The paper concerns the minimization of the average delay of packets in the computer network. The formulated problem is NP complete. The authors proposed a solution that may be reachable in satisfying time using heuristic methods. Authors take into consideration the proposed algorithms which are based on ideas such as simulated annealing, taboo search and genetic approach. In order to compare performance of these methods the experimentation system has been made. This system was implemented in C++ and Borland builder 6.0 programming environment. The created application allows to make investigations along with the complex experiments showing the current state of network and the obtained results in convenient way by utilizing visualization module and presentation module. The results of example research are shown and discussed.
{"title":"Comparison of Heuristic Methods Applied to Optimization of Computer Networks","authors":"K. Lenarski, A. Kasprzak, I. Pozniak-Koszalka","doi":"10.1109/ICN.2008.81","DOIUrl":"https://doi.org/10.1109/ICN.2008.81","url":null,"abstract":"The paper concerns the minimization of the average delay of packets in the computer network. The formulated problem is NP complete. The authors proposed a solution that may be reachable in satisfying time using heuristic methods. Authors take into consideration the proposed algorithms which are based on ideas such as simulated annealing, taboo search and genetic approach. In order to compare performance of these methods the experimentation system has been made. This system was implemented in C++ and Borland builder 6.0 programming environment. The created application allows to make investigations along with the complex experiments showing the current state of network and the obtained results in convenient way by utilizing visualization module and presentation module. The results of example research are shown and discussed.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Vanhaverbeke, M. Moeneclaey, K. Laevens, N. Degrande, D. D. Vleeschauwer
We examine the efficiency of two FEC strategies for the protection of HDTV video packets transmitted at variable bit rate. The first FEC strategy pursues packet protection by means of a fixed Reed-Solomon code. The second strategy encodes a set of packets within a fixed time frame resulting in Reed-Solomon codes of variable length. We quantify the performance of both strategies for a representative movie where the HDTV video packets are transmitted at variable bit rate over a channel that is subjected to independent errors and error bursts.
{"title":"Comparison of Two Forward Error Correction Approaches for Packet Protection in HDTV with Variable Bit Rate Transmission","authors":"F. Vanhaverbeke, M. Moeneclaey, K. Laevens, N. Degrande, D. D. Vleeschauwer","doi":"10.1109/ICN.2008.74","DOIUrl":"https://doi.org/10.1109/ICN.2008.74","url":null,"abstract":"We examine the efficiency of two FEC strategies for the protection of HDTV video packets transmitted at variable bit rate. The first FEC strategy pursues packet protection by means of a fixed Reed-Solomon code. The second strategy encodes a set of packets within a fixed time frame resulting in Reed-Solomon codes of variable length. We quantify the performance of both strategies for a representative movie where the HDTV video packets are transmitted at variable bit rate over a channel that is subjected to independent errors and error bursts.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131438390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Thepvilojanapong, S. Motegi, A. Idoue, H. Horiuchi
Personal healthcare is a promising market of a personal area network (PAN). The PAN consists of a data collector and multiple wearable sensors which must send data to the collector according to the frequency specified by each PAN. The data collector may be any hand-held or portable device, e.g., a mobile phone, a PDA, or a wristwatch. An individual user needs a PAN in order to detect, track, or manage his/her health. Multiple PANs for such purposes are likely to coexist in a same area, especially a place where a large number of users exist. Because multiple PANs must share resources (e.g., wireless channels, transmitting time) in this scenario, a problem of packet collisions among such PANs is unavoidable. As a result, the personal healthcare system using PAN cannot be provided as a service for the users because the data collector cannot collect sensing data from each sensor correctly. This paper proposes an adaptive scheme to allocate resources for coexisting PANs. The scheme distinguishes a PAN and a node when allocating resources such as wireless channel and transmitting time. Resources are dynamically allocated according to the current number of PANs that exist in the same area. In particular, the proposed scheme automatically reallocates resources when any PANs come into or leave from the coexisting area. As one of salient features, the scheme allocates transmitting time to meet a requirement on reporting interval determined by an application. Thus applications that are sensitive to delay can collect sensing data correctly and in time. The evaluation results show that our scheme achieves higher packet delivery rate than the standard ZigBee.
