By Topic

2008 International Conference on Communication Theory, Reliability, and Quality of Service

June 29 2008-July 5 2008

Filter Results

Displaying Results 1 - 25 of 26
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (184 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee

    Publication Year: 2008, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (195 KB)
    Freely Available from IEEE
  • Security and Spatial Resolution Optimization for Cluster-Based Wireless Sensor Networks

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    In this study, we investigate the correlation between security and spatial resolution -a measure of service quality- in cluster-based wireless sensor networks (WSN). We analyze the tradeoff between these two concepts resulting from the limited channel capacity. We propose a method based on combinatorial optimization to determine the best tradeoff between security and spatial resolution for cases w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperation Enforcement in Vehicular Networks

    Publication Year: 2008, Page(s):7 - 12
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (829 KB) | HTML iconHTML

    Operations of vehicular ad hoc networks rely on the collaboration of participating nodes to route data for each other. This standard approach using a fixed set of nodes for each communication link cannot cope with high mobility due to a high frequency of link breaks. A recent approach based on virtual routers has been proposed to address this problem. In this new environment, virtual routers are u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Quorum Selection Algorithm

    Publication Year: 2008, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    As communication becomes more and more an integral part of our day to day lives, so our need to access information increases as well. Mobility is currently one of the most important factors to consider in our aim to achieve ubiquitous computing, and with it raises the problem of how to manipulate data while maintaining consistency and integrity. Recent years have seen tremendous interest in quorum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Past, Present and Future of IP Telephony

    Publication Year: 2008, Page(s):19 - 24
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1099 KB) | HTML iconHTML

    Since the late 90's IP telephony, commonly referred to as Voice over IP (VoIP), has been presented as a revolution on communications enabling the possibility to converge historically separated voice and data networks, reducing costs, and integrating voice, data and video on applications. This paper presents a study over the standard VoIP protocols H.323, session initiation protocol (SIP), media ga... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical Model for Performance Evaluation of Blocking Banyan Switches Supporting Double Priority Traffic

    Publication Year: 2008, Page(s):25 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    In this research, the performance evaluation of two class priority Delta Multistage Interconnection Networks (MINs) is analyzed, using a discrete priority queuing model. All Delta Networks are constructed by special switching elements (SEs) based on an architecture which natively supports two classes of routing traffic. The proposed analytical method which was developed for performance metrics inv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HyTrace Backbone-Assisted Path Discovery in Hybrid Networks

    Publication Year: 2008, Page(s):34 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (669 KB) | HTML iconHTML

    HyTrace is a hybrid system providing stable paths between mobile ad hoc nodes. The ad hoc network thereby is organized in clusters where the cluster heads maintain uplinks to a backbone network. The backbone keeps track of available clusters and stable connection between them. The backbone also inter-links different network partitions thus increasing the reliability of the whole system. The underl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Offline TCP Sender Buffer Management Strategy

    Publication Year: 2008, Page(s):41 - 46
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    The transmission control protocol (TCP) uses a sliding window in order to enforce flow control. The receiver advertises its available buffer space to the sender, which cannot transmit more data than the advertised space. Transmitted data is first copied from application buffers into TCP buffers and from there it is sent through the network. In this paper we propose a model which characterizes the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadband Wireless Access (BWA) Implementation in NGN Network

    Publication Year: 2008, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1075 KB) | HTML iconHTML

    This paper treats BWA (Broadband Wireless Access) implementation in TK (Telecom of Kosova) NGN network in its efforts to keep the leading position in Kosovapsilas competitive telecommunication market. At the beginning, the architecture of TK NGN network with its corresponding elements is described. Such standard-based, open architecture core network enables the integration of Voice and Multimedia ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Network Estimation of TCP Performance

    Publication Year: 2008, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1062 KB) | HTML iconHTML

    TCP remains the protocol of choice for bulk data transfers over the Internet. A range of mathematical approaches were proposed to evaluate the performance of TCP, approaches validated through synthetic or endpoint controlled traffic, typically unsuitable for short-lived transfers or clients with unknown behaviour. This paper aims to overcome these problems by using a supervised adaptive learning a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Congestion Control Strategy for Differentiated-Services Network

    Publication Year: 2008, Page(s):59 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    In this paper, a new robust congestion control strategy is proposed for a multi-services architecture, namely a Differentiated-Services (DiffServ) network. In virtue of their robustness capabilities, Sliding Mode-based Variable Structure Control (SM-VSC) techniques are utilized to design our proposed controller on the basis of an inaccurate/uncertain Fluid Flow Model (FFM). Developed for an interc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Endpoint Admission Control Algorithm in NGN with Improved Network Utilization

    Publication Year: 2008, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (471 KB) | HTML iconHTML

    In this paper, we propose a new end-point admission control algorithm which helps to manage the traffic efficiently while providing end-to-end service quality. In this algorithm, users are allowed to temporarily use lower service levels in the routers that the requested service level is not currently available. This local degradation preserves the end-to-end service quality in the acceptable level... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS Mapping in TDMA Tree Based Clustered WSN between Accuracy, Density and Bandwidth

    Publication Year: 2008, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (982 KB) | HTML iconHTML

    Recently, there have been many efforts to develop wireless sensor networks (WSN), but no one can deny the fact that QoS support is still one of the least explored areas in this domain. In this paper, we present QoS support in WSN while highlighting the QoS mapping issue, a complex process in which QoS parameters are translated from level to level and we present a case study of a TDMA tree-based cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reservation Clash Handling to Optimize Bandwidth Utilization in MANETs

    Publication Year: 2008, Page(s):77 - 82
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Multimedia and real-time applications require bandwidth guarantees, which may be achieved by resource reservation. However, resource reservation in ad-hoc networks is a very challenging task due to the instability of radio channels, nodes mobility and lack of coordination between mobile nodes. Previously proposed reservation MAC protocols like CATA, FPRP and R-CSMA have limitations. They consider ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of Service Management in Heterogeneous Networks

    Publication Year: 2008, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (510 KB) | HTML iconHTML

    This paper presents an approach that aims to provide quality of services (QoS) over heterogeneous Internet domains. The goal is to install and to manage QoS inside each domain and to ensure it on the end to end data path. QoS is a key requirement representing a significant infrastructure upgrade for future networks. Our proposal relies on the multi-service, multi-technology model based on Bandwidt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Performance Evaluation of a State-Space Based AQM

    Publication Year: 2008, Page(s):89 - 94
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    Recent research has shown the link between congestion control in communication networks and feedback control system. In this paper, the design of an active queue management (AQM) which can be viewed as a controller, is considered. Based on a state space representation of a linearized fluid flow model of TCP, the AQM design is converted to a state feedback synthesis problem for time delay systems. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-Service Solution for Inter-domain QoS Negotiation

    Publication Year: 2008, Page(s):95 - 102
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (502 KB) | HTML iconHTML

    Development of multimedia services, e.g. video on demand or IPTV and their flow transport over the IP multi-domain networks with quality of services (QoS) guarantees require appropriate management and control of QoS at service and also at the network level. The management and control system must first support cooperation between several independent network domains at service provisioning level whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the Relationship between QoS and SNR for an 802.11g WLAN

    Publication Year: 2008, Page(s):103 - 107
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    Nowadays, it is very important to study the behavior of the wireless networks due to the variety of applications that make use of this technology. These applications frequently require a minimum QoS in order to work properly and guarantee a good service to the user. This paper aims to find a relationship between signal to noise ratio (SNR) and a 802.11g networkpsilas QoS in terms of latency, packe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2008, Page(s): 109
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE