Recently due to the rapidly changing and strictly competitive in telecom market, there are a variety kinds of products and convergent services to be promoted such as ICT services. There are a serial of conventional BSS constantly face stringent challenges such as time to market as well as quality and cost expectations. Systematic think that if there is a well-established system architect as a strong fundamental infrastructure as a right direction to transform the conventional BSS and to develop a new system. This paper introduces a BSS reengineering framework project include architecture design techniques and processes to produce a well-established architecture as strategy reuse and more flexible one than before. Also this study employs some real world BSS as case study to practice and examine those techniques then derive a BSS transformation to-be architecture.
{"title":"A Case Study and Design of Transformation Architecture in BSS","authors":"Teh-Sheng Huang, Chun-Yen Wang, Tsung-Ching Lin, Jeu-Yih Jeng","doi":"10.1109/WAINA.2015.67","DOIUrl":"https://doi.org/10.1109/WAINA.2015.67","url":null,"abstract":"Recently due to the rapidly changing and strictly competitive in telecom market, there are a variety kinds of products and convergent services to be promoted such as ICT services. There are a serial of conventional BSS constantly face stringent challenges such as time to market as well as quality and cost expectations. Systematic think that if there is a well-established system architect as a strong fundamental infrastructure as a right direction to transform the conventional BSS and to develop a new system. This paper introduces a BSS reengineering framework project include architecture design techniques and processes to produce a well-established architecture as strategy reuse and more flexible one than before. Also this study employs some real world BSS as case study to practice and examine those techniques then derive a BSS transformation to-be architecture.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"700-705"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89437044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor networks (WSNs) are important platforms for collecting environmental data and monitoring phenomena. So, outlier detection process is a necessary step in building sensor network systems to assure data quality for perfect decision making. Over the last few years Kernel Principal Component Analysis (KPCA) is considered as a natural nonlinear generalization of PCA, which extracts nonlinear structure from the data. Wireless sensor networks had been deployed in the real world to collect large amounts of raw sensed data. Then, the key challenge is to extract high level knowledge from such raw data. So, the accuracy of sensor readings is without a doubt one of the most important measures to evaluate the quality of a sensor and its network. For this case, the task amounts to create a useful model based on KPCA to recognize data as normal or outliers. However, KPCA based reconstruction error (RE) has found several applications in outlier detection but is not perfect to detect outlier. Within this setting, we propose Kernel Principal Component Analysis based Mahalanobis kernel as a new outlier detection method using mahalanobis distance to implicitly calculate the mapping of the data points in the feature space so that we can separate outlier points from normal pattern of data distribution. The use of KPCA based mahalanobis kernel on real word data obtained from three real datasets are reported showing that the proposed method performs better in finding outliers in wireless sensor networks when compared to the original RE based variant and the One-Class SVM detection approach.
{"title":"A Novel Outlier Detection Model Based on One Class Principal Component Classifier in Wireless Sensor Networks","authors":"Oussama Ghorbel, M. Abid, H. Snoussi","doi":"10.1109/AINA.2015.168","DOIUrl":"https://doi.org/10.1109/AINA.2015.168","url":null,"abstract":"Wireless sensor networks (WSNs) are important platforms for collecting environmental data and monitoring phenomena. So, outlier detection process is a necessary step in building sensor network systems to assure data quality for perfect decision making. Over the last few years Kernel Principal Component Analysis (KPCA) is considered as a natural nonlinear generalization of PCA, which extracts nonlinear structure from the data. Wireless sensor networks had been deployed in the real world to collect large amounts of raw sensed data. Then, the key challenge is to extract high level knowledge from such raw data. So, the accuracy of sensor readings is without a doubt one of the most important measures to evaluate the quality of a sensor and its network. For this case, the task amounts to create a useful model based on KPCA to recognize data as normal or outliers. However, KPCA based reconstruction error (RE) has found several applications in outlier detection but is not perfect to detect outlier. Within this setting, we propose Kernel Principal Component Analysis based Mahalanobis kernel as a new outlier detection method using mahalanobis distance to implicitly calculate the mapping of the data points in the feature space so that we can separate outlier points from normal pattern of data distribution. The use of KPCA based mahalanobis kernel on real word data obtained from three real datasets are reported showing that the proposed method performs better in finding outliers in wireless sensor networks when compared to the original RE based variant and the One-Class SVM detection approach.