Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference papers

Discipline
Keyword
Publication Year

Articles 1 - 30 of 32

Full-Text Articles in Systems and Communications

Energy Efficiency And Fault Tolerance In Open Ran And Future Internet, Saish Urumkar, Byrav Ramamurthy, Sachin Sharma Dec 2023

Energy Efficiency And Fault Tolerance In Open Ran And Future Internet, Saish Urumkar, Byrav Ramamurthy, Sachin Sharma

Conference papers

Open Radio Access Networks (Open RAN) repre- sent a promising technological advancement within the realm of the future internet. Research efforts are currently directed towards enhancing energy efficiency and fault tolerance, which are critical aspects for both Open RAN and the future internet landscape. In the context of energy saving in Open RAN, there exists a spectrum of methods for achieving energy efficiency. These methods include the toggling of on/off states for different hardware resources such as base station units, distributed units, and radio units. Conversely, for enhancing fault tolerance in Open RAN, Software-Defined Networking (SDN) and OpenFlow based techniques …


Improving Energy Efficiency In Open Ran Through Dynamic Cpu Scheduling, Saish Urumkar, Byrav Ramamurthy, Sachin Sharma Dec 2023

Improving Energy Efficiency In Open Ran Through Dynamic Cpu Scheduling, Saish Urumkar, Byrav Ramamurthy, Sachin Sharma

Conference papers

Open RAN is a promising cellular technology that is currently undergoing extensive research for future wireless radio access networks. Achieving optimal energy efficiency in Open RAN poses a significant challenge. This paper introduces a CPU scheduling algorithm that specifically targets this chal- lenge by optimizing energy consumption at the base station while maintaining optimal performance levels. With the goal of minimizing energy consumption, the proposed algorithm dynamically adjusts the CPU core states, seamlessly switching between active and sleep modes based on the load conditions. To evaluate the algorithm’s effectiveness in terms of energy saving and performance, experimental testing is conducted …


Poster: Round Trip Time Measurement Over Microgrid Power Network, Yasin Emir Kutlu, Ruairí De Fréin, Malabika Basu, Ali Malik Jun 2023

Poster: Round Trip Time Measurement Over Microgrid Power Network, Yasin Emir Kutlu, Ruairí De Fréin, Malabika Basu, Ali Malik

Conference papers

A focus of the Power Systems and Networking communities is the design and deployment of Microgrid (MG) integration systems that ensure that quality of service targets are met for load sharing systems at different endpoints. This paper presents an integrated Microgrid testbed that allows Microgrids endpoints to share their current, voltage and power values using a Network Published Shared Variable (NPSV) approach. We present Round Trip Time (RTT) measurements for time sensitive Microgrid control traffic in the presence of varying background traffic as an example quality of service measurement. Numerical results are presented using a range of different background traffic …


Integrated Dc Microgrid Testbed For Qos Evaluation, Yasin Emir Kutlu, Ruairí De Fréin, Malabika Basu, Ali Malik Jun 2023

Integrated Dc Microgrid Testbed For Qos Evaluation, Yasin Emir Kutlu, Ruairí De Fréin, Malabika Basu, Ali Malik

Conference papers

This poster describes the development of an integrated Direct Current (DC) Microgrid (MG) testbed, consisting of power system and computer networking hardware, e.g. Cisco 4331 Integrated Services Routers (ISR) and 500W AC/DC power supplies, to test the Quality of Service (QoS) of MG control packets which are delivered over Layer-2 and Layer-3 networking topologies. It facilitates an examination of control packets between MG end-points, that enable real-time power load sharing, in the presence of background computer network traffic such as video streaming. The effects of difference levels of background traffic on the round trip time of control packets are demonstrated.


