首页 > 最新文献

2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)最新文献

英文 中文
Measuring and characterising inbound sessions in residential DSL traffic 测量和表征住宅DSL流量中的入站会话
Pub Date : 2011-12-08 DOI: 10.1109/ATNAC.2011.6096628
S. Alcock, R. Nelson
It has been assumed that the need for successful NAT traversal discourages residential DSL users from running services or applications that require them to accept connections from remote hosts. However, there are now numerous approaches for NAT traversal but there have been no studies measuring the prevalence of DSL users accepting inbound sessions. This paper presents an analysis of TCP and UDP flows initiated by remote clients to a group of residential DSL users, using packet traces captured from a New Zealand ISP between 2009 and 2011. Our analysis reveals that over half of all measured users accepted at least one inbound TCP or UDP session. There was no dominant port being used to accept sessions and port usage was spread over thousands of different ports. Skype and BitTorrent were the most popular application protocols observed and had increased in popularity over time. We also report on the use of dual SYNs to perform TCP NAT traversal in our data.
人们一直认为,对成功的NAT穿越的需求阻碍了住宅DSL用户运行需要他们接受远程主机连接的服务或应用程序。然而,现在有许多NAT穿越的方法,但是没有研究测量DSL用户接受入站会话的流行程度。本文分析了由远程客户端向一组住宅DSL用户发起的TCP和UDP流,使用2009年至2011年间从新西兰ISP捕获的数据包跟踪。我们的分析显示,超过一半的测量用户接受至少一个入站TCP或UDP会话。没有用于接受会话的主导端口,端口的使用分布在数千个不同的端口上。Skype和bt是观察到的最受欢迎的应用程序协议,并且随着时间的推移越来越受欢迎。我们还报告了在数据中使用双syn来执行TCP NAT遍历的情况。
{"title":"Measuring and characterising inbound sessions in residential DSL traffic","authors":"S. Alcock, R. Nelson","doi":"10.1109/ATNAC.2011.6096628","DOIUrl":"https://doi.org/10.1109/ATNAC.2011.6096628","url":null,"abstract":"It has been assumed that the need for successful NAT traversal discourages residential DSL users from running services or applications that require them to accept connections from remote hosts. However, there are now numerous approaches for NAT traversal but there have been no studies measuring the prevalence of DSL users accepting inbound sessions. This paper presents an analysis of TCP and UDP flows initiated by remote clients to a group of residential DSL users, using packet traces captured from a New Zealand ISP between 2009 and 2011. Our analysis reveals that over half of all measured users accepted at least one inbound TCP or UDP session. There was no dominant port being used to accept sessions and port usage was spread over thousands of different ports. Skype and BitTorrent were the most popular application protocols observed and had increased in popularity over time. We also report on the use of dual SYNs to perform TCP NAT traversal in our data.","PeriodicalId":210916,"journal":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123052447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling Dynamic Topologies in communication networks 使能通信网络中的动态拓扑
Pub Date : 2011-12-08 DOI: 10.1109/ATNAC.2011.6096667
Abdelnour Aldraho, A. Kist
Energy efficiency has become an important focus in the context of networks as they are major energy users. For extended periods, resources consume energy, but are only lightly loaded. Dynamic Topologies is a concept where networks can adapt their topology to traffic load by disabling unused nodes and links. Previous work has demonstrated that such dynamic networks can reduce power consumption considerably. Traditional routing protocols are not suitable to implement such networks as rerouting would cause major disruptions to active traffic. This research project proposes a mechanism to alter network paths dynamically to enable changing topologies. It is based on Multi Protocol Label Switching (MPLS) methodology and proposes flow tracking to maintain transaction state. It causes minimal disruptions to active network connections. This paper discusses the underlying optimisation problem, proposes Dynamic Topologies using MPLS (DTM) and introduces simulation results that demonstrate the operation of the proposed scheme.
