126,365 research outputs found

    Multi-objective Network Opportunistic Access for Group Mobility in Mobile Internet

    Get PDF
    The integration of existing and emerging heterogeneous wireless networks in mobile Internet is a combination of diverse but complementary wireless access technologies. Satisfying a set of imperative constrains and optimization objectives, access network selection (ANS) for mobile node (MN) is an inherent procedure in mobility management that needs to be solved in a reasonable manner for the whole system to operate in an optimal fashion. However, ANS remains a significant challenge. Because many MNs with distinctive call characteristics are likely to have correlated mobility and may need to perform mobility management at the same time, this paper, with the goal of investigating group mobility solutions, proposes a network opportunistic access for group mobility (NOA-GM) scheme. By analyzing the directional patterns of moving MNs and introducing the idea of opportunistic access, this scheme first identifies underloaded access networks as candidates. Then, the candidates are evaluated using normalized models of objective and subjective metrics. On this basis, the ANS problem for group mobility can be conducted as a multiobjective combination optimization and then transferred to a signal-objective model by considering the optimization of the performance of the whole system as a global goal while still achieving each MN\u27s performance request. Using an improved genetic algorithm with newly designed evolutionary operators to solve the signal-objective model, an optimal result option for ANS for group mobility is achieved. Simulations conducted on the NS-2 platform show that NOA-GM outperforms the compared schemes in several critical performance metrics

    ERMO2 algorithm: an energy efficient mobility management in mobile cloud computing system for 5G heterogeneous networks

    Get PDF
    Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network

    Automatic Dataset Labelling and Feature Selection for Intrusion Detection Systems

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Correctly labelled datasets are commonly required. Three particular scenarios are highlighted, which showcase this need. When using supervised Intrusion Detection Systems (IDSs), these systems need labelled datasets to be trained. Also, the real nature of the analysed datasets must be known when evaluating the efficiency of the IDSs when detecting intrusions. Another scenario is the use of feature selection that works only if the processed datasets are labelled. In normal conditions, collecting labelled datasets from real networks is impossible. Currently, datasets are mainly labelled by implementing off-line forensic analysis, which is impractical because it does not allow real-time implementation. We have developed a novel approach to automatically generate labelled network traffic datasets using an unsupervised anomaly based IDS. The resulting labelled datasets are subsets of the original unlabelled datasets. The labelled dataset is then processed using a Genetic Algorithm (GA) based approach, which performs the task of feature selection. The GA has been implemented to automatically provide the set of metrics that generate the most appropriate intrusion detection results

    Transparent and scalable client-side server selection using netlets

    Get PDF
    Replication of web content in the Internet has been found to improve service response time, performance and reliability offered by web services. When working with such distributed server systems, the location of servers with respect to client nodes is found to affect service response time perceived by clients in addition to server load conditions. This is due to the characteristics of the network path segments through which client requests get routed. Hence, a number of researchers have advocated making server selection decisions at the client-side of the network. In this paper, we present a transparent approach for client-side server selection in the Internet using Netlet services. Netlets are autonomous, nomadic mobile software components which persist and roam in the network independently, providing predefined network services. In this application, Netlet based services embedded with intelligence to support server selection are deployed by servers close to potential client communities to setup dynamic service decision points within the network. An anycast address is used to identify available distributed decision points in the network. Each service decision point transparently directs client requests to the best performing server based on its in-built intelligence supported by real-time measurements from probes sent by the Netlet to each server. It is shown that the resulting system provides a client-side server selection solution which is server-customisable, scalable and fault transparent

    Splitting Algorithms for Fast Relay Selection: Generalizations, Analysis, and a Unified View

    Full text link
    Relay selection for cooperative communications promises significant performance improvements, and is, therefore, attracting considerable attention. While several criteria have been proposed for selecting one or more relays, distributed mechanisms that perform the selection have received relatively less attention. In this paper, we develop a novel, yet simple, asymptotic analysis of a splitting-based multiple access selection algorithm to find the single best relay. The analysis leads to simpler and alternate expressions for the average number of slots required to find the best user. By introducing a new `contention load' parameter, the analysis shows that the parameter settings used in the existing literature can be improved upon. New and simple bounds are also derived. Furthermore, we propose a new algorithm that addresses the general problem of selecting the best Q1Q \ge 1 relays, and analyze and optimize it. Even for a large number of relays, the algorithm selects the best two relays within 4.406 slots and the best three within 6.491 slots, on average. We also propose a new and simple scheme for the practically relevant case of discrete metrics. Altogether, our results develop a unifying perspective about the general problem of distributed selection in cooperative systems and several other multi-node systems.Comment: 20 pages, 7 figures, 1 table, Accepted for publication in IEEE Transactions on Wireless Communication

    Using multiple metrics for rate adaptation algorithms in IEEE 802.11 WLANs

    Get PDF
    corecore