{"title":"Resource Allocation for Coexisting ZigBee-Based Personal Area Networks","authors":"N. Thepvilojanapong, S. Motegi, A. Idoue, H. Horiuchi","doi":"10.1109/ICN.2008.29","DOIUrl":"https://doi.org/10.1109/ICN.2008.29","url":null,"abstract":"Personal healthcare is a promising market of a personal area network (PAN). The PAN consists of a data collector and multiple wearable sensors which must send data to the collector according to the frequency specified by each PAN. The data collector may be any hand-held or portable device, e.g., a mobile phone, a PDA, or a wristwatch. An individual user needs a PAN in order to detect, track, or manage his/her health. Multiple PANs for such purposes are likely to coexist in a same area, especially a place where a large number of users exist. Because multiple PANs must share resources (e.g., wireless channels, transmitting time) in this scenario, a problem of packet collisions among such PANs is unavoidable. As a result, the personal healthcare system using PAN cannot be provided as a service for the users because the data collector cannot collect sensing data from each sensor correctly. This paper proposes an adaptive scheme to allocate resources for coexisting PANs. The scheme distinguishes a PAN and a node when allocating resources such as wireless channel and transmitting time. Resources are dynamically allocated according to the current number of PANs that exist in the same area. In particular, the proposed scheme automatically reallocates resources when any PANs come into or leave from the coexisting area. As one of salient features, the scheme allocates transmitting time to meet a requirement on reporting interval determined by an application. Thus applications that are sensitive to delay can collect sensing data correctly and in time. The evaluation results show that our scheme achieves higher packet delivery rate than the standard ZigBee.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose a new evaluation approach to evaluate the service scalability of network architectures, that aims to study service scalability of network architectures in current Internet architecture and help evaluate designs of next generation Internet (NGI). The key idea is to measure existing network services using the concept of service utility. While service utility indicates whether service deployed in network can get good achievement which considers the index of user satisfaction in network service usage and network costs. After analyzing different types of services existing in current network, we explain the design rationale behind this evaluation approach and present analysis results of different types of services in different network architectures. The analysis results show that our approach is feasible to evaluate service scalability of network architectures, even if it needs further study to evaluate service scalability of the whole Internet architecture with more powerful cost and utility functions.
{"title":"Evaluating Service Scalability of Network Architectures","authors":"Qi Li, Mingwei Xu, Ke Xu, Jianping Wu","doi":"10.1109/ICN.2008.68","DOIUrl":"https://doi.org/10.1109/ICN.2008.68","url":null,"abstract":"We propose a new evaluation approach to evaluate the service scalability of network architectures, that aims to study service scalability of network architectures in current Internet architecture and help evaluate designs of next generation Internet (NGI). The key idea is to measure existing network services using the concept of service utility. While service utility indicates whether service deployed in network can get good achievement which considers the index of user satisfaction in network service usage and network costs. After analyzing different types of services existing in current network, we explain the design rationale behind this evaluation approach and present analysis results of different types of services in different network architectures. The analysis results show that our approach is feasible to evaluate service scalability of network architectures, even if it needs further study to evaluate service scalability of the whole Internet architecture with more powerful cost and utility functions.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134088866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose and evaluate fast reservation (FR) protocols for optical burst switched (OBS) networks. The proposed reservation schemes aim at reducing the end-to-end delay of a data burst, by sending the burst header packet (BHP) in the core network before the burst assembly is completed at the ingress node. We use linear prediction filters to estimate the expected length of the burst and the time needed for the burstification process to complete. A BHP packet carrying these estimates is sent before burst completion, in order to reserve bandwidth at each intermediate node for the time interval the burst is expected to pass from that node. Reducing the total time needed for a packet to be transported over an OBS network is important, especially for real-time applications. Reserving bandwidth only for the time interval it is actual going to be used by a burst is important for network utilization efficiency. In the simulations conducted we evaluate the proposed extensions and prove their usefulness.
