首页 > 最新文献

Int. J. Wirel. Networks Broadband Technol.最新文献

英文 中文
Overload Detection and Energy Conserving Routing Protocol for Underwater Acoustic Communication 水声通信过载检测与节能路由协议
Pub Date : 2022-01-01 DOI: 10.4018/ijwnbt.304386
Manel Baba Ahmed
The Underwater Wireless Acoustic Sensors are facing several challenges due to their limited energy power that can significantly affect their network performances, hence the design of an efficient and reliable routing protocol for the underwater sensor communication is becoming the main purpose for the researchers, however, in this article, a new mechanism is proposed to balance the underwater network energy consumption due to the frequent data packet forwarding, whereas the protocol uses a method that is based on the historical nodes energy, where sensor that are excessively consuming energy are considered as overloaded node and has to be excluded from the forwarding process depending on their priority value. The implementation and simulation have been performed using NS-2 network simulator, based on the well-known protocol for the underwater acoustic communication ‘Vector-Based Forwarding routing protocol’, the results shows the performance of the proposed mechanism over the VBF in term of energy consumption and efficiency, successful delivery data, and end to end delay.
由于水下无线声传感器的能量有限,会严重影响其网络性能,因此设计一种高效可靠的水下传感器通信路由协议成为研究人员的主要目的,然而,本文提出了一种新的机制来平衡水下网络由于频繁的数据包转发所造成的能量消耗。而协议采用基于历史节点能量的方法,将能量消耗过多的传感器视为过载节点,根据其优先级值将其排除在转发过程之外。在NS-2网络模拟器上,基于水声通信的著名协议“基于矢量的转发路由协议”进行了实现和仿真,结果表明所提出的机制在能耗和效率、数据成功传输和端到端延迟方面优于VBF。
{"title":"Overload Detection and Energy Conserving Routing Protocol for Underwater Acoustic Communication","authors":"Manel Baba Ahmed","doi":"10.4018/ijwnbt.304386","DOIUrl":"https://doi.org/10.4018/ijwnbt.304386","url":null,"abstract":"The Underwater Wireless Acoustic Sensors are facing several challenges due to their limited energy power that can significantly affect their network performances, hence the design of an efficient and reliable routing protocol for the underwater sensor communication is becoming the main purpose for the researchers, however, in this article, a new mechanism is proposed to balance the underwater network energy consumption due to the frequent data packet forwarding, whereas the protocol uses a method that is based on the historical nodes energy, where sensor that are excessively consuming energy are considered as overloaded node and has to be excluded from the forwarding process depending on their priority value. The implementation and simulation have been performed using NS-2 network simulator, based on the well-known protocol for the underwater acoustic communication ‘Vector-Based Forwarding routing protocol’, the results shows the performance of the proposed mechanism over the VBF in term of energy consumption and efficiency, successful delivery data, and end to end delay.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"47 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133707481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Interference Analysis for Home IoT Security Vulnerability Detection 基于无线干扰分析的家庭物联网安全漏洞检测
Pub Date : 2021-07-01 DOI: 10.4018/ijwnbt.2021070104
Alexander McDaid, Eoghan Furey, K. Curran
The integrity of wireless networks that make up the clear majority of IoT networks lack the inherent security of their wired counterparts. With the growth of the internet of things (IoT) and its pervasive nature in the modern home environment, it has caused a spike in security concerns over how the network infrastructure handles, transmits, and stores data. New wireless attacks such as KeySniffer and other attacks of this type cannot be tracked by traditional solutions. Therefore, this study investigates if wireless spectrum frequency monitoring using interference analysis tools can aid in the monitoring of device signals within a home IoT network. This could be used enhance the security compliance guidelines set forth by OWASP and NIST for these network types and the devices associated. Active and passive network scanning tools are used to provide analysis of device vulnerability and as comparison for device discovery purposes. The work shows the advantages and disadvantages of this signal pattern testing technique compared to traditional network scanning methods. The authors demonstrate how RF spectrum analysis is an effective way of monitoring network traffic over the air waves but also possesses limitations in that knowledge is needed to decipher these patterns. This article demonstrates alternative methods of interference analysis detection.
