to reveal the tag’s secrecy by using the tag’s partial identifier to generate the session messages between the tag and the reader. The tag’s partial identifier is generated randomly for each authentication. Otherwise, the tag’s identifier is randomly divided into two separate parts so as to avoid colliding from the 16-bit cyclic redundancy coding function. Some random numbers, which are generated by the tag and the reader respectively, randomize the session messages between the tag and the reader so as to resist against tracing attack and replay attack. Our proposed protocol can assure forward security and it can resist against de-synchronized attack. This protocol only uses some lightweight functions and it is very suitable to low-cost RFID tags
{"title":"A Lightweight Authentication Protocol Based on Partial Identifier for EPCglobal Class-1 Gen-2 Tags","authors":"Zhicai Shi, Fei Wu, Yongxiang Xia, Yihan Wang, Jian Dai, Changzhi Wang","doi":"10.4304/jnw.10.6.369-375","DOIUrl":"https://doi.org/10.4304/jnw.10.6.369-375","url":null,"abstract":"RFID is a key technology that can be used to create the pervasive society. The tag is an important part of the RFID system and most popular tags are some low-cost passive tags. These tags have limited computing and storing resources, and no more attentions are paid to their security and privacy. So the application of these tags is not secure. Lightweight authentication protocols are considered as an effective method to solve the security and privacy of low-cost RFID tags. We propose a novel lightweight authentication protocol by means of some functions provided by EPCglobal Class-1 Gen-2 tags. The protocol enhances the difficulty to reveal the tag’s secrecy by using the tag’s partial identifier to generate the session messages between the tag and the reader. The tag’s partial identifier is generated randomly for each authentication. Otherwise, the tag’s identifier is randomly divided into two separate parts so as to avoid colliding from the 16-bit cyclic redundancy coding function. Some random numbers, which are generated by the tag and the reader respectively, randomize the session messages between the tag and the reader so as to resist against tracing attack and replay attack. Our proposed protocol can assure forward security and it can resist against de-synchronized attack. This protocol only uses some lightweight functions and it is very suitable to low-cost RFID tags","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"57 1","pages":"369-375"},"PeriodicalIF":0.0,"publicationDate":"2015-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74790379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-27DOI: 10.4304/jnw.10.5.302-310
Kun Xiao, Cailing Qin, C. Tan, Lili Liao, Chong Dang
We address the load balance, referred as “fairness” in our work, in the relay selection procedure of the dual hop decode-and-forward (DF) cooperative networks. Firstly, the unfairness caused by the known best-path relay selection (BRS) scheme is analyzed by the metric of blocking probability at the relays with equal relay channels. Secondly, aiming to improve the fairness while keeping a satisfied and comparable outage performance, we propose a fair relay selection algorithm based on mapping functions, including the signal to noise ratio (SNR) mapping functions and load mapping functions. It is worth mentioning that BRS scheme can be viewed as a special case of the proposed algorithm. Afterwards, the outage probability of the proposed algorithm is derived. During the derivation, the mixture Gamma distribution is used to model SNRs of wireless fading channels, so this kind of derivation is valid for different fading channels, e.g. Rayleigh, Nakagami-m etc.. Finally, taking the average load and outage probability as performance metrics, we simulated the proposed algorithm and compared it with the proportional fair cooperation (PFC) algorithm in the literature. As observed in the simulation results, the proposed algorithm guarantees fairness well among the relays, especially when the network is heavily burdened
