By Topic

Wireless and Optical Communications Networks (WOCN), 2011 Eighth International Conference on

Date 24-26 May 2011

Filter Results

Displaying Results 1 - 25 of 55
  • Message from general chair, vice chairs and technical program co-chairs

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (21 KB)  
    Freely Available from IEEE
  • [Front matter]

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • Reviewers

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (20 KB)  
    Freely Available from IEEE
  • Committee

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (24 KB)  
    Freely Available from IEEE
  • WOCN2011 conference program Paris — France

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (63 KB)  
    Freely Available from IEEE
  • UMTS user identity confidentiality: An end-to-end solution

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (172 KB) |  | HTML iconHTML  

    In all mobile communication scenario, it is envisaged that user identity remains confidential. Universal Mobile Telecommunication System (UMTS) is no exception to this. Every Mobile Station (MS) in UMTS is assigned a unique International Mobile Subscriber Identity (IMSI). If this IMSI is compromised, so will be the user identity. There is restriction on transmission of this IMSI over radio link. Unfortunately, circumstances when such transmission happens can be created by an adversary, thereby compromising anonymity of users. In this paper, we build on our End-to-End User Identity Confidentiality (E2EUIC) solution [1], an extension to 3GPP-AKA that not only takes care of identity confidentiality vulnerability over the wireless link, but goes one step ahead to ensure the same over the wired network as well. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol aware shot-noise based radio frequency jamming method in 802.11 networks

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (102 KB) |  | HTML iconHTML  

    Radio frequency (RF)jamming is considered as one of the most proficient technique to launch Denial of Service (DoS) attack in wireless networks. Majority of the jamming attacks to-date largely focus on jamming efficiency by transmitting colossal volume of data to obtain better jamming effectiveness. Consequently, as more and more data is transmitted the probability of detecting the presence of a jammer becomes high. In addition the energy expenditure by the jammer is markedly increased. However it is highly preferred to minimize the detection probability as well as the energy consumption for achieving better jamming efficiency during the course of jamming. In this paper we present a novel idea of shot-noise induced RF jamming which demonstrates a fairly good jamming efficiency as well as minimal detection probability. That has been achieved by transmitting very small noise pulses in an efficient way to distort fewer bits of the ongoing transmission rather than disrupting the whole packet. Moreover we also analyze the effect of packet size and data rate on jamming efficiency. Our results divulge a considerable improvement in energy efficiency by lowering data rate with lesser detection probability as compared to the previous work reported in the literature. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing the reliability of wireless sensor network with a new testing approach based on compressed sensing theory

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (109 KB) |  | HTML iconHTML  

    Wireless Sensor Networks (WSNs) consist of a large number of wireless nodes and are responsible for sensing, processing and monitoring environmental data. WSNs suffer of some problems such as limited processing capability, low storage capacity, limited time of testing and limited reliability. The Compressed sensing theory holds promising improvements to these parameters. Compressed Sensing shows that spars signals such as signals of WSNs can be exactly reconstructed from a small number of random linear measurements. With this in mind, we introduce a new mechanism of testing in wireless sensor network with compressed sensing theory in order to design a robust WSN with high reliability factor. This paper gives a background of compressed sensing theory, and then describes important concepts in wireless sensor networks, and finally our research combines the compressed sensing theory with wireless sensor network to introduce a new method for testing of wireless sensor networks with compressed sensing theory. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless integrated robots for effective search and guidance of rescue teams

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (141 KB) |  | HTML iconHTML  

    Over the past decade, natural and human-induced disasters have claimed millions of lives. Intelligent robots equipped with advanced sensors and integrating wireless networks are attracting attention from researchers and rescuers all around the world. This paper is an application of the Wireless Sensor Network to disaster management. The wireless sensor network consists of two fixed nodes and moving nodes with the robot and rescue teams. The search robot autonomously navigates, searches for living human beings, collects data from the air quality control module, localizes it with respect to the fixed nodes and sends the data. The rescue team can wirelessly receive the data in real time and locate the robot precisely. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput analysis of multi-input & single-output channels in core routers of optical burst switching networks