无线网络的完整性构成了绝大多数物联网网络,缺乏有线网络的固有安全性。随着物联网(IoT)的发展及其在现代家庭环境中的普及,它引发了对网络基础设施如何处理、传输和存储数据的安全担忧。新的无线攻击,如KeySniffer和其他这种类型的攻击无法被传统的解决方案跟踪。因此,本研究调查了使用干扰分析工具的无线频谱频率监测是否有助于监测家庭物联网网络中的设备信号。这可以用来增强OWASP和NIST为这些网络类型和相关设备制定的安全遵从性指南。主动和被动网络扫描工具用于分析设备漏洞,并作为设备发现的比较。研究表明,与传统的网络扫描方法相比,这种信号模式测试技术的优点和缺点。作者演示了射频频谱分析是一种有效的监测无线电波网络流量的方法,但也有局限性,因为破译这些模式需要知识。本文演示了干扰分析检测的替代方法。
{"title":"Wireless Interference Analysis for Home IoT Security Vulnerability Detection","authors":"Alexander McDaid, Eoghan Furey, K. Curran","doi":"10.4018/ijwnbt.2021070104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2021070104","url":null,"abstract":"The integrity of wireless networks that make up the clear majority of IoT networks lack the inherent security of their wired counterparts. With the growth of the internet of things (IoT) and its pervasive nature in the modern home environment, it has caused a spike in security concerns over how the network infrastructure handles, transmits, and stores data. New wireless attacks such as KeySniffer and other attacks of this type cannot be tracked by traditional solutions. Therefore, this study investigates if wireless spectrum frequency monitoring using interference analysis tools can aid in the monitoring of device signals within a home IoT network. This could be used enhance the security compliance guidelines set forth by OWASP and NIST for these network types and the devices associated. Active and passive network scanning tools are used to provide analysis of device vulnerability and as comparison for device discovery purposes. The work shows the advantages and disadvantages of this signal pattern testing technique compared to traditional network scanning methods. The authors demonstrate how RF spectrum analysis is an effective way of monitoring network traffic over the air waves but also possesses limitations in that knowledge is needed to decipher these patterns. This article demonstrates alternative methods of interference analysis detection.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"75 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Virtual Private Network Traffic Using Machine Learning 利用机器学习检测虚拟专用网流量
Pub Date : 2020-07-01 DOI: 10.4018/ijwnbt.2020070104
Shane Miller, K. Curran, T. Lunney
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the presented models are capable of classifying network traffic in a binary manner as direct (originating directly from a user's own device) or indirect (makes use of identity and location hiding features of VPNs) with high degrees of accuracy. The experiments conducted to classify OpenVPN usage found that the neural network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. The further work done to classify Stunnel OpenVPN usage found that the Neural Network was able to correctly identify VPN traffic with an overall accuracy of 97.82% accuracy when using 10-fold cross validation. This final experiment also provided an observation of 3 different validation techniques and the different accuracy results obtained. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.