Grammatical Evolution For Detecting Cyberattacks In Internet Of Things Environments, Hasanen Alyasiri, John Clark, Ali Malik, Ruairí De Fréin Jul 2021

Grammatical Evolution For Detecting Cyberattacks In Internet Of Things Environments, Hasanen Alyasiri, John Clark, Ali Malik, Ruairí De Fréin

Conference papers

The Internet of Things (IoT) is revolutionising nearly every aspect of modern life, playing an ever greater role in both industrial and domestic sectors. The increasing frequency of cyber-incidents is a consequence of the pervasiveness of IoT. Threats are becoming more sophisticated, with attackers using new attacks or modifying existing ones. Security teams must deal with a diverse and complex threat landscape that is constantly evolving. Traditional security solutions cannot protect such sys- tems adequately and so researchers have begun to use Machine Learning algorithms to discover effective defence systems. In this paper, we investigate how one approach from the …


Bayesian Adaptive Path Allocation Techniques For Intra-Datacenter Workloads, Ali Malik, Ruairí De Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima Jul 2021

Bayesian Adaptive Path Allocation Techniques For Intra-Datacenter Workloads, Ali Malik, Ruairí De Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima

Conference papers

Data center networks (DCNs) are the backbone of many cloud and Internet services. They are vulnerable to link failures, that occur on a daily basis, with a high frequency. Service disruption due to link failure may incur financial losses, compliance breaches and reputation damage. Performance metrics such as packet loss and routing flaps are negatively affected by these failure events. We propose a new Bayesian learning approach towards adaptive path allocation that aims to improve DCN performance by reducing both packet loss and routing flaps ratios. The proposed approach incorporates historical information about link failure and usage probabilities into its …


Power-Weighted Lpc Formant Estimation, Ruairí De Fréin Nov 2020

Power-Weighted Lpc Formant Estimation, Ruairí De Fréin

Conference papers

A power-weighted formant frequency estimation procedure based on Linear Predictive Coding (LPC) is presented. It works by pre-emphasizing the dominant spectral components of an input signal, which allows a subsequent estimation step to extract formant frequencies with greater accuracy. The accuracy of traditional LPC formant estimation is improved by this new power-weighted formant estimator for different classes of synthetic signals and for speech. Power-weighted LPC significantly and reliably outperforms LPC and variants of LPC at the task of formant estimation using the VTR formants dataset, a database consisting of the Vocal Tract Resonance (VTR) frequency trajectories obtained by human experts …


Predicting Quality Of Delivery Metrics For Adaptive Video Codec Sessions, Obinna Izima, Ruairí De Fréin, Mark Davis Nov 2020

Predicting Quality Of Delivery Metrics For Adaptive Video Codec Sessions, Obinna Izima, Ruairí De Fréin, Mark Davis

Conference papers

Predicting video quality will continue to be an active area of research given the dominance of video traffic for years to come. Network service practitioners that are poised to handle the strain on the existing limited bandwidth constraints are better placed to be SLA-compliant. The dynamic and time-varying nature of cloud-hosted services require improved techniques to realize accurate models of the systems. To address this challenge: (1) we propose Codec-aware Network Adaptation Agent (cNAA), an online light-weight data learning engine that achieves accurate and correct predictions of quality of delivery (QoD) metrics, namely jitter for video services. cNAA achieves this …


A Proactive-Restoration Technique For Sdns, Ali Malik, Ruairí De Fréin Jun 2020

A Proactive-Restoration Technique For Sdns, Ali Malik, Ruairí De Fréin

Conference papers

Failure incidents result in temporarily preventing the network from delivering services properly. Such a deterioration in services called service unavailability. The traditional fault management techniques, i.e. protection and restoration, are inevitably concerned with service unavailability due to the convergence time that is required to achieve the recovery when a failure occurs. However, with the global view feature of software-defined networking a failure prediction is becoming attainable, which in turn reduces the service interruptions that originated by failures. In this paper, we propose a proactive restoration technique that reconfigure the vulnerable routes which are likely to be affected if the …


Remedying Sound Source Separation Via Azimuth Discrimination And Re-Synthesis, Ruairí De Fréin Jun 2020

