首页 > 最新文献

2006 IFIP International Conference on Wireless and Optical Communications Networks最新文献

英文 中文
Stable storage for wireless multi-hop access networks 无线多跳接入网的稳定存储
Pub Date : 2006-08-07 DOI: 10.1109/WOCN.2006.1666550
Masakazu Ono, Tatsuya Hirakawa, Hiroaki Higaki
This paper has proposed a method to realize k-resilient distributed stable storage in a checkpoint protocol for a wireless multi-hop access network. By using the method, state information of a mobile computer is stored into storage devices in neighbor mobile computers and less state information is stored into a stable storage in a base station. Hence, communication and storage overhead are reduced. The method is able to be applied to a 3-phase checkpoint protocol without any additional messages. For further reduction of the overhead, not only 1-hop neighbor but also 2-hop neighbor mobile computers are involved into achieving the distributed stable storages. We design a checkpoint protocol by using the proposed method. In simulation evaluation, only 10-20% storage overhead of a naive method storing all state information into a stable storage in a base station is required. Especially in case of sparser mobile computer distribution and higher failure ratio, our extension involving 2-hop neighbor mobile computers works efficiently for reduction of the overhead
针对无线多跳接入网,提出了一种在检查点协议中实现k弹性分布式稳定存储的方法。利用该方法,将移动计算机的状态信息存储到相邻移动计算机的存储设备中,将较少的状态信息存储到基站的稳定存储器中。因此,减少了通信和存储开销。该方法能够应用于3阶段检查点协议,而不需要任何额外的消息。为了进一步降低开销,在实现分布式稳定存储时,不仅要考虑到1跳邻居,还要考虑到2跳邻居的移动计算机。利用所提出的方法设计了一个检查点协议。在仿真评估中,原始方法将所有状态信息存储到基站的稳定存储器中,只需要10-20%的存储开销。特别是在移动计算机分布更稀疏、故障率更高的情况下,我们的涉及2跳邻居移动计算机的扩展有效地降低了开销
{"title":"Stable storage for wireless multi-hop access networks","authors":"Masakazu Ono, Tatsuya Hirakawa, Hiroaki Higaki","doi":"10.1109/WOCN.2006.1666550","DOIUrl":"https://doi.org/10.1109/WOCN.2006.1666550","url":null,"abstract":"This paper has proposed a method to realize k-resilient distributed stable storage in a checkpoint protocol for a wireless multi-hop access network. By using the method, state information of a mobile computer is stored into storage devices in neighbor mobile computers and less state information is stored into a stable storage in a base station. Hence, communication and storage overhead are reduced. The method is able to be applied to a 3-phase checkpoint protocol without any additional messages. For further reduction of the overhead, not only 1-hop neighbor but also 2-hop neighbor mobile computers are involved into achieving the distributed stable storages. We design a checkpoint protocol by using the proposed method. In simulation evaluation, only 10-20% storage overhead of a naive method storing all state information into a stable storage in a base station is required. Especially in case of sparser mobile computer distribution and higher failure ratio, our extension involving 2-hop neighbor mobile computers works efficiently for reduction of the overhead","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121522425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polymeric electro-optic Mach-Zehnder modulators with truncated Y-junctions 截断y型结的聚合物电光马赫-曾德尔调制器
Pub Date : 2006-08-07 DOI: 10.1109/WOCN.2006.1666672
A.K. Das, A. Kotal, A. Das
We propose and demonstrate a Mach-Zehnder type electrooptic (EO) modulator with truncated structure of the Y-junctions. The length of the branching zone is reduced to ~3 times in the proposed structure compared with the normal Y-branch structure. The symmetric and asymmetric structures of the junction are studied to consider the fabrication tolerance. We used the simple laser writing process to fabricate the device. The reliabilities of the EO polymer modulators made from the common side-chain polymers were investigated and found guide loss of 0.9 dB/cm in TE mode. The device was hermetically sealed in an inert gas and then found the reduction of Vpi at room temperature was ~7% over 5 weeks operation with 30 mW input power. However, Vpi increases to ~18% when the sample was heated to 50deg;C. The simulated results show the reduction of device length significantly by choice of higher electrooptic coefficient core materials
