By Topic

Communications and Networking in China (CHINACOM), 2012 7th International ICST Conference on

Date 8-10 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 175
  • [Front matter]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (74 KB)  
    Freely Available from IEEE
  • Contents

    Page(s): iii - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (145 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): xvi - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (41 KB)  
    Freely Available from IEEE
  • Conference organization

    Page(s): xviii - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (1298 KB)  
    Freely Available from IEEE
  • MRS: A click-based multipath routing simulator

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (583 KB) |  | HTML iconHTML  

    The ability to forward traffic on multiple paths would be useful for customizing paths for different applications, improving reliability and balancing load. In order to evaluate the behaviour and performance of multipath routing protocols both simulators and test beds are often used. The simulator is used in the first stages and the test bed is used in the final stages of the development process. However, when moving from simulation to test bed, source code usually needs to be re-implemented. In this paper, we present MRS to address these issues. It was constructed by embedding the Click Modular Router inside of the NS2 simulator. The source code with MRS may run on an actual system as well as under a simulator with minor modifications. We implement a multipath routing protocol called AMIR in MRS. Simulation results show that MRS is a useful and effective tool for evaluating multipath routing protocols. The results also indicate that multipath routing has a greater advantage in improving network performance than single-path routing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth configuration for fractional Brownian motion traffic

    Page(s): 7 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (186 KB) |  | HTML iconHTML  

    In DiffServ-aware traffic engineering, a key issue is how to properly allocate bandwidth for different DiffServ class types. Recently, a cumulative allocation strategy, called the Russian doll model (RDM), has gained intensive interests in IETF. The basic RDM, however, only describes the necessary condition of a stable queuing system: the utilization factor must be less than unit. When applied to the real world, the RDM must take the measures of QoS into account. In this paper, we establish a QoS-aware RDM on the fractional Brownian motion process model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Play patterns for path prediction in multiplayer online games

    Page(s): 12 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1332 KB) |  | HTML iconHTML  

    Traditional dead reckoning schemes predict a player's position by assuming that players move with constant force or velocity. However, because player movement is rarely linear in nature, using linear prediction fails to produce an accurate result. Among existing dead reckoning methods, only few focus on improving prediction accuracy via genuinely non-traditional methods for predicting the path of a player. In this paper, we propose a new prediction method based on play patterns. We implemented a 2D top-down multiplayer online game to act as a test harness that we used to collect play data from 44 experienced players. From the data for half of these players, we extracted play patterns, which we used to create our dead reckoning algorithm. A comparative evaluation proceeding from an extensive set of simulations (using the other half of our play data) suggests that our EKB algorithm yields more accurate predictions than the IEEE standard dead reckoning algorithm and the recent “Interest Scheme” algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallelizing sequential network applications with customized lock-free data structures

    Page(s): 18 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (252 KB) |  | HTML iconHTML  

    Parallelizing fine-grained network applications on general-purpose multi-core architectures is a big challenge, as it requires fast core-to-core synchronization that is not supported for now. This paper proposes a methodology for parallelizing legacy sequential network applications on multi-core architectures with only minor code rewriting. Single Program Multiple Data (SPMD) parallel programming style is used to retain the control flow of sequential code, and then data structures potentially involving data racing are replaced with customized lock-free data structures based on domain knowledge. We evaluate the methodology by parallelizing a sequential TCP SYN flood detection program on Intel Quad processors, and gain inspiring results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the feasibility of common-friend measurements for the distributed online social networks

    Page(s): 24 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (143 KB) |  | HTML iconHTML  

    Distributed social networks have emerged recently. Nevertheless, recommending friends in the distributed social networks has not been exploited fully. We propose FDist, a distributed common-friend estimation scheme that estimates the number of common-friends between any pair of users without disclosing the friends' information. FDist uses privacy-preserving common-friend measurements to collect a small number of common-friend samples, and uses low-dimensional coordinates to estimate the number of common friends to other users. Simulation results on real-world social networks confirm that FDist is both scalable and accurate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for DNS names identical resolution

    Page(s): 30 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (324 KB) |  | HTML iconHTML  

    Internet users hope that some of names in the DNS name space can get the same DNS resolution results. With the development of internationalized domain name (IDN) protocols, more and more IDNs including Chinese domain names are added into the DNS name space and many of them are expected to be identical in the DNS resolution. How to make the DNS name resolution equivalence becomes more critical. Current solutions including CNAME and DNAME can not solve this problem. This paper proposes a MNAME solution for DNS names identical resolution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Availability analysis of DNSSEC resolution and validation service

    Page(s): 35 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (491 KB) |  | HTML iconHTML  

    Availability of DNSSEC resolution and validation service against man-in-the-middle attacks are analysed in this paper, and possible vulnerabilities are introduced and classified. Experiments show DNSSEC client is vulnerable because the attacks are always successful, but they are failed to recursive server, at the same time, attacks to recursive server will bring about numerous retries, and the number of retries depends on the number of root domain name servers, top-level servers and authority servers, and this can be exploited to launch denial of service attacks to recursive server. The results show the availability of DNSSEC service is poor against man-in-the-middle attacks. Conclusions are valuable to the optimization of DNSSEC recursive server application, as well as DNSSEC security analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Bayesian Compressed Sensing based localization in wireless networks