{"title":"A Fair Relay Selection Based on Mapping Functions in the Dual Hop DF Cooperative Networks","authors":"Kun Xiao, Cailing Qin, C. Tan, Lili Liao, Chong Dang","doi":"10.4304/jnw.10.5.302-310","DOIUrl":"https://doi.org/10.4304/jnw.10.5.302-310","url":null,"abstract":"We address the load balance, referred as “fairness” in our work, in the relay selection procedure of the dual hop decode-and-forward (DF) cooperative networks. Firstly, the unfairness caused by the known best-path relay selection (BRS) scheme is analyzed by the metric of blocking probability at the relays with equal relay channels. Secondly, aiming to improve the fairness while keeping a satisfied and comparable outage performance, we propose a fair relay selection algorithm based on mapping functions, including the signal to noise ratio (SNR) mapping functions and load mapping functions. It is worth mentioning that BRS scheme can be viewed as a special case of the proposed algorithm. Afterwards, the outage probability of the proposed algorithm is derived. During the derivation, the mixture Gamma distribution is used to model SNRs of wireless fading channels, so this kind of derivation is valid for different fading channels, e.g. Rayleigh, Nakagami-m etc.. Finally, taking the average load and outage probability as performance metrics, we simulated the proposed algorithm and compared it with the proportional fair cooperation (PFC) algorithm in the literature. As observed in the simulation results, the proposed algorithm guarantees fairness well among the relays, especially when the network is heavily burdened","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"95 1","pages":"302-310"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73141193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-27DOI: 10.4304/jnw.10.5.273-280
Y. Jararweh, H. Ababneh, M. Alhammouri, L. Tawalbeh
Energy efficiency is a major issue in Cloud computing infrastructure. The large power consumption is mainly attributed to the large number of modern data centers operating within. Developing these data centers includes dynamically expanding their infrastructures to meet the ever-increasing demand for huge computation, large storage, and massive communication. Energy conservation through optimization of resources and management policies in the Cloud are a viable solution. Using virtualization to save power and employing such practices as using Virtual Machines (VMs), Server Consolidation, and VM Live Migration. This paper investigates the opportunities for Green Cloud Computing (GCC) to obtain a more comprehensive prospect towards achieving energy efficient Cloud Computing, and presents an energy efficient network resources management approach in an Infrastructure as a Service (IaaS) Cloud model. We focus on developing an energy efficient algorithm by proposing a practical multi-level Cloud Resource-Network Management (CRNM) algorithm, which is implemented in a virtual Cloud environment using Snooze framework as the Cloud energy efficiency manager. The optimization focuses on the utilization of network bandwidth as main resource under test, while also taking into account the other resources, such as CPU and memory, to get the desired performance. We choose a fat tree topology as a common three tier architecture for Cloud data canters. We conclude that our proposed algorithm will save up to 75% of power consumption in Cloud data centers, with an observed increase in efficiency compared to Non-Power Aware (NPA), Power aware(PA), and Greedy algorithms, where network elements consume about 30% of the total power of Cloud data centers.
{"title":"Energy Efficient Multi-Level Network Resources Management in Cloud Computing Data Centers","authors":"Y. Jararweh, H. Ababneh, M. Alhammouri, L. Tawalbeh","doi":"10.4304/jnw.10.5.273-280","DOIUrl":"https://doi.org/10.4304/jnw.10.5.273-280","url":null,"abstract":"Energy efficiency is a major issue in Cloud computing infrastructure. The large power consumption is mainly attributed to the large number of modern data centers operating within. Developing these data centers includes dynamically expanding their infrastructures to meet the ever-increasing demand for huge computation, large storage, and massive communication. Energy conservation through optimization of resources and management policies in the Cloud are a viable solution. Using virtualization to save power and employing such practices as using Virtual Machines (VMs), Server Consolidation, and VM Live Migration. This paper investigates the opportunities for Green Cloud Computing (GCC) to obtain a more comprehensive prospect towards achieving energy efficient Cloud Computing, and presents an energy efficient network resources management approach in an Infrastructure as a Service (IaaS) Cloud