我们提出并演示了一种具有截断y结结构的马赫-曾德尔型电光(EO)调制器。与普通的y型分支结构相比,该结构的分支区长度减少了约3倍。研究了对称和非对称结结构,并考虑了制造公差。我们使用了简单的激光书写工艺来制造这个设备。研究了由普通侧链聚合物制成的EO聚合物调制器的可靠性,发现在TE模式下波导损耗为0.9 dB/cm。该装置在惰性气体中密封,然后发现室温下Vpi降低了约7%,输入功率为30 mW,运行5周。然而,当样品加热到50℃时,Vpi增加到~18%。仿真结果表明,选用高电光系数的芯材可显著缩短器件长度
{"title":"Polymeric electro-optic Mach-Zehnder modulators with truncated Y-junctions","authors":"A.K. Das, A. Kotal, A. Das","doi":"10.1109/WOCN.2006.1666672","DOIUrl":"https://doi.org/10.1109/WOCN.2006.1666672","url":null,"abstract":"We propose and demonstrate a Mach-Zehnder type electrooptic (EO) modulator with truncated structure of the Y-junctions. The length of the branching zone is reduced to ~3 times in the proposed structure compared with the normal Y-branch structure. The symmetric and asymmetric structures of the junction are studied to consider the fabrication tolerance. We used the simple laser writing process to fabricate the device. The reliabilities of the EO polymer modulators made from the common side-chain polymers were investigated and found guide loss of 0.9 dB/cm in TE mode. The device was hermetically sealed in an inert gas and then found the reduction of Vpi at room temperature was ~7% over 5 weeks operation with 30 mW input power. However, Vpi increases to ~18% when the sample was heated to 50deg;C. The simulated results show the reduction of device length significantly by choice of higher electrooptic coefficient core materials","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128614058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Removal of blocking artifacts in JPEG compressed images using dual tree complex wavelet filters for multimedia on the Web 使用双树复合小波滤波器去除JPEG压缩图像中的阻塞伪影
Pub Date : 2006-08-07 DOI: 10.1109/WOCN.2006.1666679
K. Nallaperumal, J. J. Ranjani, S. Christopher, S. Saudia
The popular international standard for compression, the Joint Photographers Expert Group (JPEG) quite often leads to noticeable discontinuities along the boundaries called the `blocking artifacts'. When the image is JPEG compressed the high frequency details of the coded image are mainly contaminated by quantization noise. An estimation of the actual pixel is obtained from the decoded image. The estimated image is denoised using dual tree complex wavelet transform (DTCWT), which is a variant of discrete wavelet transform. This transformation ensures approximate shift invariance and directional selectivity properties that are lacking in the traditional wavelet transform
流行的国际压缩标准,联合摄影师专家组(JPEG)经常导致沿边界明显的不连续,称为“阻塞伪影”。在对图像进行JPEG压缩时,编码图像的高频细节主要受到量化噪声的污染。从解码的图像中获得实际像素的估计。利用离散小波变换的变体对偶树复小波变换(DTCWT)对估计图像进行去噪。这种变换保证了传统小波变换所缺乏的近似平移不变性和方向选择性
{"title":"Removal of blocking artifacts in JPEG compressed images using dual tree complex wavelet filters for multimedia on the Web","authors":"K. Nallaperumal, J. J. Ranjani, S. Christopher, S. Saudia","doi":"10.1109/WOCN.2006.1666679","DOIUrl":"https://doi.org/10.1109/WOCN.2006.1666679","url":null,"abstract":"The popular international standard for compression, the Joint Photographers Expert Group (JPEG) quite often leads to noticeable discontinuities along the boundaries called the `blocking artifacts'. When the image is JPEG compressed the high frequency details of the coded image are mainly contaminated by quantization noise. An estimation of the actual pixel is obtained from the decoded image. The estimated image is denoised using dual tree complex wavelet transform (DTCWT), which is a variant of discrete wavelet transform. This transformation ensures approximate shift invariance and directional selectivity properties that are lacking in the traditional wavelet transform","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125081823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wavelength reservation with parallel waiting in WDM networks WDM网络中具有并行等待的波长保留
Pub Date : 2006-08-07 DOI: 10.1109/WOCN.2006.1666641
H. Higaki
This paper proposes a novel recovery method, parallel waiting, from a wavelength reservation failure for all-optical networks. Each core router uses a timer and waits for the release of a wavelength if it detects a reservation failure. In addition, forwarding of a reservation request message is not blocked even in case of a reservation failure. Thus, waiting and forwarding are concurrently applied and multiple core routers may wait simultaneously. Based on the parallel waiting recovery, we design a conservative forward waiting (CFW) wavelength reservation protocol