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (349 KB) |  | HTML iconHTML  

    We describe here a new burst scheduling algorithm to avoid burst overlapping in the egress router of optical burst switching (OBS) network, and hence to improve the quality of service (QoS) in developing several optical networks to fulfill the increasing demand of Internet facilities. We consider TAG (tell-and-go) protocol where many lightpaths pass in a given link and burst overlap may occur. In an intermediate node having many incoming links and one outgoing link at lower traffic loads, we found the conditions for the burst controls, either passing of all bursts or blocking of some bursts in the egress nodes of optical domain. It is shown that in low traffic loads, burst blocking can be made zero but in higher traffic loads there is burst blocking, which can be reduced using different sets of fiber delay lines (FDLs) for which minimum usage of wavelengths can be achieved. The relation between number of burst blocking and the requirements of FDLs are shown. We used time-based assembly algorithm in an assembly node to build the burst at low and high traffic loads. The analysis for throughput depending on burst size, inter-arrival time, and sizes of fiber delay lines (FDLs), is made and improvement of throughput using FDLs is shown. Passing of bursts at the input channel and hence the priority of channels depending upon the burst size, intermediate gap between two successive bursts in the input channels, the arrival time for the first burst in the second & third input channels, and the FDL used in core nodes are shown. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing and signaling in GMPLS based DWDM multi domain multilayer networks using IP/WDM router

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (215 KB) |  | HTML iconHTML  

    The Internet explosion has drastically increased the bandwidth demand of modern telecommunication networks and as optical networks provide an opportunity for the future Internet, it is expected that Internet providers will gradually replace their infrastructures with optical networks. The Internet is a decentralized set of networks (more than 29.000) known as domains or Autonomous Systems on a well-known network hierarchy. In this structure of the Internet selecting a route to forward traffic on an end to end scenario is known as Multi-domain or inter-domain routing. Multi-domain routing has been a well-known problem largely analyzed in pure IP (packet) networks. But there are still limitations in multi-domain routing in optical multi-domain networks. To address these problems, a detailed hierarchical routing and signaling framework for GMPLS based Dense Wave Division Multiplexing (DWDM) Multi-Domain framework is presented. The frame work adapts the full mesh topology abstraction scheme to improve routing scalability and lower inter-domain blocking probabilities in optical DWDM multi-domain networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bending loss characterization under temperature variations of ITU-T G.657 optical fiber standard for its implementation in the last mile

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (472 KB) |  | HTML iconHTML  

    Single mode optical fiber FTTx solutions for broadband access networks are in continuous expansion. Due to the lack of a robust mathematical model for accurately predicting bend losses under climatic fluctuations, it becomes necessary to characterize the fiber before its implementation. In this work we present a comprehensive characterization of ITU-T G.657 optical fiber for evaluating its potential implementation in the last mile of a generic broadband network. The results of the characterization process show that the fiber supports the most aggressive tests without exceeding the manufacturer limits. The measurements demonstrate the suitability of G-657 fiber for this application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduction of energy consumption of Video-on-Demand services using cache size optimization

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (326 KB) |  | HTML iconHTML  

    Due to its high traffic demand, Video-on-Demand (VoD) is an energy consuming service. Traffic can be reduced by the deployment of caches where the most popular content is stored closer to clients. In this paper, we evaluate the energy consumption of a cache-based VoD service over an IP over WDM network. We develop a Mixed Integer Linear Programming (MILP) model to optimize the cache size for each node in the network at different times of the day. We consider two traffic scenarios with different downlink and uplink ratios. Our results reveal that, using the optimal cache size can reduce the energy consumption by up to 42%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of Speex audio codec for wireless communication networks

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (518 KB) |  | HTML iconHTML  

    This paper provides a scheme where Speex audio codec was used in a wireless mobile communication network for the transmission of voice. The data gathered is visualised and compared with traditional AMR audio codec. The document concludes by stating that Speex presents itself as a better alternative to traditional AMR technology in the wireless field. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SHIM6-based mobility management for multi-homed terminals in heterogeneous environment

