Vai al contenuto principale della pagina

Wired/Wireless Internet Communications [[electronic resource] ] : 13th International Conference, WWIC 2015, Malaga, Spain, May 25-27, 2015, Revised Selected Papers / / edited by Mari Carmen Aguayo-Torres, Gerardo Gómez, Javier Poncela



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Wired/Wireless Internet Communications [[electronic resource] ] : 13th International Conference, WWIC 2015, Malaga, Spain, May 25-27, 2015, Revised Selected Papers / / edited by Mari Carmen Aguayo-Torres, Gerardo Gómez, Javier Poncela Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Edizione: 1st ed. 2015.
Descrizione fisica: 1 online resource (XIX, 426 p. 181 illus.)
Disciplina: 004.678
Soggetto topico: Computer communication systems
Application software
Software engineering
Algorithms
Information storage and retrieval
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Algorithm Analysis and Problem Complexity
Information Storage and Retrieval
Persona (resp. second.): Aguayo-TorresMari Carmen
GómezGerardo
PoncelaJavier
Note generali: Bibliographic Level Mode of Issuance: Monograph
Nota di contenuto: Intro -- Preface -- Organization -- Keynote Speakers -- 5G for People and Things - Expandingthe Human Possibilities of Technology -- Efficient Networking in MillimeterWave-Bands -- Contents -- Wireless Technologies -- Downlink Packet Scheduling Algorithm Using Tabu Method in LTE Systems -- Abstract -- 1 Introduction -- 2 Related Work -- 3 System Model and Proposed Scheduling Algorithm -- 3.1 System Model -- 3.2 Proposed Scheduling Algorithm -- 3.2.1 Opt-Tabu Scheduler [14] -- 3.2.2 The Downlink Packet Scheduling Algorithm Using the Tabu Method (DPSA-Tabu) -- 4 Simulation Results and Discussions -- 4.1 Simulation Parameters -- 4.2 Simulation Results -- 4.2.1 System Throughput -- 4.2.2 Packet Loss Rate (PLR) -- 4.2.3 Fairness Index -- 4.2.4 Served Users -- 5 Conclusion -- References -- Online Charging Based on Machine Context for M2M Communication in LTE -- 1 Introduction -- 2 Related Work -- 3 M2M Communication Requirements -- 3.1 Description of Communication Requirements of Machines -- 3.2 Discussion on M2M Communication Postponement Capabilities -- 4 A Model of an M2M Service Context for Online Charging -- 4.1 Specification of M2M Service Context -- 4.2 Using M2M Service Context in Online Charging -- 5 Example: M2M Service for Smart Home -- 6 Conclusion -- References -- Cloud Computing-Based Message Dissemination Protocol for Vehicular Ad Hoc Networks -- 1 Introduction -- 2 Cloud Computing for VANET: Definition and Architecture -- 3 Related Work -- 4 Description of ClouDiV: Our Proposal -- 4.1 ClouDiV Routing Tables -- 4.2 ClouDiV Message Dissemination Phases -- 5 Performance Evaluation -- 5.1 Mobility Model and Parameter Settings -- 5.2 Significant Results and Discussion -- 6 Conclusion and Perspectives -- References -- PerformLTE: A Testbed for LTE Testing in the Future Internet -- 1 Introduction.
2 PerformLTE: A Testbed for Mobile Experimentation in the Future Internet -- 2.1 PerformLTE Methodology -- 2.2 Instrumented Mobile Devices -- 2.3 LTE Radio Access -- 2.4 Commercial LTE Deployments -- 2.5 Power Consumption Measurements in Mobile Devices -- 2.6 Post-processing and Reporting Tools -- 3 PerformLTE Towards 5G -- 3.1 5G Challenges and Trends -- 3.2 Future Work: PerformLTE Evolution -- 4 Conclusion -- References -- Analysis of CQI Traces from LTE MIMO Deployments and Impact on Classical Schedulers -- 1 Introduction -- 2 Characterizing LTE MIMO Channels -- 2.1 Coarse-Grain CQI Traces Through Field Testing -- 2.2 Fine-Grain CQI Traces Through LTE Emulation -- 3 Impact on Classical Scheduling Strategies -- 3.1 Simulation Methodology -- 3.2 Analysis of Results -- 4 Conclusions -- References -- Network Mobility and Mobility Management -- A Survey on Wireless Sensors Networks Security Based on a Layered Approach -- 1 Introduction -- 2 Physical and Data-Link Layers -- 2.1 PHY Layer -- 2.2 MAC Layer -- 2.3 Discussion -- 3 Network: IPv6 and Routing Protocol -- 3.1 6LowPAN -- 3.2 Type of Communication -- 3.3 Discussion -- 4 Upper Layers: Trust and Data Handling -- 4.1 CoAP and EXI -- 4.2 Analysis of the State of the Art on Trustiness for IoT -- 4.3 Discussion -- 5 Conclusions -- References -- A GPSR Enhancement Mechanism for Routing in VANETs -- Abstract -- 1 Introduction -- 2 Routing in VANETs -- 3 Proposed GPSR Enhancement -- 4 Reference Scenarios -- 4.1 Urban Area Scenario -- 4.2 Highway Scenario -- 5 Simulation Results -- 5.1 Urban Scenario Results -- 5.2 Highway Scenario Results -- 6 Conclusions and Future Work -- References -- AntWMNet -- A Hybrid Routing Algorithm for Wireless Mesh Networks Based on Ant Colony Optimisation -- Abstract -- 1 Introduction -- 2 AntWMNet -- 2.1 Data Structures -- 2.2 Reactive, On-demand Routing.
2.3 Proactive Operation -- 2.4 Link Failures -- 3 Evaluation Setup -- 3.1 Simulation Scenarios -- 3.2 Simulation Studies -- 3.3 Algorithms Comparison -- 4 Evaluation Results -- 4.1 AntWMNet Evaluation with Respect to Data Volume -- 4.2 AntWMNet Evaluation with Respect to the Number of Data Sessions -- 4.3 AntWMNet Evaluation with Respect to Network Size -- 5 Related Work -- 6 Conclusion -- Acknowledgments -- References -- Adaptive Beaconless Opportunistic Routing for Multimedia Distribution -- 1 Introduction -- 2 Related Work -- 3 Adaptive Context-Aware Beaconless or (CABR) -- 3.1 Network and System Model -- 3.2 Contention-Based Forwarding Mode -- 3.3 Persistent-Route Mode -- 4 Evaluation -- 4.1 Simulation Description and Evaluation Metrics -- 4.2 Simulation Results -- 5 Conclusions -- References -- Network Architecture and Applications -- Invariant Preserving Middlebox Traversal -- 1 Introduction -- 2 Middleboxes Implications -- 3 Architecture Overview -- 4 Path Selection -- 5 Evaluation -- 5.1 Evaluation Environment -- 5.2 Evaluation Results -- 6 Conclusions -- References -- BitWorker, a Decentralized Distributed Computing System Based on BitTorrent -- 1 Introduction -- 2 Related Work -- 2.1 Distributed Computing -- 2.2 BitTorrent and Distributed Hash Tables -- 2.3 Distributed Computing and Peer-to-Peer -- 2.4 BOINC -- 2.5 Gnutella Processing Unit -- 2.6 CompTorrent -- 3 BitWorker Fundamentals -- 4 Architecture -- 4.1 Implementation Overview -- 4.2 Meta-Information Task File -- 4.3 Task Interpretation -- 4.4 DHT Functionality -- 4.5 Applications and Examples -- 4.6 Workload Distribution -- 5 Performance Evaluation -- 5.1 Expected Completion Time -- 5.2 Hypotheses -- 5.3 Setup of Test Environment -- 5.4 Computation Speedup -- 6 Future Work -- 6.1 Collision Avoidance -- 6.2 Computation Verification -- 7 Conclusions -- References.
Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants -- 1 Introduction -- 2 Related Work -- 3 Virtual Network Flavors -- 4 Underlay Topology Discovery and Path Calculation -- 5 Overlay Topology Discovery -- 6 Tenant Traffic Classification in Underlay Network -- 7 Endpoint Virtual Switch Architecture -- 8 Differentiated Forwarding -- 8.1 Programming Endpoints -- 8.2 Programming Underlay -- 8.3 Traffic Engineering Methods -- 9 Evaluation -- 9.1 Evaluation Framework -- 9.2 Execution Types -- 9.3 Evaluation Setup -- 9.4 Traffic Engineering Strategy Analysis -- 9.5 Execution Type Analysis -- 10 Conclusion -- References -- Exploiting Communication Opportunities in Disrupted Network Environments -- 1 Introduction -- 2 Related Work -- 3 Case Study and Modeling Considerations -- 3.1 Studied Environment -- 3.2 Semi-Markov Model and Basic Equations -- 4 Evaluation -- 4.1 Evaluation Methodology -- 4.2 Evaluation Results -- 5 Conclusions -- References -- Next Generation Services -- Tiny Network Caches with Large Performance Gains for Popular Downloads -- 1 Introduction -- 2 CacheCast Basics -- 3 CacheCast Server Architecture -- 3.1 Synchronous Transmission -- 3.2 Rate Control -- 3.3 Block Selection and Reliability -- 4 Evaluation -- 4.1 Rate Control -- 4.2 Download Time -- 4.3 Bandwidth Consumption -- 4.4 Fairness -- 4.5 Effect of Small Files -- 4.6 Effects of Bandwidth Overprovisioning -- 5 Conclusions -- References -- An Openflow-Based Approach to Failure Detection and Protection for a Multicasting Tree -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 SDN Topology Discovery -- 2.2 Existing Failure Protection Mechanisms in SDN -- 3 Multicasting Tree Protection and Restoration for Software Defined Networks -- 3.1 Assumptions -- 3.2 Multicasting Tree Protection and Restoration Method for Openflow Controller -- 4 Experimental Results.
4.1 Experiment Setup -- 4.2 Experimental Results -- 5 Conclusions and Future Work -- References -- A Hierarchical Classification Model of QoE Influence Factors -- 1 Introduction -- 2 Related Work -- 3 New Modular Architecture QoE Influence Factors (MaQoEiFs) -- 3.1 Monitoring Entity -- 3.2 Contextual Monitoring Entity -- 3.3 Experimentation Monitoring Entity -- 3.4 Categories -- 4 Experimentation -- 4.1 QoE Estimation Used Methods -- 4.2 Dataset -- 4.3 A Non Discriminant Study -- 4.4 A Discriminant Study -- 4.5 Discussion -- 5 Conclusion -- References -- Network Traffic Analysis and QoE Evaluation for Video Progressive Download Service: Netflix -- 1 Introduction -- 2 Network Traffic Patterns -- 2.1 Initial Data Burst -- 2.2 Control Algorithm -- 2.3 Experimental Setup -- 2.4 Comparison -- 3 QoE Evaluation -- 4 Conclusion -- References -- A Tool to Estimate Roaming Behavior in Wireless Architectures -- 1 Introduction -- 2 Related Work -- 3 A Tool to Estimate Movement in Wireless Networks -- 3.1 Functional Aspects -- 3.2 Operational Example -- 4 Target Selection Accuracy Validation -- 5 Summary and Conclusions -- References -- Distributed and Efficient One-Class Outliers Detection Classifier in Wireless Sensors Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Outlier Detection in Wireless Sensor Networks -- 3.1 Errors -- 3.2 Events -- 4 Proposed Model -- 4.1 Training Phase (Offline) -- 4.2 Testing Phase (Online) -- 4.3 Mahalanobis Kernel -- 4.4 Outlier Detection Metric -- 5 Experimental Results -- 5.1 Datasets -- 5.2 DEOODC and OCSVM: Comparative Study -- 5.3 Computational Complexity -- 6 Conclusion -- References -- Brain-Computer Interface as Networking Entity in Body Area Networks -- Abstract -- 1 Introduction -- 2 The BCI-WBAN Concept -- 2.1 Definition and Overall Concept -- 2.2 Architecture -- 2.3 BCI-WBAN in the Network.
3 Related Works.
Sommario/riassunto: This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Wired/Wireless Internet Communications, WWIC 2015, held in Malaga, Spain, in May 2015. The 31 papers presented in this volume were carefully reviewed and selected from 43 submissions. They focus on the efficient integration of new network approaches with the traditional wired infrastructure. The topics addressed are: design and evaluation of protocols, dynamics of the integration, performance tradeoffs, and the need for new performance metrics and cross-layer interactions.
Titolo autorizzato: Wired  Visualizza cluster
ISBN: 3-319-22572-3
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996199937903316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Computer Communication Networks and Telecommunications ; ; 9071