model. We focus on developing an energy efficient algorithm by proposing a practical multi-level Cloud Resource-Network Management (CRNM) algorithm, which is implemented in a virtual Cloud environment using Snooze framework as the Cloud energy efficiency manager. The optimization focuses on the utilization of network bandwidth as main resource under test, while also taking into account the other resources, such as CPU and memory, to get the desired performance. We choose a fat tree topology as a common three tier architecture for Cloud data canters. We conclude that our proposed algorithm will save up to 75% of power consumption in Cloud data centers, with an observed increase in efficiency compared to Non-Power Aware (NPA), Power aware(PA), and Greedy algorithms, where network elements consume about 30% of the total power of Cloud data centers.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"45 1","pages":"273-280"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85108690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-27DOI: 10.4304/jnw.10.5.322-327
Pakawat Pupatwibul, Ameen Banjar, A. A. Sabbagh, R. Braun
Several Simulation and emulation tools such as the OMNeT++ INET Framework and Mininet have been developed to evaluate the performance of Software-Defined Networking (SDN). A major challenge is how to analyse the obtained performance results of data transmission for these tools. These challenges include scaling to large networks, testing the correctness and evaluating the performance with the ability to easily migrate to a real system with minimal changes for deployment. Current methods for testing the functions and evaluating the performances of SDN include new programming languages, static analysis and debugging capability, and innovative frameworks of simulation tools. In this paper, we describe the implementation model of OpenFlow system in the INET framework for OMNeT++. The simulation approaches were designed for prototyping and evaluating new SDN-based applications accurately at low cost, while being flexible, scalable, controllable, and accessible to many users. We describe the design and the use of the simulation modules, and demonstrate its capability by carrying out a series of experiments. In addition, we compare the OpenFlow functions of OMNeT++ simulator with the popular Mininet emulator in identical traffic configurations. The measurement results derived from both tools show that they are correct, accurate, and repeatable regarding their capabilities, performance, and functionalities
{"title":"A Comparative Review: Accurate OpenFlow Simulation Tools for Prototyping","authors":"Pakawat Pupatwibul, Ameen Banjar, A. A. Sabbagh, R. Braun","doi":"10.4304/jnw.10.5.322-327","DOIUrl":"https://doi.org/10.4304/jnw.10.5.322-327","url":null,"abstract":"Several Simulation and emulation tools such as the OMNeT++ INET Framework and Mininet have been developed to evaluate the performance of Software-Defined Networking (SDN). A major challenge is how to analyse the obtained performance results of data transmission for these tools. These challenges include scaling to large networks, testing the correctness and evaluating the performance with the ability to easily migrate to a real system with minimal changes for deployment. Current methods for testing the functions and evaluating the performances of SDN include new programming languages, static analysis and debugging capability, and innovative frameworks of simulation tools. In this paper, we describe the implementation model of OpenFlow system in the INET framework for OMNeT++. The simulation approaches were designed for prototyping and evaluating new SDN-based applications accurately at low cost, while being flexible, scalable, controllable, and accessible to many users. We describe the design and the use of the simulation modules, and demonstrate its capability by carrying out a series of experiments. In addition, we compare the OpenFlow functions of OMNeT++ simulator with the popular Mininet emulator in identical traffic configurations. The measurement results derived from both tools show that they are correct, accurate, and repeatable regarding their capabilities, performance, and functionalities","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"17 1","pages":"322-327"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73245884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-27DOI: 10.4304/jnw.10.5.311-321