Remedying Sound Source Separation Via Azimuth Discrimination And Re-Synthesis, Ruairí De Fréin

Conference papers

Commercially recorded music since the 1950s has been mixed down from many input sound sources to a two-channel reproduction of these sources. The effect of this approach is to assign sources to locations in a stereo field using a pan-position for each source. The Adress algorithm is a popular way of extracting individual music sound sources from a stereo mixture. A drawback of the Adress algorithm is that when time-frequency components in the stereo mixture are shared between two or more sources, calculating the inter-aural intensity scaling parameter for each source for that time-frequency component is challenging. We show how …


Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell Dec 2018

Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell

Conference papers

Energy-efficient, fair, stochastic leader-selection algorithms are designed for mobile sensing scenarios which adapt the sensing strategy depending on the mobile sensing topology. Methods for electing a cluster head are crucially important when optimizing the trade-off between the number of peer-to- peer interactions between mobiles and client-server interactions with a cloud-hosted application server. The battery-life of mobile devices is a crucial constraint facing application developers who are looking to use the convergence of mobile computing and cloud computing to perform environmental sensing. We exploit the mobile network topology, specifically the location of mobiles with respect to the gateway device, to stochastically …


State Acquisition In Computer Networks, Ruairí De Fréin May 2018

State Acquisition In Computer Networks, Ruairí De Fréin

Conference papers

We establish that State Acquisition should be per- formed in networks at a rate which is consistent with the rate-of-change of the element or service being observed. We demonstrate that many existing monitoring and service-level prediction tools do not acquire network state in an appropriate manner. To address this challenge: (1) we define the rate-of- change of different applications; (2) we use methods for analysis of unevenly spaced time series, specifically, time series arising from video and voice applications, to estimate the rate-of-change of these services; and finally, (3) we demonstrate how to acquire network state accurately for a number …


Interoperable Ocean Observing Using Archetypes: A Use-Case Based Evaluation, Paul Stacey, Damon Berry Jan 2018

Interoperable Ocean Observing Using Archetypes: A Use-Case Based Evaluation, Paul Stacey, Damon Berry

Conference papers

This paper presents a use-case based evaluation of the impact of two-level modeling on the automatic federation of ocean observational data. The goal of the work is to increase the interoperability and data quality of aggregated ocean observations to support convenient discovery and consumption by applications. An assessment of the interoperability of served data flows from publicly available ocean observing spatial data infrastructures was performed. Barriers to consumption of existing standards-compliant ocean-observing data streams were examined, including the impact of adherence to agreed data standards. Historical data flows were mapped to a set of archetypes and a backward integration experiment …


Tiled Time Delay Estimation In Mobile Cloud Computing Environments, Ruairí De Fréin Dec 2017

Tiled Time Delay Estimation In Mobile Cloud Computing Environments, Ruairí De Fréin

Conference papers

We present a tiled delay estimation technique in the context of Mobile Cloud Computing (MCC) environments. We examine its accuracy in the presence of multiple sources for (1) sub-sample delays and also (2) in the presence of phase-wrap around. Phase wrap-around is prevalent in MCC because the separation of acoustic sources may be large. We show that tiling a histogram of instantaneous phase estimates can improve delay estimates when phase-wrap around is sig- nificantly present and also when multiple sources are present. We report that error in the delay estimator is generally less than 5% of a sample, when the …


Aphonic: Adaptive Thresholding For Noise Cancellation In Smart Mobile Environments, Ruairí De Fréin Oct 2017

Aphonic: Adaptive Thresholding For Noise Cancellation In Smart Mobile Environments, Ruairí De Fréin