{"title":"Fast Reservation Protocols for Latency Reduction in Optical Burst-Switched Networks Based on Predictions","authors":"Kyriaki Seklou, Emmanouel Varvarigos","doi":"10.1109/ICN.2008.90","DOIUrl":"https://doi.org/10.1109/ICN.2008.90","url":null,"abstract":"We propose and evaluate fast reservation (FR) protocols for optical burst switched (OBS) networks. The proposed reservation schemes aim at reducing the end-to-end delay of a data burst, by sending the burst header packet (BHP) in the core network before the burst assembly is completed at the ingress node. We use linear prediction filters to estimate the expected length of the burst and the time needed for the burstification process to complete. A BHP packet carrying these estimates is sent before burst completion, in order to reserve bandwidth at each intermediate node for the time interval the burst is expected to pass from that node. Reducing the total time needed for a packet to be transported over an OBS network is important, especially for real-time applications. Reserving bandwidth only for the time interval it is actual going to be used by a burst is important for network utilization efficiency. In the simulations conducted we evaluate the proposed extensions and prove their usefulness.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Several factors greatly influence the quality of service (QoS) in multihop wireless mesh networks (WMNs). These include the transmission range, number of gateways, number of nodes served by each gateway, gateway location, relay load and access fairness. While finding an optimal solution to simultaneously satisfy the above constraints is known to be MV-hard, near optimal solutions can be found within the feasibility region in polynomial time using heuristic algorithms. In this paper, first we present a near optimal heuristics algorithm for gateway placement, and later we compare its performance with some previously known sub-optimal solutions.
{"title":"Gateway Placement with QoS Constraints in Wireless Mesh Networks","authors":"Y. Drabu, H. Peyravi","doi":"10.1109/ICN.2008.89","DOIUrl":"https://doi.org/10.1109/ICN.2008.89","url":null,"abstract":"Several factors greatly influence the quality of service (QoS) in multihop wireless mesh networks (WMNs). These include the transmission range, number of gateways, number of nodes served by each gateway, gateway location, relay load and access fairness. While finding an optimal solution to simultaneously satisfy the above constraints is known to be MV-hard, near optimal solutions can be found within the feasibility region in polynomial time using heuristic algorithms. In this paper, first we present a near optimal heuristics algorithm for gateway placement, and later we compare its performance with some previously known sub-optimal solutions.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121897681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel blind constant modulus algorithm (CMA) for phase modulation signals is proposed. Compared with the CMAs before, this method, which exploits the relative phase information concealed in the M-PSK signals, has the ability to detect the types of modulation without the training information. Furthermore, this idea can apply to the continuous-varying modulation scheme systems. With the detected modulation scheme, the received signals can be recovered correctly. Simulation results prove the superiority of this new method.
{"title":"Adapting Constant Modulus Algorithm for Phase Modulation Signals","authors":"Xin Wang, G. Feng","doi":"10.1109/ICN.2008.11","DOIUrl":"https://doi.org/10.1109/ICN.2008.11","url":null,"abstract":"A novel blind constant modulus algorithm (CMA) for phase modulation signals is proposed. Compared with the CMAs before, this method, which exploits the relative phase information concealed in the M-PSK signals, has the ability to detect the types of modulation without the training information. Furthermore, this idea can apply to the continuous-varying modulation scheme systems. With the detected modulation scheme, the received signals can be recovered correctly. Simulation results prove the superiority of this new method.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Mattos, R. Lins, Andrei de Araújo Formiga, Francisco Heron de Carvalho Junior
The use of clusters and grids for high-performance applications has become widespread lately. In general, one associates clusters with dedicated LANs and grids with WANs and internets. This paper reports the results of a comparative analysis between cluster and grid performance when executing a load-balanced, image processing application in a local-area network. The results obtained show almost no difference in total execution times, indicating that grid software may be used advantageously in LANs to run similar load-balanced applications.