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"26 1","pages":"70-76"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90428499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiroaki Kikuchi, H. Hashimoto, H. Yasunaga, Takamichi Saito
In many hospitals, data related to patients are observed and collected to a central database for medical research. For instance, DPC dataset, which stands for Disease, Procedure and Combination, covers medical records for more than 7 million patients in more than 1000 hospitals. Using the distributed DPC data set, a number of epidemiological studied are feasible to reveal useful knowledge on medical treatments. Hence, cryptography helps to preserve the privacy of personal data. The study called as Privacy-Preserving Data Mining (PPDM) aims to perform a data mining algorithm with preserving confidentiality of datasets. This paper studies the scalability of privacy-preserving data mining in epidemiological study. As for the data-mining algorithm, we focus to a linear regression since it is used in many applications and simple to be evaluated. We try to identify the linear model to estimate a length of hospital stay from distributed dataset related to the patient and the disease information. Our contributions of this paper include (1) to propose privacy-preserving protocols for linear regression with horizontally or vertically partitioned datasets, and (2) to clarify the limitation of size of problem to be performed. These information are useful to determine the dominant element in PPDM and to figure out the direction of study for further improvement.
{"title":"Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies","authors":"Hiroaki Kikuchi, H. Hashimoto, H. Yasunaga, Takamichi Saito","doi":"10.1109/AINA.2015.229","DOIUrl":"https://doi.org/10.1109/AINA.2015.229","url":null,"abstract":"In many hospitals, data related to patients are observed and collected to a central database for medical research. For instance, DPC dataset, which stands for Disease, Procedure and Combination, covers medical records for more than 7 million patients in more than 1000 hospitals. Using the distributed DPC data set, a number of epidemiological studied are feasible to reveal useful knowledge on medical treatments. Hence, cryptography helps to preserve the privacy of personal data. The study called as Privacy-Preserving Data Mining (PPDM) aims to perform a data mining algorithm with preserving confidentiality of datasets. This paper studies the scalability of privacy-preserving data mining in epidemiological study. As for the data-mining algorithm, we focus to a linear regression since it is used in many applications and simple to be evaluated. We try to identify the linear model to estimate a length of hospital stay from distributed dataset related to the patient and the disease information. Our contributions of this paper include (1) to propose privacy-preserving protocols for linear regression with horizontally or vertically partitioned datasets, and (2) to clarify the limitation of size of problem to be performed. These information are useful to determine the dominant element in PPDM and to figure out the direction of study for further improvement.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"29 1","pages":"510-514"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76550421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many Internet-based applications generate huge data streams, which are known as Big Data Streams. Such applications comprise IoT-based monitoring systems, data analytics from monitoring online learning workspaces and MOOCs, global flight monitoring systems, etc. Differently from Big Data processing in which the data is available in databases, file systems, etc., before processing, in Big Data Streams the data stream is unbounded and it is to be processed as it becomes available. Besides the challenges of processing huge amount of data, the Big Data Stream processing adds further challenges of coping with scalability and high throughput to enable real time decision taking. While for Big Data processing the MapReduce framework has resulted successful, its batch mode processing shows limitations to process Big Data Streams. Therefore there have been proposed alternative frameworks such as Yahoo!S4, Twitter Storm, etc., to Big Data Stream processing. In this paper we implement and evaluate the Yahoo!S4 for Big Data Stream processing and exemplify through the Big Data Stream from global flight monitoring system.