    Page(s): 43 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (205 KB) |  | HTML iconHTML  

    This paper exploits the most recent developments in sparsity approximation and Compressed Sensing (CS) to efficiently perform localization in wireless networks. Based on the spatial sparsity of the mobile devices distribution, a Bayesian Compressed Sensing (BCS) scheme has been put forward to perform accurate localization. Location estimation is carried out at a network central unit (CU) thus significantly alleviating the burden of mobile devices. Since the CU can observe correlated signals from different mobile devices, the proposed method utilizes the common structure of the received measurements in order to jointly estimate the locations precisely. Moreover, when the number of mobile devices changes, we increase or decrease the measurement number adaptively depending on “error bars” along with precedent reconstruction processes. Simulation shows that the proposed method, i.e. Adaptive Multi-task BCS Localization (AMBL), results in a better accuracy in terms of mean localization error compared with traditional localization schemes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GPP-based soft base station designing and optimization (invited paper)

    Page(s): 49 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (377 KB) |  | HTML iconHTML  

    In this paper, we compared several software defined radio platforms and proposed the general architecture of GPP (General Purpose Processor)-based soft base stations. Then, we studied on the scheme design of resource allocation and algorithm optimization in soft base station implementation. Finally, as an instance of our study above, a prototype of GPP-based soft base station referring to 3GPP LTE was realized and evaluated. With its evaluated performance, GPP's capability on processing high speed wireless signal flow was verified, which showed us a promising prospect for GPP-based soft base stations in the next generation wireless systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A radio over fiber link for the wireless distribution of 3-Gb/s uncompressed HD video (invited paper)

    Page(s): 54 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (517 KB) |  | HTML iconHTML  

    A radio over fiber link for the wireless distribution of 3-Gb/s uncompressed HD video is developed. The power fading caused by the dispersion of the optical fiber is effectively reduced by using a polarization modulator (PolM) in the transmitter. In the receiver, an injection-locked frequency-doubling optoelectronic oscillator (OEO) is employed to simultaneously extract the RF carrier and perform photonic microwave downconversion. The system features simple configuration, high performance and stable operation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PNN-based QoE measuring model for video applications over LTE system

    Page(s): 58 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (288 KB) |  | HTML iconHTML  

    Users' quality of experience (QoE) is a key factor in the success of video applications over the Long Term Evolution (LTE) networks. Thus, evaluating the QoE of video applications is of tremendous importance in design and optimization of wireless video processing and transmission systems. In this paper, we propose a QoE measuring model for the quality of video applications by using probabilistic neural network (PNN). We conduct a subjective test, in which OPNET modeler is employed to build a system level simulation platform for the wireless network and distortion is added into original video sequences when transmitting on the platform. A subject pool is utilized to evaluate the distorted videos. Based on the subjective test, we create a distorted-video database. PNN is used to train the mapping function between the corresponding parameters and QoE. The results demonstrate the effectiveness of the proposed model and show that it can provide a high correlation rate with human perception. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection algorithms for physical network coding

    Page(s): 63 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (228 KB) |  | HTML iconHTML  

    This paper investigates multi-user detection (MUD) as well as virtual single-user detection (VSUD) for denoising-based physical network coding in two-way relay channels. In MUD, the two source messages are detected separately and then mapped into a relaying message. In VSUD, the relaying message is obtained directly by detecting the received signal. Maximum likelihood (ML) algorithm and linear algorithms are considered for both single-antenna case and multi-antenna case with and without transmit power and phase control. Suboptimal detection algorithms with lower complexity are also proposed for VSUD. Simulation results show that ML VSUD can achieve better BER performance than ML MUD. The proposed detection algorithms can achieve similar BER performance to ML VSUD . View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection for two-way relay MIMO channels

    Page(s): 68 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (205 KB) |  | HTML iconHTML  

    We investigate virtual single user detection (VSUD) for physical network coding in two-way relay MIMO channels. We propose (non)-linear detection algorithms which are derived from maximum-likelihood (ML) structure. Simulation results show that VSUD with ML detection can achieve the best performance. VSUD with Euclidian distance based detection provide the same performance as multiple user detection with ML detection. And VSUD with the proposed linear detection outperforms MUD with MMSE detection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOPC-based cooperative awareness nodes in smart multimedia sensor networks

    Page(s): 71 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1034 KB) |  | HTML iconHTML  

    The design mind of SOPC (System on Programmable Chip), hardware & software co-design, will bring the system optimization with larger degree of freedom. It will establish the foundation on realizing the miniaturization and more efficient local preprocessing in smart cooperative sensor networks. In this contribution, a solution is proposed for smart multimedia sensor nodes based on the SOPC framework, aiming at improving the on-board processing capability and the degree of freedom in development. This paper mainly presents the structure and design method of the smart cooperative multimedia sensor node based on SOPC. The on-board feature extraction is realized and some correlative experimental data and results are presented as well. The experimental results evaluate the feasibility and efficiency of the proposed node design method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and application on LTE technology in smart grids