{"title":"A Comparison of Cluster and Grid Configurations Executing Image Processing Tasks in a Local Network","authors":"G. Mattos, R. Lins, Andrei de Araújo Formiga, Francisco Heron de Carvalho Junior","doi":"10.1109/ICN.2008.75","DOIUrl":"https://doi.org/10.1109/ICN.2008.75","url":null,"abstract":"The use of clusters and grids for high-performance applications has become widespread lately. In general, one associates clusters with dedicated LANs and grids with WANs and internets. This paper reports the results of a comparative analysis between cluster and grid performance when executing a load-balanced, image processing application in a local-area network. The results obtained show almost no difference in total execution times, indicating that grid software may be used advantageously in LANs to run similar load-balanced applications.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121383154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a new way of implementing converged wireless network and service management system using XML as the management message language and SOAP/HTTP as the protocols for configuration, performance, fault and alarm communication between network operation and maitenance (O&M) system and network elements (NE) and service provider's service production systems. Principles described in this article are fully tested and applicable and can be exploited in any current network and service management system.
{"title":"XML Based 3G/LTE Network and Service Management Concept","authors":"E. Wallenius, T. Hämäläinen, Kari Halttunen","doi":"10.1109/ICN.2008.23","DOIUrl":"https://doi.org/10.1109/ICN.2008.23","url":null,"abstract":"This paper describes a new way of implementing converged wireless network and service management system using XML as the management message language and SOAP/HTTP as the protocols for configuration, performance, fault and alarm communication between network operation and maitenance (O&M) system and network elements (NE) and service provider's service production systems. Principles described in this article are fully tested and applicable and can be exploited in any current network and service management system.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121396630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data Vortex networks with different routing and forwarding path arrangements are studied. To keep the bufferless routing nodes, the binary tree decoding stages in Data Vortex network are shown to achieve best combined routing performance in throughput and latency. When k is too large, the general k-ary decoding stages introduce too much deflection latency penalty, so this paper focuses on the performance comparison between the binary tree (k=2) decoding and 4-ary decoding (k=4) cases. The results have shown that even though a much smaller number of cylinder levels are required in a network of k=4, there is only slight reduction in the average packet latency within the network. On the other hand, the traffic backpressure induced throughput limit and the additional implementation cost in 4-ary decoding networks have proved that binary tree decoding stages offer the optimum performance under bufferless operations. The study has in part shown the advantages of Data Vortex network topology over many two dimensional multiple stage interconnection networks (MIN) if only deflection is allowed for bufferless operation.
{"title":"Optimum Routing and Forwarding Arrangement in Bufferless Data Vortex Switch Network","authors":"Qimin Yang","doi":"10.1109/ICN.2008.94","DOIUrl":"https://doi.org/10.1109/ICN.2008.94","url":null,"abstract":"Data Vortex networks with different routing and forwarding path arrangements are studied. To keep the bufferless routing nodes, the binary tree decoding stages in Data Vortex network are shown to achieve best combined routing performance in throughput and latency. When k is too large, the general k-ary decoding stages introduce too much deflection latency penalty, so this paper focuses on the performance comparison between the binary tree (k=2) decoding and 4-ary decoding (k=4) cases. The results have shown that even though a much smaller number of cylinder levels are required in a network of k=4, there is only slight reduction in the average packet latency within the network. On the other hand, the traffic backpressure induced throughput limit and the additional implementation cost in 4-ary decoding networks have proved that binary tree decoding stages offer the optimum performance under bufferless operations. The study has in part shown the advantages of Data Vortex network topology over many two dimensional multiple stage interconnection networks (MIN) if only deflection is allowed for bufferless operation.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129581366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}