针对全光网络的波长保留故障,提出了一种新的恢复方法——并行等待。每个核心路由器都使用一个计时器,如果检测到保留故障,则等待释放波长。此外,即使在预订失败的情况下,也不会阻止预订请求消息的转发。这样,等待和转发可以同时应用,多个核心路由器可以同时等待。在并行等待恢复的基础上,设计了一种保守正向等待(CFW)波长保留协议
{"title":"Wavelength reservation with parallel waiting in WDM networks","authors":"H. Higaki","doi":"10.1109/WOCN.2006.1666641","DOIUrl":"https://doi.org/10.1109/WOCN.2006.1666641","url":null,"abstract":"This paper proposes a novel recovery method, parallel waiting, from a wavelength reservation failure for all-optical networks. Each core router uses a timer and waits for the release of a wavelength if it detects a reservation failure. In addition, forwarding of a reservation request message is not blocked even in case of a reservation failure. Thus, waiting and forwarding are concurrently applied and multiple core routers may wait simultaneously. Based on the parallel waiting recovery, we design a conservative forward waiting (CFW) wavelength reservation protocol","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new handoff scheme for macro-mobility scenario 一种新的宏观移动场景切换方案
Pub Date : 2006-08-07 DOI: 10.1109/WOCN.2006.1666594
S. Kumar, S.K. Singh, R. Bhattacharjee
With the increase in need for wireless appliances to support mobility, many schemes have been proposed to improve the quality of service (QoS) levels during handoffs. Although these schemes have been proven to be very effective in improving the latency and packet loss during handoffs to a significant level, they are mainly limited to micro-mobility scenario. In the context of macro-mobility, mobile IP (MIP) still continues to be the major protocol, which is not efficient due to high latency and packet loss. In this paper, we propose a new scheme to handle horizontal handoff in the cases of macro-mobility scenarios. We compare the performance of the proposed scheme with the MIPv6 via simulation in network simulator 2 (ns2) and the results show that the proposed scheme provides significant improvement over MIPv6
随着对无线设备支持移动性需求的增加,已经提出了许多方案来提高切换期间的服务质量(QoS)水平。虽然这些方案已被证明在很大程度上改善了切换期间的延迟和丢包,但它们主要局限于微移动场景。在宏观迁移的背景下,移动IP (mobile IP, MIP)仍然是主要协议,但由于高延迟和丢包等问题,效率不高。在本文中,我们提出了一种新的方案来处理宏观迁移场景下的水平切换。通过网络模拟器2 (ns2)的仿真,比较了该方案与MIPv6协议的性能,结果表明该方案比MIPv6协议有显著的改进
{"title":"A new handoff scheme for macro-mobility scenario","authors":"S. Kumar, S.K. Singh, R. Bhattacharjee","doi":"10.1109/WOCN.2006.1666594","DOIUrl":"https://doi.org/10.1109/WOCN.2006.1666594","url":null,"abstract":"With the increase in need for wireless appliances to support mobility, many schemes have been proposed to improve the quality of service (QoS) levels during handoffs. Although these schemes have been proven to be very effective in improving the latency and packet loss during handoffs to a significant level, they are mainly limited to micro-mobility scenario. In the context of macro-mobility, mobile IP (MIP) still continues to be the major protocol, which is not efficient due to high latency and packet loss. In this paper, we propose a new scheme to handle horizontal handoff in the cases of macro-mobility scenarios. We compare the performance of the proposed scheme with the MIPv6 via simulation in network simulator 2 (ns2) and the results show that the proposed scheme provides significant improvement over MIPv6","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125366215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient and cost effective tracker in monitored area network [t-man] using RFID 在使用RFID的监控区域网络[t-man]中高效和经济有效的跟踪器
Pub Date : 2006-08-07 DOI: 10.1109/WOCN.2006.1666634
S. Pandey, D. Singh
