By Topic

Future Internet Communications (BCFIC), 2012 2nd Baltic Congress on

Date 25-27 April 2012

Filter Results

Displaying Results 1 - 25 of 46
  • [Copyright notice]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (87 KB)  
    Freely Available from IEEE
  • Program

    Page(s): 2 - 7
    Save to Project icon | Request Permissions | PDF file iconPDF (155 KB)  
    Freely Available from IEEE
  • Committees

    Page(s): 8
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • Technical Program Committee

    Page(s): 9 - 10
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB)  
    Freely Available from IEEE
  • Wireless Sensor Networks in industrial environment: Real-life evaluation results

    Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (890 KB) |  | HTML iconHTML  

    The paper summarizes the results of the RealFusion project. One of the main objectives of this project was to study the Wireless Sensor Networks (WSN) in real-life industrial environment. The results for the evaluation of different radios utilizing 433 MHz, 868 MHz and 2.4 GHz license-free industrial, scientific and medical (ISM) bands in real-life industrial environment are presented in the paper. Also, the paper discusses the results of development and evaluation of two real-life industrial WSN use cases: the WSN for remote monitoring the amount of bulk substances in the silos of a refractory materials factory and the WSN for remote warehouse monitoring. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video streaming in wireless sensor networks with low-complexity change detection enforcement

    Page(s): 8 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (607 KB) |  | HTML iconHTML  

    Video streaming applications in wireless sensor networks are attractive for enabling new pervasive high value services. The reduced amount of available bandwidth in such networks imposes the transmission of small size video frames at very low frame rates. Moreover, when compression techniques cannot be applied, due to constrained computational capabilities of sensor nodes, and uncompressed video frames must be sent through the network, lower image sizes and frame rates must be adopted. In such a scenario, when higher frame rates are required or multiple video streams must be enabled the required transmission bandwidth of each stream must be reduced. In this paper we present a low-complexity algorithm based on change detection which reduces the transmission bandwidth of a video stream based on raw images. Performance results show how the proposed technique can reduce the transmission bandwidth up to 87.22% and 66.78%, with respect to a flat video stream transmission, when low and high changes are experienced in the monitored scene. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interconnecting IPv6 wireless sensors with an Android smartphone in the Future Internet

    Page(s): 14 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (607 KB) |  | HTML iconHTML  

    To fulfill the vision of the Future Internet a ubiquitous deployment of IPv6 is a necessity. The work presented in this paper combines networking technologies and mobile software application development to support interworking of mobile devices and smart objects. We report on the implementation of an Android IPv6 smartphone that interworks with Web-enabled wireless sensors in the Internet of Things. This includes a possible network setup for IPv4/IPv6 interworking by using a public tunnel broker service. The demonstrated solution is universal, since the Android device can be connected to any IP network, even where a Network Address Translation (NAT) device is deployed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A realization of cognitive pilot channels through wireless billboard channel infrastructure for cognitive radio

    Page(s): 19 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1493 KB) |  | HTML iconHTML  

    This paper proposes an out-band cognitive pilot channel (CPC) solution for cognitive radio systems and networks. The solution exploits wireless billboard channel (WBC) technology which was originated to play a key role in a ubiquitous consumer wireless world (UCWW) environment [1, 2]. The paper shows how the WBC technology and variety of potential WBC downlink platforms match the requirements of the CPC scheme, with their main goal of enabling the transfer to mobile terminals (MTs) of available knowledge of the wireless operational and geographical environment, established policies and internal state of any usable and accessible `cognitive spectrum'. The paper sets out the three-layer WBC/CPC system architecture, with specific emphasis on the top service layer and the CPC `service descriptions', and includes also details on the link and physical layers for a `WBC/CPC over DVB-H' platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vehicle-to-infrastructure communication based on 802.11n wireless local area network technology

    Page(s): 26 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1218 KB) |  | HTML iconHTML  

    Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) technology can support highly mobile users to obtain Internet connectivity. Wireless access for the vehicular environment (i.e. IEEE802.11p) provides the required principal standardization for vehicle-to-vehicle V2V solution and supported raw data rate up to 27 Mbps. This standard mainly is oriented on urgent short message transmission. Otherwise, for transmission of large amount of data, for instance file transmission for Internet, alternative solutions may be proposed. In this paper we present an experimental study of IEEE802.11n with diminished settings compared to the legacy system (i.e. IEEE802.11g) using off-the-shelf devices in vehicle-to-infrastructure scenario. In order to evaluate V2I type of communication in the large scale scenario, in this paper we propose an analytic model to characterize the goodput of WLAN-based networks using Buzen's method and Markov process.short message transmission. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Should next generation wireless mesh networks consider dynamic channel access?