如果恶意行为者使用匿名代理或虚拟专用网络(vpn)等身份隐藏工具,那么检测未经授权的用户对于目前可用的技术来说可能会有问题。这项工作提出了计算模型,以解决目前在检测VPN流量方面遇到的限制。使用多层感知器神经网络开发了一个检测vpn使用情况的模型,该网络使用捕获网络数据包的传输控制协议(TCP)头中发现的流量统计数据进行训练。验证测试表明,所提出的模型能够以二进制方式将网络流量分类为直接(直接来自用户自己的设备)或间接(利用vpn的身份和位置隐藏特征),并具有很高的准确性。对OpenVPN使用情况进行分类的实验发现,神经网络能够正确识别VPN流量,总体准确率为93.71%。对Stunnel OpenVPN使用情况进行分类的进一步工作发现,当使用10倍交叉验证时,神经网络能够正确识别VPN流量,总体准确率为97.82%。最后的实验还提供了3种不同的验证技术和不同的精度结果的观察。这些结果表明,在检测未经授权的用户访问方面取得了重大进展,有证据表明,在这一领域的研究可能会有进一步的进展,特别是在检测VPN使用情况对组织很重要的商业安全应用方面。
{"title":"Detection of Virtual Private Network Traffic Using Machine Learning","authors":"Shane Miller, K. Curran, T. Lunney","doi":"10.4018/ijwnbt.2020070104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020070104","url":null,"abstract":"The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the presented models are capable of classifying network traffic in a binary manner as direct (originating directly from a user's own device) or indirect (makes use of identity and location hiding features of VPNs) with high degrees of accuracy. The experiments conducted to classify OpenVPN usage found that the neural network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. The further work done to classify Stunnel OpenVPN usage found that the Neural Network was able to correctly identify VPN traffic with an overall accuracy of 97.82% accuracy when using 10-fold cross validation. This final experiment also provided an observation of 3 different validation techniques and the different accuracy results obtained. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131557498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Resource-Efficient Approach on User Association in 5G Networks Using Downlink and Uplink Decoupling 基于上下行解耦的5G网络用户关联资源高效方法
Pub Date : 2020-07-01 DOI: 10.4018/ijwnbt.2020070103
C. Bouras, V. Kokkinos, Evangelos Michos
A user-centered network model can significantly optimize connectivity issues between a user and the corresponding base station (BS). This article shall evaluate the user-centric (UC) model targeted for Fifth Generation telecommunication systems and will attempt to optimize communication between users and BSs. The authors suggest a resource-aware mechanism that targets improving coverage through the network decoupling into two separate and independent uplink and downlink networks. The mechanism shall fully respect each user's initially requested throughput demands and aims to solve the network user BS association problem with efficient resource management techniques. Simulations revealed that the mechanism perfectly preserves quality of service (QoS) and offers increased data rates in favor of ultimate user coverage, in both scenarios. Additionally, Frequency Range 2 offers an increased amount of resources, both increased data rates and higher amounts of devices that are covered by the overall network.
以用户为中心的网络模型可以显著优化用户与相应基站(BS)之间的连接问题。本文将评估针对第五代电信系统的以用户为中心(UC)模型,并将尝试优化用户和BSs之间的通信。作者提出了一种资源感知机制,旨在通过将网络解耦为两个独立的上行和下行网络来提高覆盖率。该机制应充分尊重每个用户最初请求的吞吐量需求,旨在通过高效的资源管理技术解决网络用户BS关联问题。模拟显示,在这两种情况下,该机制都完美地保持了服务质量(QoS),并提供了有利于最终用户覆盖的更高数据速率。此外,Frequency Range 2提供了更多的资源,既增加了数据速率,又增加了整个网络覆盖的设备数量。
{"title":"A Resource-Efficient Approach on User Association in 5G Networks Using Downlink and Uplink Decoupling","authors":"C. Bouras, V. Kokkinos, Evangelos Michos","doi":"10.4018/ijwnbt.2020070103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020070103","url":null,"abstract":"A user-centered network model can significantly optimize connectivity issues between a user and the corresponding base station (BS). This article shall evaluate the user-centric (UC) model targeted for Fifth Generation telecommunication systems and will attempt to optimize communication between users and BSs. The authors suggest a resource-aware mechanism that targets improving coverage through the network decoupling into two separate and independent uplink and downlink networks. The mechanism shall fully respect each user's initially requested throughput demands and aims to solve the network user BS association problem with efficient resource management techniques. Simulations revealed that the mechanism perfectly preserves quality of service (QoS) and offers increased data rates in favor of ultimate user coverage, in both scenarios. Additionally, Frequency Range 2 offers an increased amount of resources, both increased data rates and higher amounts of devices that are covered by the overall network.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121899112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Routing Technique to Enhance Energy Efficiency and Maximize Lifetime of the Network in WSNs 提高无线传感器网络能源效率和延长网络寿命的新路由技术
Pub Date : 2020-07-01 DOI: 10.4018/ijwnbt.2020070105
Nezha El Idrissi, A. Najid, H. E. Alami
Energy conservation plays a role important in wireless sensor network (WSN) design. The technique of clustering is one of the approaches to save energy of WSNs; several protocols based on the clustering technique are proposed in the context of energy conservation and maximization of network lifetime. This article proposed a new routing technique to maximize the network lifetime and enhance energy efficiency in WSNs, namely optimal selection of cluster head in the grid (OSCH-Gi). This technique divides the network area into a clustered grid. Each clustered grid has a cluster head (CH) it has been chosen based on the residual energy and distance to the base station of each node. Simulation results indicate that the proposed technique is more effective than other clustering algorithms in terms of the network lifetime and energy consumption.