{"title":"Processing and Analytics of Big Data Streams with Yahoo!S4","authors":"F. Xhafa, V. Naranjo, S. Caballé","doi":"10.1109/AINA.2015.194","DOIUrl":"https://doi.org/10.1109/AINA.2015.194","url":null,"abstract":"Many Internet-based applications generate huge data streams, which are known as Big Data Streams. Such applications comprise IoT-based monitoring systems, data analytics from monitoring online learning workspaces and MOOCs, global flight monitoring systems, etc. Differently from Big Data processing in which the data is available in databases, file systems, etc., before processing, in Big Data Streams the data stream is unbounded and it is to be processed as it becomes available. Besides the challenges of processing huge amount of data, the Big Data Stream processing adds further challenges of coping with scalability and high throughput to enable real time decision taking. While for Big Data processing the MapReduce framework has resulted successful, its batch mode processing shows limitations to process Big Data Streams. Therefore there have been proposed alternative frameworks such as Yahoo!S4, Twitter Storm, etc., to Big Data Stream processing. In this paper we implement and evaluate the Yahoo!S4 for Big Data Stream processing and exemplify through the Big Data Stream from global flight monitoring system.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"51 1","pages":"263-270"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76589970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network Functions Virtualization (NFV) opens new opportunities and challenges for security community. Unlike existing physical network infrastructure, in a virtualized network platform, security services can be dynamically deployed and maintained to cope with the threat of sophisticated network attacks that are increasing over time. This paper surveys the activity that many security vendors and Internet service providers are trying to define common interfaces for NFV-based security services through the analysis of use cases and related technologies. This activity is currently lead by Internet Engineering Task Force (IETF) that is an international Internet standardization organization.
{"title":"A Survey on Interfaces to Network Security Functions in Network Virtualization","authors":"H. Jang, J. Jeong, Hyoungshick Kim, Jungsoo Park","doi":"10.1109/WAINA.2015.103","DOIUrl":"https://doi.org/10.1109/WAINA.2015.103","url":null,"abstract":"Network Functions Virtualization (NFV) opens new opportunities and challenges for security community. Unlike existing physical network infrastructure, in a virtualized network platform, security services can be dynamically deployed and maintained to cope with the threat of sophisticated network attacks that are increasing over time. This paper surveys the activity that many security vendors and Internet service providers are trying to define common interfaces for NFV-based security services through the analysis of use cases and related technologies. This activity is currently lead by Internet Engineering Task Force (IETF) that is an international Internet standardization organization.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"6 1","pages":"160-163"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78320782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
All new networking architectures come with their own problems. Software Defined Networking (SDN) has its own challenges which are needed to be addressed by researchers as well. One of the crucial problems with SDN is the control plane scalability since it is a bottleneck for its evolution. As the network grows, the number of messages a controller receives also increases. This increase puts the controller scalability in the heart of problems of SDN. In this paper, we propose a hierarchy-based network architecture along with an inter-AS routing approach with QoS. We exploit idea of levels in which networks with controllers reside and a main controller, which works like a broker, is on top of them to keep the global network state and view. Our experiment results indicate that a controller in a hierarchic setting handles 50% less number of traffic than a controller in a non-hierarchic environment.
{"title":"A Scalable Inter-AS QoS Routing Architecture in Software Defined Network (SDN)","authors":"Murat Karakus, A. Durresi","doi":"10.1109/AINA.2015.179","DOIUrl":"https://doi.org/10.1109/AINA.2015.179","url":null,"abstract":"All new networking architectures come with their own problems. Software Defined Networking (SDN) has its own challenges which are needed to be addressed by researchers as well. One of the crucial problems with SDN is the control plane scalability since it is a bottleneck for its evolution. As the network grows, the number of messages a controller receives also increases. This increase puts the controller scalability in the heart of problems of SDN. In this paper, we propose a hierarchy-based network architecture along with an inter-AS routing approach with QoS. We exploit idea of levels in which networks with controllers reside and a main controller, which works like a broker, is on top of them to keep the global network state and view. Our experiment results indicate that a controller in a hierarchic setting handles 50% less number of traffic than a controller in a non-hierarchic environment.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"14 1","pages":"148-154"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78456750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, cloud applications are becoming more and more popular. However, in order for such applications to work, they need a stable Internet connectivity. To avoid the Internet access becoming a single point of failure, redundancy by multi-homing -- i.e. Simultaneous access to multiple Internet service providers (ISP) -- is becoming increasingly common as well. Multi-homing leads to the desire to utilise all network attachment points simultaneously, which is e.g. Provided by the Multi-Path TCP (MPTCP) extension for TCP. MPTCP is still under development by researchers and standardisation in the IETF. Particularly, it is necessary to evaluate MPTCP under realistic Internet conditions. NORNET CORE is the world's first, large-scale Internet test bed for multi-homed systems and applications. It is therefore a useful platform for evaluating MPTCP. In this paper, we therefore present our NORNET CORE extension that adds MPTCP support to the test bed. Particularly, our extension is now available to all users of NORNET CORE as well, which significantly reduces the effort of MPTCP researchers to evaluate MPTCP and its improvements. In a proof of concept, we furthermore show the strengths and weaknesses of state-of-the-art MPTCP in NORNET CORE, in a configuration covering 29 ISP connections at 14 sites in 5 different countries.
