By Topic

2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology

18-20 Oct. 2009

Filter Results

Displaying Results 1 - 25 of 189
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2009, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2009, Page(s):1 - 16
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Unidirectional link problem in AODV routing protocol

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB) | HTML iconHTML

    Ad hoc is a kind of self organized network which is different from traditional communication system. In recent years, ad hoc network has been well developed. AODV (ad hoc on-demand distance vector) is an important protocol of ad hoc network which is recommended by IETF by its simple operation and outstanding performance. However, AODV protocol is not perfect so far, which still has some issues nee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scheme based on mobility for on-demand route protocol in ad hoc networks

    Publication Year: 2009, Page(s):5 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Broadcasting, which usually incurs serious problems by flooding, is a common operation in MANET (mobile Ad hoc networks), especially in on-demand route protocol. In order to relieve such limitations, in this paper, we propose an improvement over the former blind flooding approach by using a scheme based on the mobility of nodes (MON). In MON scheme, we categorize mobile hosts into active nodes and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EPI-T: A novel routing protocol for intermittently connected networks

    Publication Year: 2009, Page(s):10 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (89 KB) | HTML iconHTML

    In intermittently connected networks, epidemic routing protocols have been widely used as its simplicity and reliability. However, this kind of protocols will make the same message cover most of the nodes in networks which causes a huge waste of network resources. Therefore, this paper proposes a new routing protocol named epidemic routing based on separation time with forwarding tokens constraine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority based bandwidth allocation scheme for WIMAX systems

    Publication Year: 2009, Page(s):15 - 18
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB) | HTML iconHTML

    IEEE 802.16 based wireless access scheme (commonly known as WiMAX) is considered as one of the most promising wireless broadband access schemes for communication networks in metropolitan areas today. One of the most challenging tasks in the access scheme is the need to support quality of service (QoS). The paper proposes a priority based bandwidth allocation mechanism in WiMAX networks which is co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On parameter settings of network keep-alive protocol for failure detection

    Publication Year: 2009, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB) | HTML iconHTML

    The keep-alive protocol (or Hello protocol) relying on exchanging periodical keep-alive or Hello messages is often used by many network protocols to detect link, node or other network-related failures. The effectiveness of the Hello protocol depends on the proper setting of its two parameters. Most existing work on the study of the parameter settings was related to a specific environment in connec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and simulation of distributed QOS routing algorithm

    Publication Year: 2009, Page(s):24 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB) | HTML iconHTML

    Base on the QOS requirements of modern broadband networking, the paper presents our recent research on QOSPF in the on-demand computing over the traditional OSPF. The disadvantage in a distributed routing protocol under the QOS requirement is firstly discussed; then a new QOSPF which supports the QOS routing scheme is proposed. The advantage of new approach is demonstrated in the simulation of OSP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A token cycle scheduling of MAC protocols for TDMA based airborne ad hoc network

    Publication Year: 2009, Page(s):28 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB) | HTML iconHTML

    The MAC problem in a wireless network has intrigued researchers for years. The MAC protocol is also important for airborne ad hoc network in order to reducing TDMA overhead, increasing TDMA throughput, and decreasing End-to-End delay. Our proposed Token Cycle Scheduling described in this paper allow the exchange of control information in an efficient and contention free manner such that each parti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of transmission capacity of wireless ad hoc networks with power control

    Publication Year: 2009, Page(s):33 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (93 KB) | HTML iconHTML

    An ad hoc network is interference limited, the power control strategy plays an important role in the study of transmission capacity. In this paper, a well-known power control strategy, i.e., channel inversion, is studied. By comparing with no power control case, we found that using channel inversion increases the level of normalized interference in network, which makes the performance of network w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A context-aware autonomic packet marking mechanism

    Publication Year: 2009, Page(s):38 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Autonomic network is an important research field in network architectures. Since autonomic attributes such as context-aware, self-configuration, self-optimizing and self-management are introduced, autonomic network is capable of adapting to the heterogeneous and complex network environments. In this paper, context-aware and autonomic mechanisms are introduced into the DiffServ QoS framework and a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study and analysis of network delay by simulation

    Publication Year: 2009, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (93 KB) | HTML iconHTML

    Presently, It is paid much attention to network performance, as a main criterion, delay is becoming more and more important. A network model for a certain network is built by simulation software. It analyses the relations among delay, throughput, user number and bandwidth. Then it points out the direction to decrease the network delay by simulation and it can optimize the network performance with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing multi-path routing by avoiding Key Nodes

    Publication Year: 2009, Page(s):48 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    In this paper, we propose a new routing algorithm which combines source routing and intermediate routing in order to meet the requirement of node disjointed path and scalability. We also discover the existing of key nodes which we call KN, KN are the transmission congestion host spots, also in multi-path routing, they will lead to a low performance in disjointed path. We give a simple, effective m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probability of packet success of ad hoc networks with sib based power control