    Page(s): 32 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (358 KB) |  | HTML iconHTML  

    The increasing demand for large and low cost wireless coverage, ranging from campus to city wide areas, has motivated a high interest in multi-hop communications with IEEE 802.11s as the most significant and successful standard for wireless mesh networks. Although IEEE 802.11s introduces new interworking, routing and wireless frame forwarding at the link layer, the multi channel architecture receives less attention. In this paper we provide insights into the IEEE 802.11s standard and explain some channel assignment (CA) protocols which can be considered for wireless mesh networks to improve their performance by limiting the negative interference effects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 802.11g relaying MAC that saves energy

    Page(s): 40 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1141 KB) |  | HTML iconHTML  

    In this paper we focus on energy efficient opportunistic relaying in WLANs. We propose and examine an extension to IEEE 802.11g MAC protocol that enables self-enforced relaying, where the main idea behind the relaying is to decrease overall energy expenses in WLANs. Since frame transmission and reception require spending some energy by wireless nodes as well as access points, it is desirable for every node in a wireless system to get access to the channel as fast as possible and occupy it for a reasonably short period. In our proposal the protocol extension uses RTS/CTS mechanisms to precede every transmission and employs intermediate nodes which may serve as relays. Potential relays in the network are self-motivated to perform as helpers since remaining in idle mode or waiting for channel access also requires energy. Therefore, by helping other ongoing transmissions, relays may decrease total transmission time and increase their possibility of being awarded faster access to wireless medium, which eventually yields decrease in energy consumptions. Experimentation results prove that opportunistic relaying provides energy savings in 802.11g-based WLANs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MTBO - a metric for assessing production failure rates in telecommunications networks

    Page(s): 46 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (320 KB) |  | HTML iconHTML  

    The Mean Time Between Outages (MTBO) metric provides the frequency of failures in telecommunications network elements (hardware and software) attributed to equipment supplier. By contrast, the traditional Mean Time Between Failures (MTBF) metric only addresses total failures that lead to element replacement. MTBO allows us to capture short duration outages (of the order of 1 second) which can interrupt such services as streaming video, telepresence, and online gaming. In contrast, the traditional Availability metric is not sensitive to short duration outages in the presence of long duration failures. Application of MTBO is demonstrated for a wide range of network elements in wire-line and wireless networks including IP routers, Ethernet networks connecting a large number of cell routers to a redundant concentrator, mobility equipment with redundancy and power amplifiers in the Universal Mobile Telecommunications System (UMTS) base station (nodeB). Requirements to MTBO measurement tools are outlined. In case of hardware failures, the router MTBO is evaluated using absorbing Markov models. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation of maximum distance reach for spectrally efficient combined WDM systems

    Page(s): 52 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1016 KB) |  | HTML iconHTML  

    The authors have investigated the maximum distance reach for wavelength division multiplexed (WDM) fiber optic transmission system (FOTS) where optical signals are transmitted with two different per channel bitrates (i.e., 10 and 40 Gbit/s) and for optical signal modulation three different modulation formats are used, such as NRZ-OOK, 2-POLSK and NRZ-DPSK. These chosen formats encode information by manipulating with the different optical signal freedom degrees: amplitude, phase and state of polarization. The system's maximum distance reach was detected for the worst case scenario of the spectrally most efficient WDM system's configuration: [1st, 4th and 7th channels: NRZ-OOK, R= 10 Gbit/s] - [2nd, 5th and 8th channels: 2-POLSK, R=40 Gbit/s] - [3rd, 6th and 9th channels: NRZ-DPSK, R=40 Gbit/s]. It was done using iteration loops that consisted from chromatic dispersion compensation module (DCM), optical signal inline amplifier and one span of standard single mode fiber (SSMF). One such loop emulates one sector of a fiber optic transmission line (FOTL). It is found that the maximum distance reach strongly depends on the investigated system's average spectral efficiency and the length of used SSMF span. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regulatory framework and technical aspects of broadband access to the Internet in Europe

    Page(s): 56 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (942 KB) |  | HTML iconHTML  

    This paper deals with the regulatory framework and technical aspects of broadband access to the Internet in Europe. It begins with a concise presentation of the most important conditions of the European Parliament and European Council regulatory framework. It goes on to describe briefly how the package directives 2009/140/WE and 2009/136/WE are being implemented in Poland and Germany. Following that, there is a discussion of the main network parameters involved in the evaluation of quality of network access according to the European Telecommunications Standards Institute (ETSI). Next, the tool “Measurement Lab” is described briefly, and measurements of QoS that have been conducted with the tool are presented graphically, and interpreted. The paper concludes with a summary and outlook on further work. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of chromatic dispersion compensation techniques for WDM-PON solution

    Page(s): 64 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (940 KB) |  | HTML iconHTML  

    The upper transmission range of the wavelength division multiplexing passive optical network (WDM-PON) can be restricted by chromatic dispersion (CD). This paper contains the investigation of till 16-channel WDM-PON system with efficient CD pre-compensation and post-compensation methods. It is shown that CD offset has a marginal role for guaranteed optical link downstream performance and maximum length of high-speed WDM-PON system. The results show that employment of extra 7 km long dispersion compensating fiber (DCF) placed in central office (pre-compensation configuration) enhances the WDM-PON network link length by 19.3% (from 57 km up to 68 km), but if extra 2 km long DCF fiber is used in remote terminal (post-compensation configuration) link length can be extended up to 5.3% (from 57 km to 60 km). It was found that usage of fiber Bragg grating (FBG) in central office (pre-compensation configuration) improves network reach up to 26.3% (from 57 km up to 72 km), but using this FBG for CD post-compensation in remote terminal network reach can be improved by 15.8% or 9 km in length - from 57 km to 66 km. Basis on the results authors recommend to use FBG as the best solution for CD compensation in pre-compensation configuration (before SMF line) in future high speed long-reach DWDM-PON systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Socio-organism inspired model forming multi-level computational scheme for integrated IoT service architecture

    Page(s): 68 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1772 KB) |  | HTML iconHTML  

    An ambitious goal is to unify the existing global Internet of Things (IoT) architectures. This paper offers a concept for extending the functions of IoT objects in order to obtain an integrated, advanced IoT infrastructure. It is accomplished by composing an IoT architecture that imitates brain-neural systems of living organisms and creating an intelligent framework inspired by human-to-human socio interactions that will serve as a model for machine-to-machine interactions. By gaining an understanding of this concept, researchers will be inspired to shape this unified IoT infrastructure by multi-level computation approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling secure multitenancy in cloud computing: Challenges and approaches

    Page(s): 72 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (290 KB) |  | HTML iconHTML  

    Cloud computing provides a multitenant feature that enables an IT asset to host multiple tenants, improving its utilization rate. The feature provides economic benefits to both users and service providers since it reduces the management cost and thus lowers the subscription price. Many users are, however, reluctant to subscribe to cloud computing services due to security concerns. To advance deployment of cloud computing, techniques enabling secure multitenancy, especially resource isolation techniques, need to be advanced further. Difficulty lies in the fact that the techniques range and cross various technical domains, and it is difficult to get the big picture. To cope with that, this paper introduces technical layers and categories, with which it identifies and structures technical issues on enabling multitenancy by conducting a survey. Based on the survey result, this paper discusses technical maturity of multitenant cloud computing from the standpoint of security and the needs for developing both technical and operational security toward the development and wide deployment of multitenant cloud computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measures to the supervision system of the regional Internet

    Page(s): 80 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (620 KB) |  | HTML iconHTML  

    The study discusses one of the Internet development problems, emerging due to the fact that the regional Internet infrastructure is shaped without a systematic project, covering the entire region's network and without the tools for systematic monitoring of the state of the network. The monitoring system has been suggested, based by the concept of Internet infrastructure vulnerability analysis, incidents investigations by CERT and use of monitoring tools, based by the SNMP protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a gateway overlay network to achieve secure and scalable network interconnection

    Page(s): 84 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (774 KB) |  | HTML iconHTML  

    In this paper we discuss an approach to build a secure and scalable network interconnection mechanism based on a gateway overlay network for address-less, identifier-based networks. The purpose of the overlay network is twofold. First, it provides a mapping between end-node identifiers and gateway identifiers. Second, it is the mechanism used to deliver messages from one network to another. As the underlying network infrastructure, our proposal supports many network infrastructures, such as the current and future Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some results on network mobility stress testing

    Page(s): 92 - 99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2371 KB) |  | HTML iconHTML  