M. Tariq, M. Latif, M. Ayaz, Yahaya Coulibaly, Nadera Al-Areqi
The distinctive features of Underwater Acoustic Sensor Networks (UW-ASN) such as high propagation delay, asymmetric channels, high errors rates and limited bandwidth cause significant issues due to the use of acoustic medium as a method of communication. Therefore, designing an efficient underwater protocol that make efficient use of available battery resources and provides reliability in unreliable acoustic environment is a challenging task. In this paper, we therefore present a distance based reliable and energy efficient routing protocol (DREE). The contribution in this routing protocol is twofold 1) DREE actually takes in to account physical distance unlike similar protocol R-ERP 2 R where physical distance has not been utilized 2) DREE utilizes Fuzzy logic based link Quality Estimator (F-LQE) which has not been put on the test before in underwater networks. Moreover, DREE extends network lifetime not only by providing energy balancing but by reducing number of transmissions required to deliver a packet successfully. Experiments performed in NS2 simulator prove that DREE contributes to improve results in comparison with R-ERP 2 R which is the similar and only distance based reliable protocol present in literature and well known depth based routing protocol DBR
{"title":"Distance based Reliable and Energy Efficient (DREE) Routing Protocol for Underwater Acoustic Sensor Networks","authors":"M. Tariq, M. Latif, M. Ayaz, Yahaya Coulibaly, Nadera Al-Areqi","doi":"10.4304/jnw.10.5.311-321","DOIUrl":"https://doi.org/10.4304/jnw.10.5.311-321","url":null,"abstract":"The distinctive features of Underwater Acoustic Sensor Networks (UW-ASN) such as high propagation delay, asymmetric channels, high errors rates and limited bandwidth cause significant issues due to the use of acoustic medium as a method of communication. Therefore, designing an efficient underwater protocol that make efficient use of available battery resources and provides reliability in unreliable acoustic environment is a challenging task. In this paper, we therefore present a distance based reliable and energy efficient routing protocol (DREE). The contribution in this routing protocol is twofold 1) DREE actually takes in to account physical distance unlike similar protocol R-ERP 2 R where physical distance has not been utilized 2) DREE utilizes Fuzzy logic based link Quality Estimator (F-LQE) which has not been put on the test before in underwater networks. Moreover, DREE extends network lifetime not only by providing energy balancing but by reducing number of transmissions required to deliver a packet successfully. Experiments performed in NS2 simulator prove that DREE contributes to improve results in comparison with R-ERP 2 R which is the similar and only distance based reliable protocol present in literature and well known depth based routing protocol DBR","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"31 1","pages":"311-321"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90688335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-27DOI: 10.4304/JNW.10.5.287-293
Anchit Bijalwan, M. Wazid, E. Pilli, R. Joshi
Internet has great impact on various facets of everyone’s life. With the enormous advantage Internet provides to users all around the world, it has some inherent weaknesses because of the protocol stack on which it is built. It can be easily attacked by attackers who exploit the vulnerabilities in the protocols and compromise systems and remotely control them to do further damage. Major attacks are focused on confidentiality, integrity and availability of data or resources. Flooding attack is one such resource availability attack which is a great cause of concern. Hackers can use the flooding attacks and cause Distributed Denial of Service (DDoS) attack with ease. With the increase and variations in the attack mode makes the investigation of these attacks essential. Random-UDP flooding attack is a different type of attack in which the attacker sends multiple UDP datagrams of different sizes at a time. This causes denial of service to the system and its resources. In this paper, we have proposed a technique for the forensics of Random-UDP flooding attack. We have tried to get as close as possible to the source of such attacks. The proposed technique is capable to identify the source of Random-UDP flooding bot attack.