能源效率已成为网络环境下的一个重要焦点,因为它们是主要的能源用户。在较长一段时间内,资源消耗能源,但负载很轻。动态拓扑是一个概念,其中网络可以通过禁用未使用的节点和链路来调整其拓扑以适应流量负载。以前的工作已经证明,这种动态网络可以大大降低功耗。传统的路由协议不适合实现这样的网络,因为重路由会对活动流量造成重大干扰。本研究计划提出一种动态改变网络路径的机制,以实现拓扑结构的改变。它基于多协议标签交换(MPLS)方法,提出了流跟踪来维护事务状态。它对活动网络连接造成的中断最小。本文讨论了潜在的优化问题,提出了使用MPLS (DTM)的动态拓扑,并介绍了仿真结果,证明了所提方案的操作。
{"title":"Enabling Dynamic Topologies in communication networks","authors":"Abdelnour Aldraho, A. Kist","doi":"10.1109/ATNAC.2011.6096667","DOIUrl":"https://doi.org/10.1109/ATNAC.2011.6096667","url":null,"abstract":"Energy efficiency has become an important focus in the context of networks as they are major energy users. For extended periods, resources consume energy, but are only lightly loaded. Dynamic Topologies is a concept where networks can adapt their topology to traffic load by disabling unused nodes and links. Previous work has demonstrated that such dynamic networks can reduce power consumption considerably. Traditional routing protocols are not suitable to implement such networks as rerouting would cause major disruptions to active traffic. This research project proposes a mechanism to alter network paths dynamically to enable changing topologies. It is based on Multi Protocol Label Switching (MPLS) methodology and proposes flow tracking to maintain transaction state. It causes minimal disruptions to active network connections. This paper discusses the underlying optimisation problem, proposes Dynamic Topologies using MPLS (DTM) and introduces simulation results that demonstrate the operation of the proposed scheme.","PeriodicalId":210916,"journal":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121105533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The α-κ-µ Extreme distribution: Characterizing non-linear severe fading conditions α-κ-µ极值分布:表征非线性严重衰落条件
Pub Date : 2011-12-08 DOI: 10.1109/ATNAC.2011.6096660
P. Sofotasios, S. Freear
This paper presents the formulation and derivation of the α-κ-µ Extreme distribution. This is a fading model that is distinct for its capability to account for the characterization of mobile radio propagation under non-linear severe fading conditions. This capability results from the remarkable flexibility offered by its parameters. Closed-form expressions for the envelope and power probability density and distribution functions are derived and their validity is justified through extensive comparisons with numerical results. Notably, the algebraic representation of the derived expressions is shown to be quite convenient both analytically and numerically. Based on this, they can be considered useful mathematical tools which can be efficiently utilized in numerous studies related to the analytic performance evaluation of digital communications over non-linear severe fading conditions.
本文给出了α-κ-µ极值分布的公式和推导。这是一种衰落模型,其独特之处在于它能够解释非线性严重衰落条件下移动无线电传播的特征。这种能力源于其参数提供的显著灵活性。推导了包络和功率概率密度和分布函数的封闭表达式,并与数值结果进行了广泛的比较,证明了其有效性。值得注意的是,推导表达式的代数表示在解析和数值上都很方便。基于此,它们可以被认为是有用的数学工具,可以有效地用于与非线性严重衰落条件下数字通信分析性能评估相关的许多研究中。
{"title":"The α-κ-µ Extreme distribution: Characterizing non-linear severe fading conditions","authors":"P. Sofotasios, S. Freear","doi":"10.1109/ATNAC.2011.6096660","DOIUrl":"https://doi.org/10.1109/ATNAC.2011.6096660","url":null,"abstract":"This paper presents the formulation and derivation of the α-κ-µ Extreme distribution. This is a fading model that is distinct for its capability to account for the characterization of mobile radio propagation under non-linear severe fading conditions. This capability results from the remarkable flexibility offered by its parameters. Closed-form expressions for the envelope and power probability density and distribution functions are derived and their validity is justified through extensive comparisons with numerical results. Notably, the algebraic representation of the derived expressions is shown to be quite convenient both analytically and numerically. Based on this, they can be considered useful mathematical tools which can be efficiently utilized in numerous studies related to the analytic performance evaluation of digital communications over non-linear severe fading conditions.","PeriodicalId":210916,"journal":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114046479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
A survey on backbone formation algorithms for Wireless Sensor Networks: (A New Classification) 无线传感器网络骨干形成算法综述(一种新分类)
Pub Date : 2011-12-08 DOI: 10.1109/ATNAC.2011.6096632
R. Asgarnezhad, J. A. Torkestani
There is no physical backbone infrastructure in Wireless Sensor Networks and all nodes are energy constrained. A virtual backbone can be created by different algorithms to organize the node is a better way. A backbone is a subset of active nodes that are able to perform especial tasks and serve nodes which are not in the backbone. For stance, connected backbone nodes in networks can perform efficient routing and broadcasting. In this paper, we present and compare a classification of backbone formation algorithms. We survey different backbone formation algorithms.