在无线传感器网络(WSN)设计中,节能是一个重要的问题。聚类技术是无线传感器网络节能的途径之一;从节能和网络生存期最大化的角度出发,提出了几种基于聚类技术的协议。本文提出了一种新的无线传感器网络路由技术,即网格簇头优化选择(OSCH-Gi),以最大限度地提高网络的生存期和能源效率。该技术将网络区域划分为集群网格。每个聚类网格都有一个簇头(CH),它是根据每个节点的剩余能量和到基站的距离来选择的。仿真结果表明,该方法在网络寿命和能量消耗方面比其他聚类算法更有效。
{"title":"New Routing Technique to Enhance Energy Efficiency and Maximize Lifetime of the Network in WSNs","authors":"Nezha El Idrissi, A. Najid, H. E. Alami","doi":"10.4018/ijwnbt.2020070105","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020070105","url":null,"abstract":"Energy conservation plays a role important in wireless sensor network (WSN) design. The technique of clustering is one of the approaches to save energy of WSNs; several protocols based on the clustering technique are proposed in the context of energy conservation and maximization of network lifetime. This article proposed a new routing technique to maximize the network lifetime and enhance energy efficiency in WSNs, namely optimal selection of cluster head in the grid (OSCH-Gi). This technique divides the network area into a clustered grid. Each clustered grid has a cluster head (CH) it has been chosen based on the residual energy and distance to the base station of each node. Simulation results indicate that the proposed technique is more effective than other clustering algorithms in terms of the network lifetime and energy consumption.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129012807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Binary Search Algorithm to Determine the Minimum Transmission Range for Minimum Connected Dominating Set of a Threshold Size in Ad Hoc Networks 一种确定Ad Hoc网络中最小连通支配集最小传输范围的二分搜索算法
Pub Date : 2020-07-01 DOI: 10.4018/ijwnbt.2020070101
N. Meghanathan
The set of nodes constituting a minimum connected dominating set (MCDS) in a wireless ad hoc network (WANET) could be considered as the minimum number of nodes that are required to forward a broadcast message so that the message reaches all the nodes in the network. With regards to MCDS construction, we notice that smaller the transmission range for the nodes, the larger the size of the MCDS and vice-versa. Hence, from an energy efficiency point of view, it is imperative to determine the minimum transmission range (we assume uniform transmission range for all the nodes) that would be needed to construct a MCDS of a certain threshold size in WANETs. In this pursuit, we propose a binary search algorithm of logarithmic time complexity to determine the minimum uniform transmission range that would be sufficient to obtain a connected network and construct a MCDS whose size is within a threshold.
