Monday, October 31, 2016

INFRASTRUCTURE OF SERVICES FOR A SMART CITY USING CLOUD ENVIRONMENT

Jorge F Hernandez1 , Victor M Larios 1 , Manuel Avalos1 and Ignacio Silva-Lepe2 

1Department of Information Systems, CUCEA, UDG Guadalajara, Mexico 2Thomas J. Watson Research Center, Yorktown Heights, NY USA Research, New York, USA 

ABSTRACT 

Sustainability, appropriate use of natural resources and providing a better quality of life for citizens has become a prerequisite to change the traditional concept of a smart city. A smart city needs to use latest generation Information Technologies, IT, and hardware to improve services and data, to offer to create a balanced environment between the ecosystem and inhabitants. This paper analyses the advantages of using a private cloud architecture to share hardware and software resources when it is required. Our case study is Guadalajara, which has nine municipalities and each one monitor’s air quality. Each municipality has a set of servers to process information independently and consists of information systems for the transmission and storage of data with other municipalities. We analysed the behaviour of the carbon footprint during the years1999-2013 and we observed a pattern in each season. Thus our proposal requires municipalities to use a cloud-based solution that allows managing and consolidating infrastructure to minimize maintenance costs and electricity consumption to reduce carbon footprint generated by the city. 

KEYWORDS

 Smart Cities; Cloud Architectures; Cost Estimation; City Services

More Details....

Thursday, October 20, 2016

PERFORMANCE ASSESSMENT OF CHAOTIC SEQUENCE DERIVED FROM BIFURCATION DEPENDENT LOGISTIC MAP IN CDMA SYSTEM

 Oluyemi E. Adetoyi1 and Solomon A. Adeniran2

 1 Electrical and Electronic Engineering Department, University of Ibadan, Nigeria 2 Electronic and Electrical Engineering Department, Obafemi Awolowo University, IleIfe, Nigeria 

ABSTRACT 

In CDMA system, m-sequence and Gold codes are often utilized for spreading-despreading and scrambling-descrambling operations. In a previous work, a design framework was created for generating large family of codes from logistic map, which have comparable autocorrelation and cross correlation to m-sequence and Gold codes. The purpose of this work is to evaluate the performance of these chaotic codes in a CDMA environment. In the bit error rate (BER) simulation, matched filter, decorrelator and MMSE receiver have been utilized. The received signal was modelled for synchronous CDMA uplink for simulation simplicity purpose. Additive White Gaussian Noise channel model was assumed for the simulation. 

KEYWORDS 

CDMA, Chaotic codes, Linear Receivers, Logistic Map, Lyapunov exponent

More Details....

MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING FOR LTE DOWNLINK DATA TRANSMISSION

 Mohamed Escheikh1 Hana Jouini1 and Kamel Barkaoui2 

 1University of Tunis El Manar, Enit, Sys’Com Box 37, LE BELVEDERE 1002 Tunis, Tunisia 2Conservatoire national des arts et métiers Box 2, conté 75003 Paris, France 

ABSTRACT 

We propose in this paper a simulation implementation of Self-Organizing Networks (SON) optimization related to mobility load balancing (MLB) for LTE systems using ns-3 [1]. The implementation is achieved toward two MLB algorithms dynamically adjusting handover (HO) parameters based on the Reference Signal Received Power (RSRP) measurements. Such adjustments are done with respect to loads of both an overloaded cell and its cells’ neighbours having enough available resources enabling to achieve load balancing. Numerical investigations through selected key performance indicators (KPIs) of the proposed MLB algorithms when compared with another HO algorithm (already implemented in ns-3) based on A3 event [2] highlight the significant MLB gains provided in terms global network throughput, packet loss rate and the number of successful HO without incurring significant overhead. 

KEYWORDS

LTE networks, Mobility load balancing, Handover, Simulation details

More details...

Thursday, October 13, 2016

ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS SENSOR NETWORK

 Tran Cong Hung1 and Ly Quoc Hung2 

1 Posts and Telecommunications Institute of Technology 2Ho Chi Minh Technical and Economic College 

ABSTRACT

 In the traditional clustering routing protocol of wireless sensor network, LEACH protocol (Low Energy Adaptive Clustering Hierarchy) is considered to have many outstanding advantages in the implementation of the hierarchy according to low energy adaptive cluster to collect and distribute the data to the base station. The main objective of LEACH is: To prolong life time of the network, reduce the energy consumption by each node, using the data concentration to reduce bulletins in the network. However, in the case of large network, the distance from the nodes to the base station is very different. Therefore, the energy consumption when becoming the host node is very different but LEACH is not based on the remaining energy to choose the host node, which is based on the number of times to become the host node in the previous rounds. This makes the nodes far away from the base station lose power sooner. In this paper, we give a new routing protocol based on the LEACH protocol in order to improve operating time of sensor network by considering energy issues and distance in selecting the cluster-head (CH), at that time the nodes with high energy and near the base station (BS) will have a greater probability of becoming the cluster-head than the those in far and with lower energy. 

KEYWORDS 

LEACH, Life-time, Energy efficient, WSN, Matlab.

More details....

GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATION IN CELLULAR NETWORKS

Fa-Bin Li 1, Peng-Xiang Li 2 Ya-Fei Yang 2 and Hui Li 2*

 1 63812 Troop of PLA, Wenchang, P. R. China 2College of Information Science and Technology, Hainan University, Haikou P. R. China 

ABSTRACT

 With the current development of mobile communication services, people need personal communication of high speed, excellent service, high quality and low latency,however, limited spectrum resources become the most important factor to hamper improvement of cellular systems. As big amount of data traffic will cause greater local consumption of spectrum resources, future networks are required to have appropriate techniques to better support such forms of communication. D2D (Device-to-device) communication technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient mobile network, we can meet the QoS requirements by controlling the power to suppress the interference between the base station and a terminal user.