Conference papers

We propose a signal-channel, adaptive threshold selection technique for binary mask construction, namely APHONIC, (AdaPtive tHreshOlding for NoIse Cancellation) for smart mobile environments. Using this mask, we introduce two noise cancellation techniques that perform robustly in the presence of real-world interfering signals that are typically encountered by mobile users: a violin busker, a subway and busy city square sounds. We demonstrate that when the power of the time-frequency components of the voice of a mobile user does not significantly overlap with the components of the interference signal, the threshold learning and noise cancellation techniques significantly improve the Signal-to-Interference Ratio (SIR) …


Touch2query Enabled Mobile Devices: A Case Study Using Openstreetmap And Iphone, Junjun Yin, James Carswell Mar 2011

Touch2query Enabled Mobile Devices: A Case Study Using Openstreetmap And Iphone, Junjun Yin, James Carswell

Conference papers

This paper describes our mobile spatial interaction (MSI) prototype Touch2Query which presents the idea of using the touch screen on mobile devices to assist in performing ad-hoc spatial queries. This approach differs from conventional mobile LBS applications where the query shape (search space) is limited to either a bounding box or radius. Instead, we provide functionality that allows users to interactively draw any desired query shape overlaid on an area of interest directly on a mobile device with their finger by combining vector primitives such as circles, polygons, polylines, and points. With the help of location and orientation aware mobile …


E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle Jan 2010

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle

Conference papers

We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …


Meshscan: Performance Of Passive Handoff And Active Handoff, Yin Chen, Karol Kowalik, Mark Davis Nov 2009

Meshscan: Performance Of Passive Handoff And Active Handoff, Yin Chen, Karol Kowalik, Mark Davis

Conference papers

A core problem of fast handoff is when handoff should perform and which Mesh Node (MN) should associated with. We have developed a fast handoff management scheme called MeshScan to provide a novel use of channel scanning latency, by employing open system authentication in both Passive Handoff and Active Handoff. This scheme comprises three steps: firstly a client device takes advantage of the Wireless Mesh Network (WMN) architecture to maintain a list of active MNs. Secondly MeshScan Handoff Sensor performs handoff when it receives a disassociation management frame from the serving MN or when the measured signal strength from the …


Meshscan: Fast And Efficient Handoff In Ieee802.11 Mesh Networks, Yin Chen, Mark Davis Oct 2009

Meshscan: Fast And Efficient Handoff In Ieee802.11 Mesh Networks, Yin Chen, Mark Davis

Conference papers

Handoff delay is one of the major problems in Wireless Mesh Network (WMN) that needs to be solved in order to allow time-critical and real-time applications run continuously during handoff. We have developed a fast handoff scheme called MeshScan to provide a novel use of channel scanning latency by employing open system authentication. This scheme comprises two steps: firstly a client device takes advantage of the WMN architecture to maintain a list of active mesh nodes. Secondly when handoff is required, a client transmits Authentication Request frames to all mesh nodes (MNs) from the list instead of broadcasting Probe Request …


An Experimental Study Of The Impact Of Using Multi-Radio In Wlan Mesh Networks, Chenzhe Zhang, Karol Kowalik, Mark Davis Sep 2009

An Experimental Study Of The Impact Of Using Multi-Radio In Wlan Mesh Networks, Chenzhe Zhang, Karol Kowalik, Mark Davis

Conference papers

Next-generation wireless mobile communications will be driven by converged networks that integrate disparate technologies and services. Wireless Mesh Networks (WMNs) are expected to be one of the next generation of wireless interconnection technologies, providing flexible high bandwidth wireless backhaul over large geographical areas. While single radio mesh nodes operating on a single channel suffer from capacity constraints, equipping mesh routers with multiple radios using multiple non-overlapping channels can significantly alleviate the capacity problem and increase the aggregate bandwidth available to the network. However, it is well known that multi-radio Mesh platforms face many limitations such as interference, radiation leakage, crosstalk …


Performance Study Of A Cross-Layer Optimization To The Dsr Routing Protocol In Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis Jun 2009

Performance Study Of A Cross-Layer Optimization To The Dsr Routing Protocol In Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis

Conference papers

A cross-layer modification to the DSR protocol is presented in this work which is intended to enhance the global throughput performance of wireless mesh networks. This modification involves the use of an access efficiency factor (which is a measure of the local availability of bandwidth at a node) as an alternative metric to the hop-count metric in order to allow for improved routing selection. The key feature of this modified route selection procedure is that it attempts to discover paths that have a large availability of bandwidth which can support high throughputs. In this work we have employed the OPNET …


Information Hiding By Stochastic Disfusion And Its Application To Printed Document Authentication, Jonathan Blackledge, Eugene Coyle Jan 2009

Information Hiding By Stochastic Disfusion And Its Application To Printed Document Authentication, Jonathan Blackledge, Eugene Coyle

Conference papers

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-O-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking, information hiding and covert encryption methods which can be applied to both electronic and printed images (and documents) for the purposes of authentication, prevent unauthorized copying and, in the …


Effects Of Lline Rate On Vvideo Qos Over Wireless Networks: An Experimental Approach, Stuart Wallace, Mark Davis Oct 2008

Effects Of Lline Rate On Vvideo Qos Over Wireless Networks: An Experimental Approach, Stuart Wallace, Mark Davis

Conference papers

Video streaming over Wireless Local Area Networks (WLANS) is becoming an increasingly popular service. However, end user OoS is highly influenced by many factors. These include the video codec used, the packetization scheme, error concealment and correction techniques, the complexity of the video, propagation losses, and the line rate. In this paper the effect of the line rate on the capacity of the network when streaming multimedia content is analyzed experimentally. It is shown that as the line rate decreases the bandwidth load of the video stream dramatically increases leading to poor QoS at the client side. As automatic line …


Throughput Enhancement Through Combined Fragmentation And Rate Method In Ieee 802.11b Wlans, Marek Bykowski, Karol Kowalik, Brian Keegan, Mark Davis Jan 2008

Throughput Enhancement Through Combined Fragmentation And Rate Method In Ieee 802.11b Wlans, Marek Bykowski, Karol Kowalik, Brian Keegan, Mark Davis

Conference papers

IEEE 802.11 allows for fragmentation tuning and rate selection. Their combined usage is referred sometimes to link adaptation. However, the algorithms of link adaptation are beyond the 802.11 standards. In this paper we investigate the benefits arising from proper use of link adaptation. Particularly, we develop a mathematical model describing the fragmented transmission in 802.11b. We examine potential benefits of it over AWGN and fading channels. More significantly we combine fragmentation tuning with bit-rate selection to yield the highest achievable throughput performance for any given channel conditions. Finally, we propose an algorithm that performs the optimal link adaptation.


Wireless Positioning Techniques: A Developer's Update, Seamus Rooney, Keith Gardiner, James Carswell Nov 2007

Wireless Positioning Techniques: A Developer's Update, Seamus Rooney, Keith Gardiner, James Carswell

Conference papers

This paper describes the current efforts to develop an open source, privacy sensitive, location determination software component for mobile devices. Currently in mobile computing, the ability of a mobile device to determine its own location is becoming increasingly desirable as the usefulness of such a feature enhances many commercial applications. There have been numerous attempts to achieve this from both the network positioning perspective and also from the wireless beacon angle not to mention the integration of GPS into mobile devices. There are two important aspects to consider when using such a system which are privacy and cost. This paper …


The Effects Of Contention Among Stations On Video Streaming Applications Over Wireless Local Area Networks: An Experimental Approach, Nicola Cranley, Tanmoy Debnath Oct 2007

The Effects Of Contention Among Stations On Video Streaming Applications Over Wireless Local Area Networks: An Experimental Approach, Nicola Cranley, Tanmoy Debnath

Conference papers

Multimedia streaming applications have a large impact on the resource requirements of the WLAN. There are many variables involved in video streaming, such as the video content being streamed, how the video is encoded and how it is sent. This makes the role of radio resource management and the provision of QoS guarantees extremely difficult. For video streaming applications, packet loss and packets dropped due to excessive delay are the primary factors that affect the received video quality. In this paper, we experimentally analyse the effects of contention on the performance of video streaming applications with a given delay constraint …