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (141 KB) |  | HTML iconHTML  

    Most of smart-phones are equipped with several network interfaces. This evolution highlights the benefits of multi-homing which offer user access to services not only anywhere, at any time and from any network but also simultaneously. Due to the lack of multi-homing support in existing protocols, several issues remain. The main issue is to manage several paths between two communicating nodes at a time in a mobile environment, and despite multiple paths, make sure end nodes correspond to the source and destination terminals. This paper proposes a SHIM6-based solution for mobility management of mobile terminals in multi-homing context. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Simulation and evaluation of routing protocols in vehicular ad hoc network

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (217 KB) |  | HTML iconHTML  

    Notice of Violation of IEEE Publication Principles

    "Simulation and Evaluation of Routing Protocols in Vehicular Ad Hoc Network"
    by Majid Shakeri
    in the 2011 Eighth International Conference on Wireless and Optical Communications Networks, 2011, pp. 1 - 3.

    After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    This paper contains significant portions of original text from the paper cited below. The original text was copied with insufficient attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

    Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:

    "A performance Analysis of VANETs Routing Protocols Using Different Mobility Models"
    by Nedal Abadneh, Houda Labiod
    in the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010, pp. 498 - 502.

    In this paper, we present performance evaluation of various routing protocols including SIFT, GPSR and GOSR using different mobility models such as Random Waypoint Model (RWM), Fluid Traffic Model (FTM) and Intelligent Driver Model with Intersection Management (IDM-IM). We present simulation results that illustrate the importance of choosing a mobility model in the simulation of a vehicular network protocol. In this paper, we will evaluate the performance of SIFT, GPSR and GOSR in vehicular ad hoc networks urban environments. These performance evaluations are important to improve the routing efficiency in urban vehicular networks environment. We will test the protocols against node speed. We will find that SIFT outperforms both GPSR and GOSR for most of the performance metrics used in this p- per. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive equalizer and compensation of ICI in the wireless repeater system

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (161 KB) |  | HTML iconHTML  

    In this paper, we propose adaptive equalizer and compensation of ICI (Inter carrier interference) in the wireless repeater system based on OFDM in order to effectively cancel feedback channel and phase noise. When the gain of a wireless repeater is larger than the isolation between transmit and receive antennas of the repeater, the feedback signal that comes into the receive antenna from the transmit antenna of the repeater causes the repeater to go into feedback oscillation regardless of the input signal. And the phase noise effect can exist on up and down converter of wireless repeater. Thus, in order to cancel feedback channel and phase noise, we suggest an adaptive equalizer such as NLMS (Normalizer least mean square), RLS (Recursive least square) and a phase noise compensator. In case of phase noise compensator, because phase noise has random characteristic, comb type pilot is used for estimation and compensation phase noise in wireless communication systems. First, we remove CPE (Common phase error) by received pilot symbol. After that, we use the obtained error power as a MMSE (Minimum mean square error) detection criterion factor and a forgetting factor to compensate ICI caused by phase noise. BER performance of proposed method is satisfied with 13.5dB at 10-4. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modified reliable timeout based commit protocol

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (138 KB) |  | HTML iconHTML  

    Mobile Databases with palmtops, cellular phones, car computers etc. may lead to disconnection and handoff issues due to which it is necessary to have consistent commitment of transactions in case of mobility. This paper proposes the new commitment protocol, maintains the strong transactional coherency, called as Modified Reliable Timeout Based Commit Protocol (MRTBCP), that supports off-line executions and disconnection during commitment, it decreases the cost of wireless communication by reducing the message complexity. It also supports handoff in case of Mobility. This paper extends the features of UCM. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and performance analysis of QAPM modulation in multi-path channel