 KEYWORDS 

 Cellular Network, Device-to-device, Mode Selection, Power Control, Interference Control

More details...

Wednesday, October 5, 2016

FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMUM TOTAL NETWORK COST

 Shin-ichiKuribayashi

 Department of Computer and Information Science, Seikei University, Japan 

ABSTRACT

 In a conventional network, most network devices, such as routers, are dedicated devices that do not have much variation in capacity. In recent years, a new concept of Network Functions Virtualisation (NFV) has come into use. The intention is to implement a variety of network functions with software on general-purpose servers and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. This paper focuses on the deployment of NFV-based routing functions which are one of critical virtual network functions, and present the algorithm of virtual routing function allocation that minimize the total network cost. In addition, this paper presents the useful allocation policy of virtual routing functions, based on an evaluation with a ladder-shaped network model. This policy takes the ratio of the cost of a routing function to that of a circuit and traffic distribution in the network into consideration. Furthermore, this paper shows that there are cases where the use of NFV-based routing functions makes it possible to reduce the total network cost dramatically, in comparison to a conventional network, in which it is not economically viable to distribute smallcapacity routing functions. 

KEYWORDS 

Virtual routing function, NFV, resource allocation, minimum total network cost. 

Tuesday, October 4, 2016

PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER

Amira Youssef Fahoud and D.K. Lobiyal

 School of Computer & Systems Sciences, Jawaharlal Nehru University, New Delhi, India 

ABSTRACT 

Seamless handover in wireless networks is to guarantee both service continuity and service quality. In WiMAX, scalability and quality of service for multimedia services during handover is a main challenge because of high latency and packet loss. In this paper, we created four scenarios using Qualnet 5.2 Network Simulator to analyze the hard handover functionality of WiMAX under different conditions. The scenarios such as Flag with 5 and 10 sec UCD and DCD interval values, Random mobility scenario and DEM scenario using 6 WiMAX Cells have been considered. This study is performed over the real urban area of JNU where we have used JNU map for scenarios 1, 2 and 3 but for scenario 4, the JNU terrain data has been used. Further, each BS of 6 WiMAX cell is connected to four nodes. All nodes of each scenario are fixed except Node 1. Node 1 is moving and performing the handover between the different BSs while sending and receiving real time traffics. Flag mobility model is used in Scenario 1, 2providing  and 4 to model the movement of the Node 1 while we use random mobility model in sceanrio3. 5 seconds time interval is used for Scenarios 1, 3, and 4 while 10 seconds time interval is used for scenario 2 to study the effect of management messages load on handover. Further, the statistical measures of handover performance of WiMAX in terms of number of handover performed, throughput, end-to-end delay, jitter, and packets dropped are observed and evaluated.

 KEYWORDS

 Wireless Broadband; WiMAX; Performance Evaluation; Qualnet; Handover

More Details......

JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COOPERATIVE AMPLIFY AND FORWARD RELAYING SYSTEM

Bhuvan Modi, O. Olabiyi and A. Annamalai

 Center of Excellence for Communication Systems Technology Research, Department of Electrical and Computer Engineering, Prairie View A & M University, TX 77446 United States of America 

ABSTRACT 

This paper analyzes the efficiency of a joint-design of an adaptive modulation and coding (AMC) at the physical (PHY) layer with an adaptive Rmax-truncated selective-repeat automatic repeat request (ARQ) protocol at the medium access control (MAC) layer to maximize the throughput of cooperative nonregenerative relay networks under prescribed delay and/or error performance constraints. Particularly, we generalize the existing design model/results for cross-layer combining of AMC along with truncated ARQ in non-cooperative diversity networks in three-folds: (i) extension of the cross-layer PHY/MAC design or optimization to cooperative diversity systems; (ii) generalization/unification of analytical expressions for various network performance metrics to generalized block fading channels with independent but nonidentically distributed (i.n.d) fading statistics among the spatially distributed nodes; (iii) analysis of the effectiveness of joint-adaptation of the maximum retransmission limit Rmax of ARQ protocol and cooperative diversity order N for delay-insensitive applications. Our insightful numerical results reveal that the average throughput can be increased significantly by judiciously combining two additional degrees of freedom (N and Rmax) that are available in cooperative amplify-and-forward (CAF) relay networks besides employing AMC at the PHY layer, especially in the most challenging low signal-to-noise ratio (SNR) regime. 

KEYWORDS 

cross-layer design, adaptive retransmission, cooperative relay diversity, adaptive modulation and coding


More Details......

ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPERIMENTS IN VIRTUAL ENVIRONMENT

 Kazuya Odagiri1 , Shogo Shimizu2 and Naohiro Ishii 3

 1 Sugiyama Jogakuen University, Aichi, 2Gakushuin Women’s College, Tokyo and 3Aichi Institute of Technology, Aichi, Japan

ABSTRACT

In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. This is because the TCP/IP protocol used in Internet systems does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a solution for solving the above problem, there is the approach of Policy-based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control of every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the course between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have been studied theoretically about the Destination Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system management, we intend to realize the policy-based Internet system management finally. In the DACS Scheme, the inspection is not done about compatibility to cloud environment with virtualization technology that spreads explosively. As the result, the coverage of the DACS Scheme is limited only in physical environment now. In this study, we inspect compatibility of the DACS Scheme for the cloud environment with virtualization technology, and enlarge coverage of this scheme. With it, the Virtual DACS Scheme (vDACS Scheme) is established.

KEYWORDS 

policy-based network management, DACS Scheme