Experimental Tuning Of The Aifsn Parameter To Prioritize Voice Over Data Transmission In 802.11e Wlan Networks, Miroslaw Narbutt, Mark Davis Aug 2007

Experimental Tuning Of The Aifsn Parameter To Prioritize Voice Over Data Transmission In 802.11e Wlan Networks, Miroslaw Narbutt, Mark Davis

Conference papers

In this paper we experimentally study the impact of one EDCA parameter, namely AIFSN on a mixed voice/data wireless transmission. In particular we investigate how the tuning of this parameter affects both the voice transmission quality and background data throughput. We predict end-to-end voice transmission quality from time varying transmission impairements using the latest Appendix to the ITU-T E-model. Our experiemental results show that the tuning of the AIFSN parameter can successfully prioritize voice transmission over data in a real 802.11e network. To the best of our knowledge this is the first experimental investigation on tuning of MAC layer parameters …


Experimental Tuning Of Aifsn And Cwmin Parameters To Prioritize Voice Over Data Transmission In 802.11e Wlan Networks, Miroslaw Narbutt, Mark Davis Aug 2007

Experimental Tuning Of Aifsn And Cwmin Parameters To Prioritize Voice Over Data Transmission In 802.11e Wlan Networks, Miroslaw Narbutt, Mark Davis

Conference papers

In this paper we experimentally study the impact of two EDCA parameters, namely AIFSN and CWmin, on a mixed voice/data wireless transmission. In particular we investigate how the tuning of these parameters affects both the voice transmission quality and background data throughput. We predict end-to-end voice transmission quality from time varying transmission impairments using the latest Appendix to the ITU-T E-model. Our experimental results show that the tuning of the EDCA parameters can be used to successfully prioritize voice transmission over data in real 802.11e networks. We also demonstrate that the AIFSN parameter more effectively protects voice calls against background …


An Experimental Investigation Of Parallel Multimedia Streams Over Ieee 802.11e Wlan Networks Using Txop, Nicola Cranley, Tanmoy Debnath, Mark Davis Jun 2007

An Experimental Investigation Of Parallel Multimedia Streams Over Ieee 802.11e Wlan Networks Using Txop, Nicola Cranley, Tanmoy Debnath, Mark Davis

Conference papers

In this paper we perform an experimental investigation of the IEEE 802.11 TXOP facility to enhance the transmission of parallel multimedia streaming sessions through efficient bandwidth reservation and explicitly consider both the audio and video streams. The delay constraints associated with the audio and video streams that comprise a multimedia session pose the greatest challenge since real-time multimedia is particularly sensitive to delay as the packets require a strict bounded end-to-end delay. We show how the TXOPlimit parameter can be efficiently dimensioned to reduce the tranmission delay for the video frames. Due to tis frame-based nature, video applications are considered …


User Quality Of Experience-Aware Multimedia Streaming Over Wireless Home Area Network, Gabriel-Miro Muntean, Nicola Cranley Apr 2007

User Quality Of Experience-Aware Multimedia Streaming Over Wireless Home Area Network, Gabriel-Miro Muntean, Nicola Cranley

Conference papers

For multimedia streaming over wireless networks, there is a trade-off between the capacity of the wireless links and the end-user perceived-quality, which can be affected by the compression scheme used, content characteristics and adaptation algorithm (if any). In this paper, this trade-off is investigated for streaming various motion content multimedia over an IEEE 802.11b-based Wireless-Home Area Network using the Quality-Oriented Adaptation Scheme (QOAS). QOAS performance is compared to that of a non-adaptive scheme when using MPEG-2 and MPEG-4 encoding in terms of average end-user perceived quality, number of streaming sessions concurrently supported, loss rate, delay, jitter and total throughput. Simulation …