In this paper we analyze how radio frequency identification (RFID) technology can be used to efficiently and cost effectively achieve and improve the tracing and tracking in a monitored area network. In particular we describe implementational issues associated to tracing or tracking of any mobile platform (person, robot etc) equipped with a RFID transmitter. We present a `t-monitored area network' model which is more flexible and dynamic and can achieve appropriate location sensing, on the basis of which it would be able to trace the path of a mobile agent in real-time. Our solution works on a standard local area network using a specially designed hardware. Our analysis and practical results are based on actual hardware implementation and promises a very fine granularity in time for consistent location update requests. Our design do not intend to find the exact location coordinates of a RFID tag, which is although acceptable in most of the applications unlike defense where accuracy is crucial, for which our system is modular and flexible enough to allow later modifications as per the specific requirement with some addition or subtraction in the overall cost. Our analysis and practical results indicate that the hardware system designed is low-cost and efficient
本文分析了如何利用射频识别(RFID)技术高效、经济地实现和改进监控局域网中的跟踪和跟踪。我们特别描述了与跟踪或跟踪配备RFID发射器的任何移动平台(人,机器人等)相关的实施问题。我们提出了一个更灵活和动态的“t-监控区域网络”模型,可以实现适当的位置感知,在此基础上可以实时跟踪移动代理的路径。我们的解决方案在使用特殊设计的硬件的标准局域网上工作。我们的分析和实际结果是基于实际的硬件实现,并承诺在一致的位置更新请求的时间上提供非常精细的粒度。我们的设计并不打算找到RFID标签的确切位置坐标,这虽然在大多数应用中是可以接受的,不像国防,其中准确性是至关重要的,为此我们的系统是模块化的,足够灵活,可以根据具体要求进行后期修改,并在总体成本中进行一些加法或减法。分析和实际结果表明,所设计的硬件系统成本低、效率高
{"title":"Efficient and cost effective tracker in monitored area network [t-man] using RFID","authors":"S. Pandey, D. Singh","doi":"10.1109/WOCN.2006.1666634","DOIUrl":"https://doi.org/10.1109/WOCN.2006.1666634","url":null,"abstract":"In this paper we analyze how radio frequency identification (RFID) technology can be used to efficiently and cost effectively achieve and improve the tracing and tracking in a monitored area network. In particular we describe implementational issues associated to tracing or tracking of any mobile platform (person, robot etc) equipped with a RFID transmitter. We present a `t-monitored area network' model which is more flexible and dynamic and can achieve appropriate location sensing, on the basis of which it would be able to trace the path of a mobile agent in real-time. Our solution works on a standard local area network using a specially designed hardware. Our analysis and practical results are based on actual hardware implementation and promises a very fine granularity in time for consistent location update requests. Our design do not intend to find the exact location coordinates of a RFID tag, which is although acceptable in most of the applications unlike defense where accuracy is crucial, for which our system is modular and flexible enough to allow later modifications as per the specific requirement with some addition or subtraction in the overall cost. Our analysis and practical results indicate that the hardware system designed is low-cost and efficient","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131081817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A soft dynamic service specific trust management and authentication scheme for mobile adhoc networks 一种针对移动自组网的软动态业务的信任管理和认证方案
Pub Date : 2006-08-07 DOI: 10.1109/WOCN.2006.1666569
M. Bhattacharyya, S. Nandi, S. Saha
Authentication and trust management in an adhoc network is a challenging task. Cryptography and other hard approaches do not provide a quantitative measurement of trust. Also, trust assignment to a new node having no history of any previous transaction had not been concrete. Human society authenticates people dynamically. This paper proposes a new strategy involving two parameters alpha and beta, which authenticates a node in a mobile adhoc network drawing inspiration from the way authentication, is done in a human society. The alpha parameter gives the quantitative measurement of seeking trust, and the beta parameter gives the quantitative measurement of assigning trust. The dynamism of trust change in a cluster of nodes is also explained by introducing time credit point, service credit point and discredit point. The strategy proposes to use a downloadable active security component from the trust authentication authority, rather than any passive certificate or encryption based authentication. This paper also says how to choose next trust authority in case the primary authority fails