无线传感器网络中没有物理骨干基础设施,所有节点都是能量受限的。创建虚拟骨干网可以通过不同的算法来组织节点是一种较好的方式。骨干是活动节点的子集,能够执行特殊任务并为不在骨干中的节点提供服务。例如,网络中连接的骨干节点可以进行高效的路由和广播。在本文中,我们提出并比较了一种分类的骨干形成算法。我们研究了不同的主干形成算法。
{"title":"A survey on backbone formation algorithms for Wireless Sensor Networks: (A New Classification)","authors":"R. Asgarnezhad, J. A. Torkestani","doi":"10.1109/ATNAC.2011.6096632","DOIUrl":"https://doi.org/10.1109/ATNAC.2011.6096632","url":null,"abstract":"There is no physical backbone infrastructure in Wireless Sensor Networks and all nodes are energy constrained. A virtual backbone can be created by different algorithms to organize the node is a better way. A backbone is a subset of active nodes that are able to perform especial tasks and serve nodes which are not in the backbone. For stance, connected backbone nodes in networks can perform efficient routing and broadcasting. In this paper, we present and compare a classification of backbone formation algorithms. We survey different backbone formation algorithms.","PeriodicalId":210916,"journal":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126437506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Green MPLS Traffic Engineering 绿色MPLS流量工程
Pub Date : 2011-12-08 DOI: 10.1109/ATNAC.2011.6096644
H. Chu, C. Cheung, Kin-Hon Ho, Ningzhi Wang
Conserving energy consumption in the Internet has attracted much attention in recent years. During the non-peak time in daily network operations, it is possible to put a subset of routers to sleep mode for energy conservation purposes without network performance deterioration. This paper proposes a practical green traffic engineering scheme called Greedy Green MPLS Traffic Engineering Scheme (GGMTES) to save energy in multi-protocol label switching (MPLS) networks. During the non-peak time, GGMTES arranges some routers into sleep mode to save energy and re-routes all traffic for load balancing with minimum re-configuration overhead. Our simulation results show that GGMTS can save up to 15% more energy than an existing approach without network performance deterioration.
近年来,在互联网上节约能源消耗引起了人们的广泛关注。在日常网络运行的非高峰时段,可以在不影响网络性能的情况下,将一部分路由器设置为休眠模式,以达到节能的目的。为了在多协议标签交换(MPLS)网络中节约能源,提出了一种实用的绿色流量工程方案——贪婪绿色MPLS流量工程方案(GGMTES)。在非高峰时段,GGMTES将部分路由器安排为休眠模式以节省能量,并将所有流量重新路由,以最小的重新配置开销实现负载均衡。仿真结果表明,在不降低网络性能的情况下,GGMTS比现有的方法节省了15%的能量。
{"title":"Green MPLS Traffic Engineering","authors":"H. Chu, C. Cheung, Kin-Hon Ho, Ningzhi Wang","doi":"10.1109/ATNAC.2011.6096644","DOIUrl":"https://doi.org/10.1109/ATNAC.2011.6096644","url":null,"abstract":"Conserving energy consumption in the Internet has attracted much attention in recent years. During the non-peak time in daily network operations, it is possible to put a subset of routers to sleep mode for energy conservation purposes without network performance deterioration. This paper proposes a practical green traffic engineering scheme called Greedy Green MPLS Traffic Engineering Scheme (GGMTES) to save energy in multi-protocol label switching (MPLS) networks. During the non-peak time, GGMTES arranges some routers into sleep mode to save energy and re-routes all traffic for load balancing with minimum re-configuration overhead. Our simulation results show that GGMTS can save up to 15% more energy than an existing approach without network performance deterioration.","PeriodicalId":210916,"journal":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Building dependable Next Generation Networks (NGNs): A new BlueGreen design philosophy 构建可靠的下一代网络(ngn):一种新的蓝绿设计理念
Pub Date : 2011-12-08 DOI: 10.1109/ATNAC.2011.6096669
William Liu, H. Sirisena, K. Pawlikowski
To compensate for the neglected aspect of service resilience in current green networking studies, this paper proposes a new BlueGreen network design philosophy for rethinking and redesigning network protocols and architectures to satisfy the criteria of being simultaneously service resilient, energy efficient and eco-friendly. Next Generation Networks (NGNs) are required to satisfy both extremely high levels of service resilience by means of network survivability mechanisms such as over provisioning of diversity and backup network resources (i.e., Blue criteria), as well as minimizing consumption of energy by switching off unused network resources as much as possible (i.e., Green criteria). There is an inherent contradiction involved in satisfying both these Blue and Green perspectives simultaneously. We model this challenging problem as a global optimization problem, where the network's working and backup components, and their energy consumption are considered as a resource, and the utilization is minimized while guaranteeing the required degrees of service resilience. The case studies presented confirm that the BlueGreen approach shows promise for integrating service resilience and energy efficiency in core networks to achieve specified BlueGreen targets.