构成无线自组织网络(WANET)中最小连接支配集(MCDS)的节点集可以看作是转发广播消息以使消息到达网络中所有节点所需的最小节点数。关于MCDS的构建,我们注意到节点的传输范围越小,MCDS的大小就越大,反之亦然。因此,从能源效率的角度来看,必须确定在WANETs中构建一定阈值大小的MCDS所需的最小传输范围(我们假设所有节点的传输范围是统一的)。为此,我们提出了一种对数时间复杂度的二分搜索算法,以确定足以获得连接网络和构建大小在阈值内的MCDS的最小均匀传输范围。
{"title":"A Binary Search Algorithm to Determine the Minimum Transmission Range for Minimum Connected Dominating Set of a Threshold Size in Ad Hoc Networks","authors":"N. Meghanathan","doi":"10.4018/ijwnbt.2020070101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020070101","url":null,"abstract":"The set of nodes constituting a minimum connected dominating set (MCDS) in a wireless ad hoc network (WANET) could be considered as the minimum number of nodes that are required to forward a broadcast message so that the message reaches all the nodes in the network. With regards to MCDS construction, we notice that smaller the transmission range for the nodes, the larger the size of the MCDS and vice-versa. Hence, from an energy efficiency point of view, it is imperative to determine the minimum transmission range (we assume uniform transmission range for all the nodes) that would be needed to construct a MCDS of a certain threshold size in WANETs. In this pursuit, we propose a binary search algorithm of logarithmic time complexity to determine the minimum uniform transmission range that would be sufficient to obtain a connected network and construct a MCDS whose size is within a threshold.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114983752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SORT: A System for Adaptive Transmission of Video Over Delay Tolerant Networks 在容忍延迟网络上自适应传输视频的系统
Pub Date : 2020-07-01 DOI: 10.4018/ijwnbt.20200701.oa2
A. Thakur
In challenging environments, opportunistic networks can provide limited communication features in a delay tolerant manner. It is extremely difficult to transmit large data like videos in such environments, as delay may be hours and part of the information may be lost. This article proposes a novel system that uses partial information from prior communication to estimate the network congestion and delay. The video is compressed and packetized using scalable video coding (SVC). Extensions to Spray-and-Wait routing protocols are analyzed to ensure better delivery video quality and lower wastage. Through simulation, including real-world traces, performance of the proposed solutions under multiple scenarios is evaluated. Experimental results show that adaptive control reduces overall delay and minimizes wastage while improving the quality of video at the receiver. Adaptive SVC transmissions demonstrate almost three times increase in decoded content, as compared to non-SVC transmission.
在具有挑战性的环境中,机会网络可以以容忍延迟的方式提供有限的通信功能。在这样的环境中,像视频这样的大数据传输是极其困难的,因为延迟可能是几个小时,部分信息可能会丢失。本文提出了一种利用先前通信的部分信息来估计网络拥塞和延迟的新系统。使用可扩展视频编码(SVC)对视频进行压缩和分组。扩展喷洒和等待路由协议进行了分析,以确保更好的交付视频质量和更低的浪费。通过仿真,包括真实世界的轨迹,评估了所提出的解决方案在多种场景下的性能。实验结果表明,自适应控制在提高接收端视频质量的同时,降低了整体延迟,最大限度地减少了浪费。与非SVC传输相比,自适应SVC传输的解码内容几乎增加了三倍。
{"title":"SORT: A System for Adaptive Transmission of Video Over Delay Tolerant Networks","authors":"A. Thakur","doi":"10.4018/ijwnbt.20200701.oa2","DOIUrl":"https://doi.org/10.4018/ijwnbt.20200701.oa2","url":null,"abstract":"In challenging environments, opportunistic networks can provide limited communication features in a delay tolerant manner. It is extremely difficult to transmit large data like videos in such environments, as delay may be hours and part of the information may be lost. This article proposes a novel system that uses partial information from prior communication to estimate the network congestion and delay. The video is compressed and packetized using scalable video coding (SVC). Extensions to Spray-and-Wait routing protocols are analyzed to ensure better delivery video quality and lower wastage. Through simulation, including real-world traces, performance of the proposed solutions under multiple scenarios is evaluated. Experimental results show that adaptive control reduces overall delay and minimizes wastage while improving the quality of video at the receiver. Adaptive SVC transmissions demonstrate almost three times increase in decoded content, as compared to non-SVC transmission.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129405200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Model for Quality of Service Evaluation of Heterogeneous Networks 异构网络服务质量评价的动态模型
Pub Date : 2020-07-01 DOI: 10.4018/ijwnbt.2020070102
Farnaz Farid, S. Shahrestani, Chun Ruan
The quality of service (QoS) evaluation of heterogeneous networks is an interesting area of research. The traditional QoS evaluation methods usually use a set of network-centric parameters for the performance evaluation of these networks. As a result, using such methods it is not possible to report a comprehensive performance review of networks that would include diverse applications and technologies. To resolve this issue, in this research, a novel approach has been proposed that applies dynamic significance weights and unified metrics of the QoS-related parameters to various applications and technologies present within a heterogeneous network. The result analysis shows that by applying this methodical approach, the performance evaluation of heterogeneous networks can be carried out systematically and efficiently.