{"title":"Multi-path TCP in Real-World Setups -- An Evaluation in the NORNET CORE Testbed","authors":"T. Dreibholz, Xing Zhou, Fu Fa","doi":"10.1109/WAINA.2015.74","DOIUrl":"https://doi.org/10.1109/WAINA.2015.74","url":null,"abstract":"Nowadays, cloud applications are becoming more and more popular. However, in order for such applications to work, they need a stable Internet connectivity. To avoid the Internet access becoming a single point of failure, redundancy by multi-homing -- i.e. Simultaneous access to multiple Internet service providers (ISP) -- is becoming increasingly common as well. Multi-homing leads to the desire to utilise all network attachment points simultaneously, which is e.g. Provided by the Multi-Path TCP (MPTCP) extension for TCP. MPTCP is still under development by researchers and standardisation in the IETF. Particularly, it is necessary to evaluate MPTCP under realistic Internet conditions. NORNET CORE is the world's first, large-scale Internet test bed for multi-homed systems and applications. It is therefore a useful platform for evaluating MPTCP. In this paper, we therefore present our NORNET CORE extension that adds MPTCP support to the test bed. Particularly, our extension is now available to all users of NORNET CORE as well, which significantly reduces the effort of MPTCP researchers to evaluate MPTCP and its improvements. In a proof of concept, we furthermore show the strengths and weaknesses of state-of-the-art MPTCP in NORNET CORE, in a configuration covering 29 ISP connections at 14 sites in 5 different countries.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"32 1","pages":"617-622"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75254365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the wide development and deployment of mobile devices and gadgets, a larger number of users go online in so many aspects of their daily lives. The challenge is to enjoy the conveniences of online activities while limiting privacy scarifies. In response to the increasing number of online-hacking scandals, mechanisms for protecting users privacy continue to evolve. An example of such mechanisms is the Onion Router (ToR), a free software for enabling online anonymity and resisting censorship. Despite the fact that ToR is a dominant anonymizerin the current Internet, the emergence of new communication and inter-networking trends such as Cloud Computing, Software Defined Networks and Information Centric Networks places a question mark whether ToR will fulfil its promises with these trend of the "Future Internet". This paper aims at answering the question by implementing ToR on a number of Cloud platforms and discussing the security properties of ToR.
{"title":"Will ToR Achieve Its Goals in the \"Future Internet\"? An Empirical Study of Using ToR with Cloud Computing","authors":"A. Carnielli, Mahdi Aiash","doi":"10.1109/WAINA.2015.78","DOIUrl":"https://doi.org/10.1109/WAINA.2015.78","url":null,"abstract":"With the wide development and deployment of mobile devices and gadgets, a larger number of users go online in so many aspects of their daily lives. The challenge is to enjoy the conveniences of online activities while limiting privacy scarifies. In response to the increasing number of online-hacking scandals, mechanisms for protecting users privacy continue to evolve. An example of such mechanisms is the Onion Router (ToR), a free software for enabling online anonymity and resisting censorship. Despite the fact that ToR is a dominant anonymizerin the current Internet, the emergence of new communication and inter-networking trends such as Cloud Computing, Software Defined Networks and Information Centric Networks places a question mark whether ToR will fulfil its promises with these trend of the \"Future Internet\". This paper aims at answering the question by implementing ToR on a number of Cloud platforms and discussing the security properties of ToR.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"48 1","pages":"135-140"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74806184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime in technology resource constrained environments has been shown to adversely affect economic growth by deterring investment and triggering emigration. To address this secure reporting channels are being investigated to encouraging anonymous crime reporting. In this paper, we present a system (Cry Help App) developed to enable residents of a university community situated in technology resource constrained environment to facilitate secure and covert crime reporting. We focus primarily on the usability of the application. The system was developed on the basis of user centric iterative approach. Deployment and evaluation results of our prototype system demonstrate that overall the system scored a 77.06% usability rating with a standard deviation of 0.05 for contributing scores on System Use, Information Quality and Interface Quality. This is indicative of the fact that users found the system to be very usable.