    Publication Year: 2009, Page(s):52 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB) | HTML iconHTML

    Probability of packet success of ad hoc networks is determined by two factors, one is the probability of successful transmission at the receiver, and the other is the probability of successful detection at the detector. In this paper, we study the probability of successful transmission by using the Poisson model with SIR based power control. Taking direct sequence scheme with binary phase shift ke... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on mobility models in vehicular communication system

    Publication Year: 2009, Page(s):57 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Vehicles equipped with wireless communication devices are poised to deliver vital services in the form of safety alerts, traffic congestion probing and on-road commercial applications. The selection of the most realistic and the most easy-to-implement mobility model is very crucial for the validity and feasibility of research. It is described several mobility models that represent mobile nodes who... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A norvel power allocation algorithm under CoMP with CA

    Publication Year: 2009, Page(s):66 - 70
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    3GPP LTE specification is stable now in release 8. To meet much higher requirements than release 8, 3GPP has initiated the LTE-A (LTE-Advanced) study item. In LTE-A, CoMP (coordinated multiple point transmission and reception) and CA (carrier aggregation) are two new features. CoMP is used to improve coverage and to increase cell-edge throughput. It is considered as an effective approach for ICIC ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A buffer level clock recovery based on least mean squares in PTN

    Publication Year: 2009, Page(s):71 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    Packet transport network (PTN) supports multiple services, including legacy TDM service. Clock recovery mechanism is essential technology for TDM over packet networks. As the buffer level clock recovery method in PTN is highly sensitive to the packet delay variation (PDV), a buffer level clock recovery based on least mean squares (LBL) is proposed. Simulation results show that LBL can effectively ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sub-carriers bidirectional arrayed handover algorithm

    Publication Year: 2009, Page(s):75 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    Orthogonal Frequency Division Multiple Access (OFDMA) has already been the main multiple access technology for 3G long term evolution(LTE) and 4G. This paper analyzes characteristics of OFDMA multiple access technology and puts forward a new OFDMA handover algorithm (sub-carriers bidirectional arrayed handover algorithm, SBA). The simulation results show that, during handover process, SBA algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Duplicate-aware opportunistic routing for multi-hop wireless networks

    Publication Year: 2009, Page(s):80 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB) | HTML iconHTML

    Recently, opportunistic routing has been proposed to take good advantage of broadcast nature and spatial diversity to achieve high throughput, despite highly unpredictable and lossy wireless links in multi-hop wireless networks. Most previous works provide heuristic solutions to select as many candidates, and don't take inter-candidate delivery probability into account, which might suffer acknowle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An autonomic flow based path selection method for multi-homed nodes

    Publication Year: 2009, Page(s):85 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB) | HTML iconHTML

    In order to access the Internet ubiquitously, most of the devices are equipped with multiple radio interfaces. In this way, the multi-homed node can attach to multiple access networks through multiple communication paths simultaneously. Flow based path selection is typically needed for the user to be always best connected. Meanwhile, autonomic feature can be introduced into the path selection syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient data collection in wireless sensor networks by applying network coding

    Publication Year: 2009, Page(s):90 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB) | HTML iconHTML

    Considering a wireless sensor network with optimal mobile sink track along which data are transmitted to the nodes, a fraction of nodes in the area of interest generate data packets and send them to the sink. Usually the single path routing is adopted in such scenarios which may cause unnecessary transmissions. We address the problem of how to collect these packets efficiently by using network cod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effect of human activites on 2.4 GHz radio propagation at home environment

    Publication Year: 2009, Page(s):95 - 99
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    As the technology evolves, Wireless Sensor Networks (WSNs) for home environment, such as healthcare systems, can be designed using low-cost, low-power and short-range radio equipments in 2.4 GHz ISM Frequency-band. While a great deal of efforts have been paid for studying the radio fading caused by human body in WLAN or cellular-systems, however, the comprehensive effects of the human mobility on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fairness evaluation of the default highspeed TCP in common operating systems

    Publication Year: 2009, Page(s):100 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Since the TCP protocol implements in the Internet, the AIMD algorithm has always been the dominating congest control algorithm for about 20 years, and most of the common operating systems follow the recommendation of the IETF to adopt the AIMD algorithm in their TCP variations. But in recent years, many high-speed congest control algorithms have been proposed for fast data transfer over high speed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comprehensive-factors-based scheduling algorithm for P2P media streaming

    Publication Year: 2009, Page(s):111 - 116
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    A comprehensive-factors-based (CFB) scheduling algorithm is proposed for peer-to-peer media streaming. In CFB, considering the number of chunks' suppliers and urgency, a priority is defined for each data chunk and the neighbours' bandwidth is effectively evaluated. A peer requests chunks from neighbors according to priorities as well as bandwidth. Simulation results show that the proposed CFB sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.