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (152 KB) |  | HTML iconHTML  

    In this paper, we analyze a QAPM (Quadrature Amplitude Position Modulation) scheme for improving power efficiency in multi-path channel. An existing PSSK (Phase Silence Shift keying) modulation is a simple extension from PSK modulation technique. This conventional PSSK modulation technique can be regarded as an extension from PSK modulation. And this PSSK has better power efficiency than PSK modulation. The bandwidth efficiency is half than PSK, but BER performance is improved. A proposed QAPM scheme is built on QAM. And BER performance of QAPM is better than PSSK because BER performance of QAM is better than PSK. In this paper, we find the BER performance closed form of QAPM modulation. Also, we compare QAPM and PSSK regard to BER performance and throughput. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • p-Persistent CSMA as a collision resolution protocol for active RFID environments

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (130 KB) |  | HTML iconHTML  

    Radio Frequency IDentification (RFID) is a technology used on a wide set of applications. One of its main advantages is its ability of identifying objects in a wireless fashion with no contact or a direct sight line among the communicating devices. By improving the underlying collision resolution protocol in an RFID system, the power consumption of such devices is improved as well. In this paper, we present a new p-persistent CSMA collision resolution protocol for RFID systems. We compare our protocol with a non-persistent CSMA protocol previously proposed in the literature as well as with the ISO18000-7 standard. By measuring the average identification time for a wide range of tags, we show by simulation that our protocol outperforms both protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of balanced cycles of QC-LDPC codes

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (111 KB) |  | HTML iconHTML  

    In this paper, we analyze balanced cycles of quasi-cyclic low-density parity-check (QC-LDPC) codes. We show the structure of balanced cycles and their necessary and sufficient existence conditions. Furthermore, we determine the minimal matrices of balanced cycle. Meanwhile we propose the property of B-girth in its mother matrix. Finally, we give the proof in theory. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization between throughput and fairness in WiMAX network

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (156 KB) |  | HTML iconHTML  

    IEEE 802.16 based Worldwide Interoperability for Microwave Access networks (WiMAX) are increasingly being deployed for last hop broadband wireless access. In order to provide the high speed access to information resources broadband technology like WiMAX is needed. In this paper we compared different uplink scheduling algorithms of WiMAX mainly maximum carrier to interference and noise (Max C/I) algorithm and fair share (FS) algorithm. Max C/I algorithm is a throughput maximizing algorithm but FS algorithm reduces the network throughput as it provides equal time slots to every subscriber station (SS) in a cell. We develop our own algorithm which optimizes between Max C/I and FS algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Ka-band triple push coupled pair VCO using 0.18-μm CMOS technology

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (178 KB) |  | HTML iconHTML  

    A low phase noise, small power dissipation and small sized Ka-band Triple Push Coupled Pair using 0.18 μm CMOS technology is described. The VCO operated can be tuned between 37.3 GHz and 40.1 GHz and has low phase noise of -107 dBc/Hz at a 1 MHz offset. The Figure of merit (FOM) is -184.8 dBc/Hz and the power-frequency tuning-normalized figure-of-merit (PFTN) is -11.8 dB. The power consumption of the VCO was 24.9 mW with only 0.52 mm2 chip area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cooperative retransmission strategy for error-prone wireless networks

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (190 KB) |  | HTML iconHTML  

    In this paper, an error-prone cooperative retransmission strategy (E-CRS) is proposed for wireless networks. In E-CRS, when a receiver can not receive a frame correctly, the retransmission is performed by a cooperative node that overhears the packet successfully, rather than by original source. The throughput of the proposed scheme is analyzed and evaluated in error-prone and no collision channel. The simulation results show that our proposed cooperative retransmission strategy can increase significantly the throughput, compared with the original retransmission scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperation mode selection for maximizing throughput in wireless networks

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (157 KB) |  | HTML iconHTML  

    Many works have been conducted on cooperation communication in wireless networks for recent years. Two main cooperative modes amplify-and-forward (AF) and decode-and-forward (DF) are proposed in literatures. In this paper, we present a novel cooperation mode selection method, Maximum Throughput Cooperation Mode (MTCM). MTCM selects optimal communication modes, including direct transmission, AF and DF to maximize the system throughput. In MTCM, the transmission errors are taken into consideration. The simulations are performed to validate the theoretical results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.