为了弥补当前绿色网络研究中被忽视的服务弹性方面,本文提出了一种新的蓝绿网络设计理念,用于重新思考和重新设计网络协议和架构,以满足同时具有服务弹性、节能和环保的标准。下一代网络(ngn)需要通过网络生存机制(如过度提供多样性和备份网络资源(即蓝色标准))来满足极高水平的业务弹性,并通过尽可能关闭未使用的网络资源(即绿色标准)来最大限度地减少能源消耗。在同时满足这两种蓝色和绿色视角时,存在一种内在的矛盾。我们将这一具有挑战性的问题建模为全局优化问题,将网络的工作和备份组件及其能量消耗视为一种资源,在保证所需的服务弹性程度的同时最小化利用率。所提出的案例研究证实,蓝绿方案有望在核心网络中整合服务弹性和能源效率,以实现特定的蓝绿目标。
{"title":"Building dependable Next Generation Networks (NGNs): A new BlueGreen design philosophy","authors":"William Liu, H. Sirisena, K. Pawlikowski","doi":"10.1109/ATNAC.2011.6096669","DOIUrl":"https://doi.org/10.1109/ATNAC.2011.6096669","url":null,"abstract":"To compensate for the neglected aspect of service resilience in current green networking studies, this paper proposes a new BlueGreen network design philosophy for rethinking and redesigning network protocols and architectures to satisfy the criteria of being simultaneously service resilient, energy efficient and eco-friendly. Next Generation Networks (NGNs) are required to satisfy both extremely high levels of service resilience by means of network survivability mechanisms such as over provisioning of diversity and backup network resources (i.e., Blue criteria), as well as minimizing consumption of energy by switching off unused network resources as much as possible (i.e., Green criteria). There is an inherent contradiction involved in satisfying both these Blue and Green perspectives simultaneously. We model this challenging problem as a global optimization problem, where the network's working and backup components, and their energy consumption are considered as a resource, and the utilization is minimized while guaranteeing the required degrees of service resilience. The case studies presented confirm that the BlueGreen approach shows promise for integrating service resilience and energy efficiency in core networks to achieve specified BlueGreen targets.","PeriodicalId":210916,"journal":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116830691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A correlative study of cooperation enforcement mechanisms 合作执行机制的相关研究
Pub Date : 2011-12-08 DOI: 10.1109/ATNAC.2011.6096640
Smitha Shivshankar, Yaozhou Ma, A. Jamalipour
The exertion of adequate cooperation enforcement methods has been receiving booming attention during the last few years. With the emerging applications such as the P2P overlay network for file sharing, Mobile Ad Hoc Networks (MANETs) requiring nodes to forward packets on behalf of others, the emanating opportunistic networks and with the sprouting popularity of Mobile Social Networks, it is becoming important to maintain a well balanced cooperation among the users of the network. This paper contemplates some of the cooperation enforcement methods, providing a comprehensive comparison between the proposed schemes. The work also contributes towards the investigation of different models of cooperation enforcement systems and analyze why these systems cannot work from human perspective. The paper also discharges a beam to show how insights from economics, social science and game theory has been integrated to frame a cooperation enforcement model.