    Page(s): 76 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (542 KB) |  | HTML iconHTML  

    The development of smart grid requires higher data rate and wider coverage for current communication networks. What's more, the communication network should be rapidly and flexibly deployed in emergency situation. In this paper, we first investigate the requirements of communication network in smart grid. Then application of LTE in normal and emergency situations in smart grid is proposed. Finally, the network architecture and the optimize strategies of LTE system in smart grid are discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research of time unified system in smart grid

    Page(s): 81 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (395 KB) |  | HTML iconHTML  

    According to the intelligent substation and the increasing synchronization requirements of Green Power Grid, it is important to establish a communication support network of time synchronization in the whole power grid. This paper offers a comprehensive introduction and detailed analysis of the basic concept, signal type and the networking technology of time synchronization. According to the application requirements of power system in Yunnan Power Grid and the characteristics of power communication network, the DCLS +NTP time synchronization networking mode based on SDH+IP network, the NTP time synchronization networking mode based on IP network, the PTP time synchronization networking mode based on SDH +IP network and the PTP time synchronization networking mode based on PTN+OTN in future are investigated , they will be the reference of time synchronization network formation in Yunnan Power Grid. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal exploitation of renewable energy for residential smart grid with supply-demand model

    Page(s): 87 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (901 KB) |  | HTML iconHTML  

    Future smart grid has been widely conceived to be featured by its flexible supply-demand management and great exploitation of renewable energy. However, due to the volatility of renewable sources, exploitation of renewable energy introduces uncertainty in energy supply. Therefore, it is of practical importance to quantify the optimal exploitation of renewable energy based on the supply-demand framework for future smart grid, where the energy-providers (or the energy-users) adaptively adjust their energy-provisioning (or energy-demands) according to the system information that takes account of the volatility of renewable energy. In this work, we consider a residential smart grid equipped with a centralized renewable source as a supplement to the electricity acquired from the grid. Our model aims at: i) quantifying the optimal exploitation of renewable energy that trades off between the system-wide benefit from using the renewable energy and the associated cost due to its volatility, and ii) characterizing how the volatility of renewable energy influences its optimal exploitation. An efficient distributed algorithm is proposed to determine the optimal utilization of renewable energy as well as the associated energy scheduling decisions based on the supply-demand model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative interference mitigation for indoor dense femtocell networks

    Page(s): 93 - 98
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1517 KB) |  | HTML iconHTML  

    It has been predicted that the total mobile traffic in the world will have a ten-fold growth from 2011 to 2016. Moreover, it is estimated that over 80% of the mobile traffic is generated indoors. Massive indoor femtocells are expected to be set up for offloading indoor users from outdoor macrocells and to provide huge capacity to meet high data demands. However, inter-cell interference between femtocells is one of the major challenges in indoor deployments and needs to be addressed in the network planning phase. In this paper, interference mitigation schemes for indoor dense deployment of femtocells are investigated, and a cooperative transmission scheme and a semi-static interference mitigation scheme based on fractional frequency reuse (FFR) are developed for dense femtocell networks. Extensive simulations using a dedicated indoor network planning and optimization tool, iBuildNet®, are carried out to evaluate the proposed schemes. Simulation results show that the proposed schemes are able to yield significant gains in terms of average throughput. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Downlink subchannel power allocation for multicell WRANs considering inter-cell interference

    Page(s): 99 - 102
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (114 KB) |  | HTML iconHTML  

    OFDMA modulation is utilized for downlink and uplink communications in IEEE 802.22 wireless regional area network(WRAN). Because a base station (BS) uses omnidirectional antenna for downlink communications, BS will interfere with consumer premise equipments (CPEs) which use the same subchannel in other cells. Every BS wants to maxmize its sum downlink rate when minimizing co-channel interference with other cells. This can be seen as a noncooperative game. We have proved the game was an exact potential game (EPG) and found potential function. We use distributed iterative waterfilling power allocation (DIWPA) algorithm to find Nash equilibrium (NE) of EPG. Simulation result indicates DIWPA can achieve more dowmlink rate in evidence compared to the way which is called average power allcation (APA) algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid overlay/underlay waveform for cognitive radio associated with fractional Fourier transform

    Page(s): 103 - 108
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (621 KB) |  | HTML iconHTML  

    Spectrum congestion problem is mainly caused by the inefficient spectrum usage. Cognitive radio (CR) and emerging soft decision CR (SDCR) have attracted wide interest as candidates to solve this problem. The former determines unused spectral regions and transmits overlay signals in these bands. The latter exploits both unused and occupied spectral regions simultaneously and dynamically adapts its spectra response according to time-varying environmental conditions. However, enabling waveforms of SDCR are sinusoidal signals and can not be separated from licensed signals completely. In this paper, we provide a novel waveform design method for CR based on the fractional Fourier transform. We first present a novel hybrid underlay/overlay waveform design method and then propose a system model for CR using the derived results. Moreover, theoretical analysis is also given. The validity of the theoretical derivations is demonstrated via simulations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.