{"title":"Forensics of Random-UDP Flooding Attacks","authors":"Anchit Bijalwan, M. Wazid, E. Pilli, R. Joshi","doi":"10.4304/JNW.10.5.287-293","DOIUrl":"https://doi.org/10.4304/JNW.10.5.287-293","url":null,"abstract":"Internet has great impact on various facets of everyone’s life. With the enormous advantage Internet provides to users all around the world, it has some inherent weaknesses because of the protocol stack on which it is built. It can be easily attacked by attackers who exploit the vulnerabilities in the protocols and compromise systems and remotely control them to do further damage. Major attacks are focused on confidentiality, integrity and availability of data or resources. Flooding attack is one such resource availability attack which is a great cause of concern. Hackers can use the flooding attacks and cause Distributed Denial of Service (DDoS) attack with ease. With the increase and variations in the attack mode makes the investigation of these attacks essential. Random-UDP flooding attack is a different type of attack in which the attacker sends multiple UDP datagrams of different sizes at a time. This causes denial of service to the system and its resources. In this paper, we have proposed a technique for the forensics of Random-UDP flooding attack. We have tried to get as close as possible to the source of such attacks. The proposed technique is capable to identify the source of Random-UDP flooding bot attack.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"183 1","pages":"287-293"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80433633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-27DOI: 10.4304/jnw.10.5.281-286
Abdelkarim Taam, Hjiaj Hassane, S. E. Ouatik, M. Oumsis, B. Raouyane
“Advance procedure for resource reservation QoSNSLP Signaling based” By TAAM Abdelkarim, HJIAJ Hassane, Said El Alaoui Oua Stiikg,n OalUinMg SbIaSs eMdo”h amed, RAOUYANE Brahim Journal of Networks Volume 10, Number 5, May 2015, Page(s): 281-286 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, the above paper has been found to be in violation of Academy Publisher’s Publication Principles. The first author (TAAM Abdelkarim) has taken full responsibility and this violation was done without the knowledge of the rest authors (HJIAJ Hassane, Said El Alaoui Oua Stiikg,n OalUinMg SbIaSs eMdo”h amed, RAOUYANE Brahim). This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original authors and/or paper title) and without permission: Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: Badr Benmammar, Francine Krief, “MQoS NSLP: a mobility profile management based approach for advance resource reservation in a mobile environment,” 7th IFIP IEEE International Conference on Mobile and Wireless Communications Networks (MWCN 2005) , Marrakech, Morocco, 2005.
作者:TAAM Abdelkarim, HJIAJ Hassane, Said El Alaoui Oua Stiikg,n oaluing mg SbIaSs eMdo, raouane Brahim Journal of Networks卷10,第5期,2015年5月,第(s)页:281-286经正式成立的专家委员会对本文的内容和作者身份进行仔细和仔细的审查,发现上述论文违反了学院出版出版原则。第一作者(TAAM Abdelkarim)已经承担了全部责任,并且在其他作者(HJIAJ Hassane, Said El Alaoui Oua Stiikg, oaluing mg SbIaSs eMdo, RAOUYANE Brahim)不知情的情况下进行了这种违规行为。这篇论文包含了下面引用的论文的重要部分原文。未经许可擅自复制原文,未注明出处(包括对原作者和/或论文标题的适当引用)。由于这一违规行为的性质,应尽合理努力删除过去对本文的所有引用,未来应引用以下文章:Badr benmamar, Francine Krief,“MQoS NSLP:移动环境中基于移动配置文件管理的预先资源预约方法,”第七届IFIP IEEE移动和无线通信网络国际会议(MWCN 2005),马拉喀什,摩洛哥,2005。
{"title":"Advance procedure for resource reservation QoSNSLP Signaling based","authors":"Abdelkarim Taam, Hjiaj Hassane, S. E. Ouatik, M. Oumsis, B. Raouyane","doi":"10.4304/jnw.10.5.281-286","DOIUrl":"https://doi.org/10.4304/jnw.10.5.281-286","url":null,"abstract":"“Advance procedure for resource reservation QoSNSLP Signaling based” By TAAM Abdelkarim, HJIAJ Hassane, Said El Alaoui Oua Stiikg,n OalUinMg SbIaSs eMdo”h amed, RAOUYANE Brahim Journal of Networks Volume 10, Number 5, May 2015, Page(s): 281-286 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, the above paper has been found to be in violation of Academy Publisher’s Publication Principles. The first author (TAAM Abdelkarim) has taken full responsibility and this violation was done without the knowledge of the rest authors (HJIAJ Hassane, Said El Alaoui Oua Stiikg,n OalUinMg SbIaSs eMdo”h amed, RAOUYANE Brahim). This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original authors and/or paper title) and without permission: Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: Badr Benmammar, Francine Krief, “MQoS NSLP: a mobility profile management based approach for advance resource reservation in a mobile environment,” 7th IFIP IEEE International Conference on Mobile and Wireless Communications Networks (MWCN 2005) , Marrakech, Morocco, 2005.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"281-286"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89699311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-27DOI: 10.4304/jnw.10.5.294-301