在过去几年中,充分运用合作执法方法受到了极大的关注。随着用于文件共享的P2P覆盖网络、要求节点转发数据包的移动自组织网络(manet)、机会主义网络的兴起以及移动社交网络的兴起,保持网络用户之间的良好平衡合作变得越来越重要。本文考虑了一些合作执行方法,并对所提出的方案进行了全面的比较。这项工作还有助于调查不同的合作执行系统模式,并分析为什么这些系统不能从人的角度出发。本文还展示了如何将经济学、社会科学和博弈论的见解整合到合作执行模型中。
{"title":"A correlative study of cooperation enforcement mechanisms","authors":"Smitha Shivshankar, Yaozhou Ma, A. Jamalipour","doi":"10.1109/ATNAC.2011.6096640","DOIUrl":"https://doi.org/10.1109/ATNAC.2011.6096640","url":null,"abstract":"The exertion of adequate cooperation enforcement methods has been receiving booming attention during the last few years. With the emerging applications such as the P2P overlay network for file sharing, Mobile Ad Hoc Networks (MANETs) requiring nodes to forward packets on behalf of others, the emanating opportunistic networks and with the sprouting popularity of Mobile Social Networks, it is becoming important to maintain a well balanced cooperation among the users of the network. This paper contemplates some of the cooperation enforcement methods, providing a comprehensive comparison between the proposed schemes. The work also contributes towards the investigation of different models of cooperation enforcement systems and analyze why these systems cannot work from human perspective. The paper also discharges a beam to show how insights from economics, social science and game theory has been integrated to frame a cooperation enforcement model.","PeriodicalId":210916,"journal":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127123359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The performance of blacklisting in ad hoc networks with unidirectional links 单向链路ad hoc网络中的黑名单性能
Pub Date : 2011-12-08 DOI: 10.1109/ATNAC.2011.6096634
Sankissa Jayasinghe
A potential application of ad hoc networks is their use by the military as tactical networks. Thus ad hoc networks will play an important role in future military networks. However, ad hoc networks are not without problems. One of these problems is that the routing protocols that have been designed for ad hoc networks assume bi directional links. This may not always be the case, and an ad hoc network may have uni directional links. This paper examines the performance of blacklisting, which is a routing protocol that has been designed for ad hoc networks with uni directional links. Computer simulation is used to ascertain the performance.
自组织网络的一个潜在应用是它们被军方用作战术网络。因此,自组织网络将在未来的军事网络中发挥重要作用。然而,自组织网络并非没有问题。其中一个问题是,为自组织网络设计的路由协议假设了双向链路。这种情况可能并不总是如此,并且自组织网络可能具有单向链接。黑名单是一种专为具有单向链路的自组织网络设计的路由协议,本文研究了它的性能。利用计算机模拟来确定其性能。
{"title":"The performance of blacklisting in ad hoc networks with unidirectional links","authors":"Sankissa Jayasinghe","doi":"10.1109/ATNAC.2011.6096634","DOIUrl":"https://doi.org/10.1109/ATNAC.2011.6096634","url":null,"abstract":"A potential application of ad hoc networks is their use by the military as tactical networks. Thus ad hoc networks will play an important role in future military networks. However, ad hoc networks are not without problems. One of these problems is that the routing protocols that have been designed for ad hoc networks assume bi directional links. This may not always be the case, and an ad hoc network may have uni directional links. This paper examines the performance of blacklisting, which is a routing protocol that has been designed for ad hoc networks with uni directional links. Computer simulation is used to ascertain the performance.","PeriodicalId":210916,"journal":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116727294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A geocasting technique in an IEEE802.11p based vehicular ad hoc network for road traffic management 基于IEEE802.11p的车辆自组织网络中的地理投射技术,用于道路交通管理
Pub Date : 2011-12-08 DOI: 10.1109/ATNAC.2011.6096639
M. Javed, J. Khan
In future, vehicular networks will play a crucial role in the development of intelligent road traffic systems. Vehicular network will enable cars to exchange crucial road traffic information among them as well as with the traffic signaling infrastructure. In an ad hoc vehicular network generally broadcasting technique is used to disseminate road traffic information. In an IEEE802.11p based vehicular network broadcasting technique could increase the contention level thus increasing information dissemination delay. In this paper we propose a geocasting packet transmission technique to transmit safety messages in a vehicular network which can significantly improve the QoS of a vehicular network. In this work OPNET based simulation models are used to analyze the performance of the proposed protocol. The proposed protocol performance is benchmarked against the standard packet broadcasting protocols proposed for vehicular networks.
