2013 Australasian Telecommunication Networks and Applications Conference (ATNAC)

20-22 Nov. 2013

Filter Results

Displaying Results 1 - 25 of 47
  • Index

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Welcome

    Publication Year: 2013, Page(s):1 - 5
    Request permission for reuse | PDF file iconPDF (130 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program

    Publication Year: 2013, Page(s):1 - 5
    Request permission for reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):1 - 4
    Request permission for reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Technical program committee

    Publication Year: 2013, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Other reviewers

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2013, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2013, Page(s):1 - 3
    Request permission for reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Optimum power allocation for sensor networks that perform object classification

    Publication Year: 2013, Page(s):1 - 6
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    This publication analyzes the power allocation problem for a distributed sensor network. We consider a network that may have power-limited sensor nodes and is used for target object classification. In the classification process, the absence, the presence, or the type of a target object is observed by the sensor nodes independently. Since the observations are noisy, and are thus unreliable, they ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model of self deployment to maximise area coverage in sensor networks

    Publication Year: 2013, Page(s):7 - 12
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (851 KB) | HTML iconHTML

    A wireless sensor network (WSN) is a self-configuring network of sensor nodes connected by wireless links. The nodes are low cost devices each equipped with sensors, a wireless transceiver with limited range, a processor of limited capacity and a limited amount of storage, bandwidth and energy. Each sensor node is mobile and can make observations within a circular area centred on its own location.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient mobility management using simplified cellular IP

    Publication Year: 2013, Page(s):13 - 18
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    Mobile IP is useful for providing mobility of Internet users but it has shown its limitations in various aspects such as simplicity, robustness and scalability, particularly with fast moving users requiring many handoffs. A hierarchical structure using micromobility helps to reduce the control signalling overhead associated with handoff by localizing handoff management in a given coverage area and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hunter friendly fire avoidance: Modeling a wireless solution

    Publication Year: 2013, Page(s):19 - 24
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1459 KB) | HTML iconHTML

    Friendly fire is a common problem during hunting which can regularly result in a fatality of friends or family. Of the different forms of friendly fire one regular cause is the miss-identification of a target prior to discharging a weapon. Background research has shown many existing systems have made different attempts at target recognition to overcome this friendly fire problem however are yet to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantifying the performance degradation of IPv6 for TCP in windows and Linux networking

    Publication Year: 2013, Page(s):25 - 29
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    Implementing IPv6 in modern client/server operating systems (OS) will have drawbacks of lower throughput as a result of its larger address space. In this paper we quantify the performance degradation of IPv6 for TCP when implementing in modern MS Windows and Linux operating systems (OSs). We consider Windows Server 2008 and Red Hat Enterprise Server 5.5 in the study. We measure TCP throughput and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow-aware networking as an architecture for the IPv6 QoS Parallel Internet

    Publication Year: 2013, Page(s):30 - 35
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    The IPv6 QoS is one of the Parallel Internets proposed as a part of the IIP System researched and developed under the Future Internet Engineering Project. IIP System assumes that it is possible and reasonable to virtually divide current Internet into three Parallel Internets. In this way three architectures may co-exist over one physical topology. Three Parallel Internets have been defined under t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling analysis of the internet traffic structural dynamics

    Publication Year: 2013, Page(s):36 - 40
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Internet traffic structurally consists of sessions, flows and packets; and traverses through different tiers of service providers during its end-to-end journey. We address the phenomena of Scaling (second-order) exhibited by Internet traffic in this paper. Understanding this Scaling behavior is important because: for the lower time scales it can affect queuing, buffering or switching performance; ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the accuracy of leveraging SDN for passive network measurements

    Publication Year: 2013, Page(s):41 - 46
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    Network Measurement has emerged as one promising field of application for Software Defined Networking. The reason for this is that the logically centralized control plane of an SDN network inherently has to aggregate network state information in order to function. This circumstance can be leveraged for network measurements at the SDN controller without the need for additional equipment or active -... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A delay-based void filling DBA in long-reach EPON for multimedia services

    Publication Year: 2013, Page(s):47 - 51
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    Long-reach passive optical networks are one of the proposed solutions to the merging of access and metro networks into a single system for lowering deployment costs. As propagation delays increase proportional to the network range, new designs of scheduling and bandwidth distribution schemes need to be considered to mitigate its effects on overall packet delay. This paper presents an interleaved p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of multistage switching networks

    Publication Year: 2013, Page(s):52 - 56
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (855 KB) | HTML iconHTML

    A new method for performance analysis of multistage interconnection networks is presented. Using the idea of a generalized traffic source, it overcomes the problems and limitations encountered in the existing methods and can capture a larger variety of switching networks. A higher flexibility of this method to consider diverse traffic patterns is also reported. The method is simple yet powerful en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of round trip time in distributed real time system architectures

    Publication Year: 2013, Page(s):57 - 62
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    Real-time distributed systems often utilize centralized nodes to manage and coordinate the exchange of information; in particular, for users to are unable to communicate directly because of their location behind firewalls or proxy servers. Identifying these nodes is crucial for successful operation of the entire distributed system. The geo-locational placement of these relay node can be determined... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feeder fiber and OLT protection for ring-and-spur long-reach passive optical network

    Publication Year: 2013, Page(s):63 - 68
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    Ring-and-spur long-reach passive optical network (LR-PON) is the optimal network architecture for next-generation passive optical network (NG-PON). Several protection architectures for LR-PON have been proposed and demonstrated. However, this paper introduces two protection architectures namely; OLT-only protected and OLT-and-ring protected architecture. The significance of the proposed protection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uplink VoIP capacity of 3GPP LTE under power control and semi-persistent scheduling

    Publication Year: 2013, Page(s):69 - 76
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    LTE-Advanced (LTE-A) standardized as Release 10 by the 3rd Generation Partnership Project (3GPP) is a packet-based 4G mobile radio system. Of specific interest is its capability to support a large number of voice calls through Voice over IP (VoIP) calls. Radio resource management for VoIP calls is challenging. Control channel limitations prevent the dynamic scheduling of every VoIP packet in each ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Route caching in DTNs interconnected by infrastructure

    Publication Year: 2013, Page(s):77 - 82
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (957 KB) | HTML iconHTML

    Numbers of mobile devices are sharply increasing in recent years. To deal with this mobility tendency, Delay and Disruption Tolerant Networks (DTN) has received significant research focus. In that context, infrastructure based DTN has promising application perspectives. In this paper, we present a route caching mechanism for infrastructure based DTN communication where the infrastructure connects ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the bit error probability for interference limited cooperative networks

    Publication Year: 2013, Page(s):83 - 88
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1426 KB) | HTML iconHTML

    We derive new upper and lower bounds on the bit error probability (BEP) of a cooperative cellular network. We consider a basic three-cell cluster with three users transmitting to three cooperative base stations. Different from existing works that only consider users within the cooperating cluster, we also take into account the impact of interference originating from users outside the cooperating c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigations on passive discovery schemes for IEEE 802.15.4 based Body Sensor Networks

    Publication Year: 2013, Page(s):89 - 94
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (620 KB) | HTML iconHTML

    In this paper, we investigate passive discovery of IEEE 802.15.4-based Body Sensor Networks (BSNs). BSNs are wearable networks that monitor the vital functions of the body while the person can roam around freely. One challenging task that BSNs has to perform is the discovery of certain coordinator nodes, for example gateways towards data processing and storage services. We are presenting a coopera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.