异构网络的服务质量(QoS)评估是一个有趣的研究领域。传统的QoS评价方法通常使用一组以网络为中心的参数对这些网络进行性能评价。因此,使用这种方法不可能报告包括各种应用程序和技术的网络的全面性能审查。为了解决这一问题,本研究提出了一种新的方法,将qos相关参数的动态显著性权重和统一度量应用于异构网络中的各种应用和技术。结果分析表明,采用该方法可以系统、高效地对异构网络进行性能评估。
{"title":"A Dynamic Model for Quality of Service Evaluation of Heterogeneous Networks","authors":"Farnaz Farid, S. Shahrestani, Chun Ruan","doi":"10.4018/ijwnbt.2020070102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020070102","url":null,"abstract":"The quality of service (QoS) evaluation of heterogeneous networks is an interesting area of research. The traditional QoS evaluation methods usually use a set of network-centric parameters for the performance evaluation of these networks. As a result, using such methods it is not possible to report a comprehensive performance review of networks that would include diverse applications and technologies. To resolve this issue, in this research, a novel approach has been proposed that applies dynamic significance weights and unified metrics of the QoS-related parameters to various applications and technologies present within a heterogeneous network. The result analysis shows that by applying this methodical approach, the performance evaluation of heterogeneous networks can be carried out systematically and efficiently.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Priority Load-Aware Scheduling Algorithm for Wireless Broadband Networks 无线宽带网络的增强优先级负载感知调度算法
Pub Date : 2020-03-10 DOI: 10.4018/ijwnbt.20200701.oa1
Aminu Mohammed, Abdulhakeem Abdulazeez, Ahmed Yusuf Tambuwal
WiMAX, one of the emerging wireless broadband networks, was designed to support traffic from applications with diverse QoS requirements. In WiMAX, an efficient resource management technique such as scheduling is required for the proper allocation of network resources to these data streams. This article proposes an enhanced priority load-aware scheduling (EPLAS) algorithm to improve the performance of WiMAX networks. The proposed scheme adaptively determines the weight of each queue based on the queue load. It also introduces a packet drop control mechanism that reduces the packet drop rate and increases the average throughput of the network by prioritizing packets with the earliest deadlines within each queue. The performance of EPLAS was evaluated against other benchmark schemes using several simulation experiments. The results revealed that EPLAS performed significantly better than the benchmark algorithms in terms of average delay, average packet drop ratio, and average throughput.