自组织网络中的身份验证和信任管理是一项具有挑战性的任务。密码学和其他硬方法不能提供信任的定量度量。此外,对没有任何先前事务历史记录的新节点的信任分配也不具体。人类社会对人的身份认证是动态的。本文从人类社会的认证方式中得到启发,提出了一种包含alpha和beta两个参数的移动自组网节点认证策略。其中alpha参数给出了寻求信任的量化度量,beta参数给出了分配信任的量化度量。通过引入时间信用点、服务信用点和失信点来解释节点集群中信任变化的动态性。该策略建议使用来自信任身份验证机构的可下载的主动安全组件,而不是任何被动证书或基于加密的身份验证。本文还讨论了在主信任机构失效的情况下如何选择下一个信任机构
{"title":"A soft dynamic service specific trust management and authentication scheme for mobile adhoc networks","authors":"M. Bhattacharyya, S. Nandi, S. Saha","doi":"10.1109/WOCN.2006.1666569","DOIUrl":"https://doi.org/10.1109/WOCN.2006.1666569","url":null,"abstract":"Authentication and trust management in an adhoc network is a challenging task. Cryptography and other hard approaches do not provide a quantitative measurement of trust. Also, trust assignment to a new node having no history of any previous transaction had not been concrete. Human society authenticates people dynamically. This paper proposes a new strategy involving two parameters alpha and beta, which authenticates a node in a mobile adhoc network drawing inspiration from the way authentication, is done in a human society. The alpha parameter gives the quantitative measurement of seeking trust, and the beta parameter gives the quantitative measurement of assigning trust. The dynamism of trust change in a cluster of nodes is also explained by introducing time credit point, service credit point and discredit point. The strategy proposes to use a downloadable active security component from the trust authentication authority, rather than any passive certificate or encryption based authentication. This paper also says how to choose next trust authority in case the primary authority fails","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Contention prediction and evaluation in photonic packet switched systems 光子分组交换系统中的争用预测与评价
Pub Date : 2006-08-07 DOI: 10.1109/WOCN.2006.1666655
G. Loss, M. Diniz, R. Coelho
Contention prediction in photonic packet switched systems is examined in this paper. The signals input distributions were represented by the M/G/infin and fBm processes with different scaling degree, auto-correlation function and heavy-tail distribution. The results demonstrated that rather than the scaling degree or other statistical parameters the signals distribution is a crucial factor to contention. The best photonic packet buffer composition is also investigated to guarantee the video signals performance requirements in terms of mean delay and maximum jitter
研究了光子分组交换系统中的争用预测问题。信号输入分布由不同标度的M/G/infin和fBm过程、自相关函数和重尾分布表示。结果表明,与标度或其他统计参数相比,信号分布是争论的关键因素。为了保证视频信号在平均时延和最大抖动方面的性能要求,研究了最佳光子分组缓冲结构
{"title":"Contention prediction and evaluation in photonic packet switched systems","authors":"G. Loss, M. Diniz, R. Coelho","doi":"10.1109/WOCN.2006.1666655","DOIUrl":"https://doi.org/10.1109/WOCN.2006.1666655","url":null,"abstract":"Contention prediction in photonic packet switched systems is examined in this paper. The signals input distributions were represented by the M/G/infin and fBm processes with different scaling degree, auto-correlation function and heavy-tail distribution. The results demonstrated that rather than the scaling degree or other statistical parameters the signals distribution is a crucial factor to contention. The best photonic packet buffer composition is also investigated to guarantee the video signals performance requirements in terms of mean delay and maximum jitter","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133401147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
QoS provisioning for cellular/WLAN interworking 为蜂窝/WLAN互通提供QoS
Pub Date : 2006-08-07 DOI: 10.1109/WOCN.2006.1666542
I. Saravanan, G. Sivaradje, P. Dananjayan
The goal of the next-generation all-IP wireless networks is to offer users the capability of achieving pervasive network access with the full support of integrated multimedia services that require various data rates and quality of service (QoS). In such an environment, a single service could be offered at different speeds at different locations/times via separate systems. In order to address resource management and call admission control in cellular/WLAN inter working, a Priority based service interworking architecture with hybrid coupling is presented. The main objective of this paper is to provide better QoS to high-prioritized voice traffic. An effective call admission control strategy is proposed for better QoS provisioning and efficient resource utilization. The results show that the proposed scheme is very efficient in serving voice traffic compared to WLAN-first scheme