Nirmala Sivaraj, P. Palanisamy
Aiming to cope up with relentless wireless traffic and improving link quality against high wall penetration loss, Third Generation Partnership Project proposed the heterogeneous deployment of low power indoor hot spots such as Femtocell Access Points (FAPs) over the existing cellular network topology. In this two-tier heterogeneous network (HetNet) where femtocells coexist with macrocell, the FAPs may spatially reuse the spectrum assigned to macrocell base station in an unplanned way and the mitigation of the generated co-channel interference becomes a major challenge. The problem is more severe with FAPs operating in a closed access mode, particularly in urban and sub-urban environment. In this work, the impact of interference in downlink on quality of service to macro user and femto user is analyzed by modeling the Signal-to-Interference and Noise Ratio and achieved user throughput. Simulation results show significant reduction of achieved user throughput and creation of coverage holes because of interference. It is clear that the performance of restricted access FAPs under co-channel operation need to be explicitly accounted for and optimized against both cross-tier and co-tier interference
第三代合作伙伴计划(Third Generation Partnership Project)提出了在现有蜂窝网络拓扑结构上异构部署Femtocell Access point (FAPs)等低功耗室内热点,以应对持续不断的无线流量和提高高墙透损的链路质量。在这种飞蜂窝与宏蜂窝共存的两层异构网络(HetNet)中,fap可能会以计划外的方式在空间上重用分配给宏蜂窝基站的频谱,从而减轻产生的同信道干扰成为一个主要挑战。在封闭存取模式下,特别是在城市和城郊环境中,FAPs的问题更为严重。本文通过对宏用户和femto用户的信噪比和实现的用户吞吐量建模,分析了下行链路干扰对宏用户和femto用户服务质量的影响。仿真结果表明,干扰显著降低了用户吞吐量,并造成了覆盖空洞。很明显,在同信道操作下限制接入fap的性能需要明确地考虑和优化跨层和同层干扰
{"title":"Downlink Interference Analysis in LTE-Femtocell Networks","authors":"Nirmala Sivaraj, P. Palanisamy","doi":"10.4304/jnw.10.5.294-301","DOIUrl":"https://doi.org/10.4304/jnw.10.5.294-301","url":null,"abstract":"Aiming to cope up with relentless wireless traffic and improving link quality against high wall penetration loss, Third Generation Partnership Project proposed the heterogeneous deployment of low power indoor hot spots such as Femtocell Access Points (FAPs) over the existing cellular network topology. In this two-tier heterogeneous network (HetNet) where femtocells coexist with macrocell, the FAPs may spatially reuse the spectrum assigned to macrocell base station in an unplanned way and the mitigation of the generated co-channel interference becomes a major challenge. The problem is more severe with FAPs operating in a closed access mode, particularly in urban and sub-urban environment. In this work, the impact of interference in downlink on quality of service to macro user and femto user is analyzed by modeling the Signal-to-Interference and Noise Ratio and achieved user throughput. Simulation results show significant reduction of achieved user throughput and creation of coverage holes because of interference. It is clear that the performance of restricted access FAPs under co-channel operation need to be explicitly accounted for and optimized against both cross-tier and co-tier interference","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"274 1","pages":"294-301"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80008810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-14DOI: 10.4304/jnw.10.4.188-200
Torsten M. Runge, Daniel Raumer, F. Wohlfart, B. Wolfinger, G. Carle
Network devices based on commodity hardware are capable of high-speed packet processing while maintaining the programmability and extensibility of software. Thus, software-based network devices, like software routers, software-based firewalls, or monitoring systems, constitute a cost-efficient and flexible alternative to expensive, special purpose hardware. The overall packet processing performance in resource-constrained nodes can be strongly increased through parallel processing based on off-theshelf multi-core processors. However, synchronization and coordination of parallel processing may counteract the corresponding network node performance. We describe how multi-core software routers can be optimized for real-time traffic by utilizing the technologies available in commodity hardware. Furthermore, we propose a low latency extension for the Linux NAPI. For the analysis, we use our approach for modeling resource contention in resource-constrained nodes which is also implemented as a resource-management extension module for ns-3. Based on that, we derive a QoSaware software router model which we use to evaluate our performance optimizations. Our case study shows that the different scheduling strategies of a software router have significant influence on the performance of handling realtime traffic.