WiMAX是新兴的无线宽带网络之一,旨在支持具有不同QoS要求的应用程序的流量。在WiMAX中,需要一种有效的资源管理技术,如调度,以便为这些数据流适当地分配网络资源。为了提高WiMAX网络的性能,提出了一种增强的优先级负载感知调度(EPLAS)算法。该方案根据队列负载自适应地确定每个队列的权重。它还引入了丢包控制机制,通过在每个队列中优先处理截止日期最早的数据包,降低了丢包率,提高了网络的平均吞吐量。通过几个仿真实验,对EPLAS的性能与其他基准方案进行了比较。结果表明,EPLAS在平均延迟、平均丢包率和平均吞吐量方面都明显优于基准算法。
{"title":"Enhanced Priority Load-Aware Scheduling Algorithm for Wireless Broadband Networks","authors":"Aminu Mohammed, Abdulhakeem Abdulazeez, Ahmed Yusuf Tambuwal","doi":"10.4018/ijwnbt.20200701.oa1","DOIUrl":"https://doi.org/10.4018/ijwnbt.20200701.oa1","url":null,"abstract":"WiMAX, one of the emerging wireless broadband networks, was designed to support traffic from applications with diverse QoS requirements. In WiMAX, an efficient resource management technique such as scheduling is required for the proper allocation of network resources to these data streams. This article proposes an enhanced priority load-aware scheduling (EPLAS) algorithm to improve the performance of WiMAX networks. The proposed scheme adaptively determines the weight of each queue based on the queue load. It also introduces a packet drop control mechanism that reduces the packet drop rate and increases the average throughput of the network by prioritizing packets with the earliest deadlines within each queue. The performance of EPLAS was evaluated against other benchmark schemes using several simulation experiments. The results revealed that EPLAS performed significantly better than the benchmark algorithms in terms of average delay, average packet drop ratio, and average throughput.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automation of Detection and Fault Management Response of Common Last-Mile Loss-Of-Connectivity Outages Within the Access Network 接入网中常见最后一英里断连故障检测与故障管理响应的自动化
Pub Date : 2020-01-01 DOI: 10.4018/ijwnbt.2020010101
Alban Scribbins, K. Curran
The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff and their business customers, were surveyed using online questionnaires for their views. UK public Internet users were additionally surveyed via five UK Internet forums. UK communication providers offering MPLS VPN solutions were characterised. Access network connectivity technologies and fault management functions were compared, contrasted and analysed. An aspiration for the solution to be beneficial to the largest potential population, meant that current non-proprietary Internet Standard technologies were selected, justified and identified which could be recommended for use. It was found that of the participating survey respondents, two-thirds were in favour of automation. Many current communication provider processes were found to be mostly automated. The article concludes with recommendations of how an automated solution could potentially be enabled. This involves further use of business-to-business interfacing between communication providers, automation of their Fault Management Systems and introducing Bi-Directional forwarding for detection between last-mile active network elements.
本文旨在评估是否有可能推荐一种解决方案,以实现对接入网中常见的最后一英里中断的检测和故障管理过程的自动化。为了确定这项研究的效用,我们对英国的MPLS VPN管理服务提供商、他们的故障管理人员和他们的商业客户进行了在线问卷调查。英国公共互联网用户还通过五个英国互联网论坛接受了调查。提供MPLS VPN解决方案的英国通信提供商的特点。对接入网连接技术和故障管理功能进行了比较、对比和分析。希望解决方案对最大的潜在人群有益,这意味着选择、证明和确定当前的非专有互联网标准技术,可以推荐使用。调查发现,在参与调查的受访者中,三分之二的人赞成自动化。发现许多当前的通信提供程序流程大多是自动化的。本文最后给出了如何潜在地启用自动化解决方案的建议。这包括进一步使用通信提供商之间的企业对企业接口,其故障管理系统的自动化,以及引入双向转发以检测最后一英里活动网络元素。
{"title":"Automation of Detection and Fault Management Response of Common Last-Mile Loss-Of-Connectivity Outages Within the Access Network","authors":"Alban Scribbins, K. Curran","doi":"10.4018/ijwnbt.2020010101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020010101","url":null,"abstract":"The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff and their business customers, were surveyed using online questionnaires for their views. UK public Internet users were additionally surveyed via five UK Internet forums. UK communication providers offering MPLS VPN solutions were characterised. Access network connectivity technologies and fault management functions were compared, contrasted and analysed. An aspiration for the solution to be beneficial to the largest potential population, meant that current non-proprietary Internet Standard technologies were selected, justified and identified which could be recommended for use. It was found that of the participating survey respondents, two-thirds were in favour of automation. Many current communication provider processes were found to be mostly automated. The article concludes with recommendations of how an automated solution could potentially be enabled. This involves further use of business-to-business interfacing between communication providers, automation of their Fault Management Systems and introducing Bi-Directional forwarding for detection between last-mile active network elements.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. J. Wirel. Networks Broadband Technol.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1