    In the last few years, several IP network mobility proposals have come to light. Nevertheless, as none of these solutions has been deployed, the respective studies on functional characteristics, performance, scalability and signalling load are mostly limited to simple proof-of-concept studies, in reduced-size lab settings and/or simulated environments, with low or modest traffic loads. This paper presents a comparative study of three network mobility solutions - one of them proposed by the authors - with which it is intended to evaluate their behaviour under heavy load traffic. The study resorts to a network mobility emulator developed by the authors. After performing an extensive set of tests, based on the obtained results we are able to conclude that the proposed network mobility solution has clear performance advantages over other, more traditional solutions, regardless the number of mobile nodes, packet inter-arrival times, number of nesting levels, and percentage of route-optimised flows. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Academic computer network traffic statistical analysis

    Page(s): 100 - 105
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (819 KB) |  | HTML iconHTML  

    The article presents the statistical analysis results of an academic computer network traffic using the data gathered with NetFlow protocol. Results of the statistical analysis are presented in a visual manner which reveals the tendencies of computer network traffic distributions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel fuzzy logic based bufferless routing algorithm for low-power NoCs

    Page(s): 106 - 112
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (603 KB) |  | HTML iconHTML  

    This paper presents a novel, adaptive routing algorithm aimed at bufferless NoC; although it can also be applied to buffered NoCs as well. It is based on a fuzzy logic routing scheme that aims at reducing power consumption by routing incoming traffic according to a different routing approach than conventional bufferless routers. More specifically, in order to decide on the output port of an incoming flit, the algorithm takes into account traffic and dynamic power consumption on neighboring router links. The additional digital logic required for the proposed algorithm is not in the router critical path, and, therefore, imposes no additional latency. Experimental results include hardware implementation figures that prove the validity of the proposed routing algorithm concerning the overhead it imposes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a hybrid approach to SoC estimation for a smart Battery Management System (BMS) and battery supported Cyber-Physical Systems (CPS)

    Page(s): 113 - 116
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (712 KB) |  | HTML iconHTML  

    One of the most important and indispensable parameters of a Battery Management System (BMS) is to accurately estimate the State of Charge (SoC) of battery. Precise estimation of SoC can prevent battery from damage or premature aging by avoiding over charge or discharge. Due to the limited capacity of a battery, advanced methods must be used to estimate precisely the SoC in order to keep battery safely being charged and discharged at a suitable level and to prolong its life cycle. We review several existing effective approaches such as Coulomb counting, Open Circuit Voltage (OCV) and Kalman Filter method for performing the SoC estimation. Then we investigate both Artificial Intelligence (AI) approach and Formal Methods (FM) approach that can be efficiently used to precisely determine the SoC estimation for the smart battery management system as presented in [1]. By using presented approach, a more accurate SoC measurement can be obtained for the smart battery management system and battery supported Cyber-Physical Systems (CPS). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A self-test and self-repair approach for analog integrated circuits

    Page(s): 117 - 120
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    With the continuous increase of integration densities and complexities, secure integrated circuits (ICs) are more and more required to guarantee reliability for safety-critical applications in the presence of soft and hard faults. Thus, testing has become a real challenge for enhancing the reliability of safety-critical systems. This paper presents a Self-Test and Self-Repair approach which can be used to tolerate the most likely defects of bridging type that create a resistive path between VDD supply voltage and the ground occurring in analog CMOS circuits during the manufacturing process. The proposed testing approach is designed using the 65 nm CMOS technology. We then used an operational amplifier (OPA) to validate the technique and correlate it with post layout simulation results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perceptual voice communications in IEEE802.15.4 networks for the emergency management support

    Page(s): 121 - 126
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (414 KB) |  | HTML iconHTML  

    Voice communication in IEEE802.15.4 networks is an attractive application for the emergency management support when a disaster occurs. Although this application can be of extreme utility in the immediate consequence of the disaster, it must take into account the bandwidth limitations of the IEEE802.15.4 standard, which allows the simultaneous transmission of a small number of voice streams. When more voice streams must be transmitted through the network, a bandwidth reduction of each speech flow must be performed. In this paper we first present an algorithm for the perceptual selection of voice data aiming at reducing the speech flow bandwidth while preserving as much as possible the end-to-end speech quality, then we propose a voice data protection technique based on speech perceptual importance and able to preserve speech quality against packet losses. The perceptual selection algorithm can reach a 30.8% reduction in bandwidth occupancy, with respect to a full rate voice communication, still maintaining an end-to-end speech quality between good and fair according to the Mean Opinion Score scale defined by the International Telecommunications Union. The protection technique, jointly adopted with the perceptual selection, can reach better end-to-end speech quality values with respect to a full rate voice communication while requiring a lower amount of transmission bandwidth. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.