未来,车联网将在智能道路交通系统的发展中发挥至关重要的作用。车辆网络将使车辆之间以及与交通信号基础设施交换关键的道路交通信息。在自组织车辆网络中,一般采用广播技术来传播道路交通信息。在基于IEEE802.11p的车载网络中,广播技术会增加争用级别,从而增加信息传播延迟。本文提出了一种在车载网络中传输安全信息的地理分组传输技术,可以显著提高车载网络的服务质量。在这项工作中,使用基于OPNET的仿真模型来分析所提出协议的性能。该协议的性能与车载网络的标准分组广播协议进行了基准测试。
{"title":"A geocasting technique in an IEEE802.11p based vehicular ad hoc network for road traffic management","authors":"M. Javed, J. Khan","doi":"10.1109/ATNAC.2011.6096639","DOIUrl":"https://doi.org/10.1109/ATNAC.2011.6096639","url":null,"abstract":"In future, vehicular networks will play a crucial role in the development of intelligent road traffic systems. Vehicular network will enable cars to exchange crucial road traffic information among them as well as with the traffic signaling infrastructure. In an ad hoc vehicular network generally broadcasting technique is used to disseminate road traffic information. In an IEEE802.11p based vehicular network broadcasting technique could increase the contention level thus increasing information dissemination delay. In this paper we propose a geocasting packet transmission technique to transmit safety messages in a vehicular network which can significantly improve the QoS of a vehicular network. In this work OPNET based simulation models are used to analyze the performance of the proposed protocol. The proposed protocol performance is benchmarked against the standard packet broadcasting protocols proposed for vehicular networks.","PeriodicalId":210916,"journal":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122427523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
On the second order statistical properties of Nakagami Hoyt mobile to mobile fading channel Nakagami Hoyt移动到移动衰落信道的二阶统计性质
Pub Date : 2011-12-08 DOI: 10.1109/ATNAC.2011.6096672
M. I. Akram, A. Sheikh
This paper presents second order statistical properties of the mobile to mobile Nakagami Hoyt (Nakagami-q) channel model. The spatial-time correlation function, the power spectral density (PSD), level crossing rate (LCR) and the average fade duration (AFD) of the Nakagami Hoyt channel have been derived under the assumption that both the transmitter and receiver are non-stationary. Design of simulator using the Inverse Fast Fourier Transform (IFFT) based computation method has been applied for this model. The simulator and analytical results have been corroborated.
本文给出了移动端到移动端Nakagami- Hoyt (Nakagami-q)信道模型的二阶统计性质。在发送端和接收端都是非平稳的假设下,导出了中川霍伊特信道的时空相关函数、功率谱密度(PSD)、平交率(LCR)和平均衰落持续时间(AFD)。该模型采用基于快速反傅立叶变换(IFFT)的计算方法设计了仿真器。仿真结果和分析结果均得到了验证。
{"title":"On the second order statistical properties of Nakagami Hoyt mobile to mobile fading channel","authors":"M. I. Akram, A. Sheikh","doi":"10.1109/ATNAC.2011.6096672","DOIUrl":"https://doi.org/10.1109/ATNAC.2011.6096672","url":null,"abstract":"This paper presents second order statistical properties of the mobile to mobile Nakagami Hoyt (Nakagami-q) channel model. The spatial-time correlation function, the power spectral density (PSD), level crossing rate (LCR) and the average fade duration (AFD) of the Nakagami Hoyt channel have been derived under the assumption that both the transmitter and receiver are non-stationary. Design of simulator using the Inverse Fast Fourier Transform (IFFT) based computation method has been applied for this model. The simulator and analytical results have been corroborated.","PeriodicalId":210916,"journal":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123842687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1