{"title":"Towards Low Latency Software Routers","authors":"Torsten M. Runge, Daniel Raumer, F. Wohlfart, B. Wolfinger, G. Carle","doi":"10.4304/jnw.10.4.188-200","DOIUrl":"https://doi.org/10.4304/jnw.10.4.188-200","url":null,"abstract":"Network devices based on commodity hardware are capable of high-speed packet processing while maintaining the programmability and extensibility of software. Thus, software-based network devices, like software routers, software-based firewalls, or monitoring systems, constitute a cost-efficient and flexible alternative to expensive, special purpose hardware. The overall packet processing performance in resource-constrained nodes can be strongly increased through parallel processing based on off-theshelf multi-core processors. However, synchronization and coordination of parallel processing may counteract the corresponding network node performance. We describe how multi-core software routers can be optimized for real-time traffic by utilizing the technologies available in commodity hardware. Furthermore, we propose a low latency extension for the Linux NAPI. For the analysis, we use our approach for modeling resource contention in resource-constrained nodes which is also implemented as a resource-management extension module for ns-3. Based on that, we derive a QoSaware software router model which we use to evaluate our performance optimizations. Our case study shows that the different scheduling strategies of a software router have significant influence on the performance of handling realtime traffic.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"173 1","pages":"188-200"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77290626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-14DOI: 10.4304/jnw.10.4.209-221
M. Gai, A. Azadmanesh, A. Rezaeian
This study presents a hybrid approach to indoor object detection and tracking. A test area is partitioned into regions that are covered by sensors placed on the ceilings. The region location of an object is determined by these sensors using RSSI. The region determination is then followed by the exact localization of the object within the region using Building Information Modeling (BIM) and the 3D stereo image measurements. To determine the coverage ratio of a region for better placement of sensors, the 3D space is partitioned into 2D planes whose coverage points are determined by a newly developed software product called LOCOPac. Other than indoor localization, some simulation results of sensor distribution algorithms that are more suitable for outdoor applications will also be presented. Based on the experimental and simulation results, the proposed approach to indoor localization and LOCOPac has the potential to be used for real world applications.
{"title":"A Hybrid Approach to Indoor Sensor Area Localization and Coverage","authors":"M. Gai, A. Azadmanesh, A. Rezaeian","doi":"10.4304/jnw.10.4.209-221","DOIUrl":"https://doi.org/10.4304/jnw.10.4.209-221","url":null,"abstract":"This study presents a hybrid approach to indoor object detection and tracking. A test area is partitioned into regions that are covered by sensors placed on the ceilings. The region location of an object is determined by these sensors using RSSI. The region determination is then followed by the exact localization of the object within the region using Building Information Modeling (BIM) and the 3D stereo image measurements. To determine the coverage ratio of a region for better placement of sensors, the 3D space is partitioned into 2D planes whose coverage points are determined by a newly developed software product called LOCOPac. Other than indoor localization, some simulation results of sensor distribution algorithms that are more suitable for outdoor applications will also be presented. Based on the experimental and simulation results, the proposed approach to indoor localization and LOCOPac has the potential to be used for real world applications.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"62 1","pages":"209-221"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73503021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}