下一代全ip无线网络的目标是为用户提供实现普及网络访问的能力,并充分支持需要各种数据速率和服务质量(QoS)的集成多媒体业务。在这样的环境中,单一的服务可以通过不同的系统在不同的地点/时间以不同的速度提供。为了解决蜂窝/无线局域网互通中的资源管理和呼叫准入控制问题,提出了一种基于优先级的混合耦合业务互通体系结构。本文的主要目标是为高优先级话音流量提供更好的QoS。为了更好地提供服务质量和提高资源利用率,提出了一种有效的呼叫接纳控制策略。结果表明,与wlan优先方案相比,该方案在话音业务服务方面具有很高的效率
{"title":"QoS provisioning for cellular/WLAN interworking","authors":"I. Saravanan, G. Sivaradje, P. Dananjayan","doi":"10.1109/WOCN.2006.1666542","DOIUrl":"https://doi.org/10.1109/WOCN.2006.1666542","url":null,"abstract":"The goal of the next-generation all-IP wireless networks is to offer users the capability of achieving pervasive network access with the full support of integrated multimedia services that require various data rates and quality of service (QoS). In such an environment, a single service could be offered at different speeds at different locations/times via separate systems. In order to address resource management and call admission control in cellular/WLAN inter working, a Priority based service interworking architecture with hybrid coupling is presented. The main objective of this paper is to provide better QoS to high-prioritized voice traffic. An effective call admission control strategy is proposed for better QoS provisioning and efficient resource utilization. The results show that the proposed scheme is very efficient in serving voice traffic compared to WLAN-first scheme","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129813351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance improvement of dynamic source routing protocol the mobility effect of nodes in cache management 动态源路由协议的性能改进及缓存管理中节点的迁移效应
Pub Date : 2006-08-07 DOI: 10.1109/WOCN.2006.1666532
G. Kaosar, A. Mahmoud, T. Sheltami
In this paper we propose a new method of improving the performance of dynamic source routing (DSR) protocol. In DSR, as well as other on-demand routing protocols, every established path is considered as temporary to reflect the mobility effect, therefore, once a path is established, it is associated with an expiration time. After that expiration time the path is deleted from the route cache of the nodes. In practice the mobility of nodes are not equal all the time and we propose to treat paths differently according to their stationary, rather than deleting them after every expiration time to improve performance. By simulation we show that this method improves the performance of DSR
提出了一种提高动态源路由(DSR)协议性能的新方法。在DSR和其他按需路由协议中,每条建立的路径都被认为是临时的,以反映迁移效应,因此,一旦建立了一条路径,它就与一个到期时间相关联。在该过期时间之后,路径将从节点的路由缓存中删除。在实践中,节点的迁移率并不总是相等的,我们建议根据路径的平稳性对路径进行不同的处理,而不是在每个到期时间后删除它们以提高性能。仿真结果表明,该方法提高了DSR的性能
{"title":"Performance improvement of dynamic source routing protocol the mobility effect of nodes in cache management","authors":"G. Kaosar, A. Mahmoud, T. Sheltami","doi":"10.1109/WOCN.2006.1666532","DOIUrl":"https://doi.org/10.1109/WOCN.2006.1666532","url":null,"abstract":"In this paper we propose a new method of improving the performance of dynamic source routing (DSR) protocol. In DSR, as well as other on-demand routing protocols, every established path is considered as temporary to reflect the mobility effect, therefore, once a path is established, it is associated with an expiration time. After that expiration time the path is deleted from the route cache of the nodes. In practice the mobility of nodes are not equal all the time and we propose to treat paths differently according to their stationary, rather than deleting them after every expiration time to improve performance. By simulation we show that this method improves the performance of DSR","PeriodicalId":275012,"journal":{"name":"2006 IFIP International Conference on Wireless and Optical Communications Networks","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115831264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2006 IFIP International Conference on Wireless and Optical Communications Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1