技术资源受限环境中的犯罪已被证明会通过阻止投资和引发移民而对经济增长产生不利影响。为了解决这个问题,正在调查安全的举报渠道,以鼓励匿名举报犯罪。在本文中,我们提出了一个系统(Cry Help App),该系统旨在使位于技术资源受限环境中的大学社区居民能够方便地安全和隐蔽地报告犯罪。我们主要关注应用程序的可用性。该系统是基于以用户为中心的迭代方法开发的。我们的原型系统的部署和评估结果表明,总体而言,系统在系统使用、信息质量和界面质量方面的贡献得分为77.06%,标准差为0.05。这表明用户发现系统非常有用。
{"title":"A Usable and Secure Crime Reporting System for Technology Resource Constrained Context","authors":"A. Sakpere, Anne Kayem, T. Ndlovu","doi":"10.1109/WAINA.2015.97","DOIUrl":"https://doi.org/10.1109/WAINA.2015.97","url":null,"abstract":"Crime in technology resource constrained environments has been shown to adversely affect economic growth by deterring investment and triggering emigration. To address this secure reporting channels are being investigated to encouraging anonymous crime reporting. In this paper, we present a system (Cry Help App) developed to enable residents of a university community situated in technology resource constrained environment to facilitate secure and covert crime reporting. We focus primarily on the usability of the application. The system was developed on the basis of user centric iterative approach. Deployment and evaluation results of our prototype system demonstrate that overall the system scored a 77.06% usability rating with a standard deviation of 0.05 for contributing scores on System Use, Information Quality and Interface Quality. This is indicative of the fact that users found the system to be very usable.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"110 1","pages":"424-429"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72936235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ishikawa, Taiki Honda, Makoto Ikeda, L. Barolli
The Delay/Disruption Tolerant Networking (DTN) aims to provide inter-operable communications with wide range of networks which have poor performance characteristics. In previous work, we proposed a message suppression method for Vehicular-DTN (VDTN) considering UDP traffic. In this paper, we evaluate the proposed method for VDTN considering TCP traffic. The simulations for two scenarios are conducted considering obstacles (buildings), where Message Suppression with Road side units (MSRs) are present or not present. We consider 802.11p standard and send bundle messages in urban scenario. We use the packet delivery ratio, duplicated bundle received and end-to-end delay as evaluation metrics. We can found that our proposed method can reduce the duplicated bundle messages, even if vehicles send a bundle message using TCP to other vehicles. Also, our proposed method have a good performance compared with Epidemic conventional method for all cases.
{"title":"Investigation of Message Suppression Method Considering TCP in Vehicular-DTN","authors":"S. Ishikawa, Taiki Honda, Makoto Ikeda, L. Barolli","doi":"10.1109/WAINA.2015.60","DOIUrl":"https://doi.org/10.1109/WAINA.2015.60","url":null,"abstract":"The Delay/Disruption Tolerant Networking (DTN) aims to provide inter-operable communications with wide range of networks which have poor performance characteristics. In previous work, we proposed a message suppression method for Vehicular-DTN (VDTN) considering UDP traffic. In this paper, we evaluate the proposed method for VDTN considering TCP traffic. The simulations for two scenarios are conducted considering obstacles (buildings), where Message Suppression with Road side units (MSRs) are present or not present. We consider 802.11p standard and send bundle messages in urban scenario. We use the packet delivery ratio, duplicated bundle received and end-to-end delay as evaluation metrics. We can found that our proposed method can reduce the duplicated bundle messages, even if vehicles send a bundle message using TCP to other vehicles. Also, our proposed method have a good performance compared with Epidemic conventional method for all cases.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"12 1","pages":"370-375"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74314918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}