6 research outputs found

    Hybrid FPMS: A New Fairness Protocol Management Scheme for Community Wireless Mesh Networks

    Full text link
    Node cooperation during packet forwarding operations is critically important for fair resource utilization in Community Wireless Mesh Networks (CoWMNs). In a CoWMN, node cooperation is achieved by using fairness protocols specifically designed to detect and isolate malicious nodes, discourage unfair behavior, and encourage node participation in forwarding packets. In general, these protocols can be split into two groups: Incentive-based ones, which are managed centrally, and use credit allocation schemes. In contrast, reputation-based protocols that are decentralized, and rely on information exchange among neighboring nodes. Centrally managed protocols inevitably suffer from scalability problems. The decentralized, reputation-based protocols lacks in detection capability, suffer from false detections and error propagation compared to the centralized, incentive-based protocols. In this study, we present a new fairness protocol management scheme, called Hybrid FPMS that captures the superior detection capability of incentive-based fairness protocols without the scalability problems inherently expected from a centralized management scheme as a network's size and density grows. Simulation results show that Hybrid FPMS is more efficient than the current centralized approach and significantly reduces the network delays and overhead.Comment: KSII Transactions on Internet and Information Systems, 201

    Diagnosing client faults using SVM-based intelligent inference from TCP packet traces

    Full text link
    We present the Intelligent Automated Client Diagnostic (IACD) system, which only relies on inference from Transmission Control Protocol (TCP) packet traces for rapid diagnosis of client device problems that cause network performance issues. Using soft-margin Support Vector Machine (SVM) classifiers, the system (i) distinguishes link problems from client problems, and (ii) identifies characteristics unique to client faults to report the root cause of the client device problem. Experimental evaluation demonstrated the capability of the IACD system to distinguish between faulty and healthy links and to diagnose the client faults with 98% accuracy in healthy links. The system can perform fault diagnosis independent of the client's specific TCP implementation, enabling diagnosis capability on diverse range of client computers.Comment: 2011 6th International Conference on Broadband and Biomedical Communications (IB2COM

    Automated Inference System for End-To-End Diagnosis of Network Performance Issues in Client-Terminal Devices

    Full text link
    Traditional network diagnosis methods of Client-Terminal Device (CTD) problems tend to be laborintensive, time consuming, and contribute to increased customer dissatisfaction. In this paper, we propose an automated solution for rapidly diagnose the root causes of network performance issues in CTD. Based on a new intelligent inference technique, we create the Intelligent Automated Client Diagnostic (IACD) system, which only relies on collection of Transmission Control Protocol (TCP) packet traces. Using soft-margin Support Vector Machine (SVM) classifiers, the system (i) distinguishes link problems from client problems and (ii) identifies characteristics unique to the specific fault to report the root cause. The modular design of the system enables support for new access link and fault types. Experimental evaluation demonstrated the capability of the IACD system to distinguish between faulty and healthy links and to diagnose the client faults with 98% accuracy. The system can perform fault diagnosis independent of the user's specific TCP implementation, enabling diagnosis of diverse range of client devicesComment: arXiv admin note: substantial text overlap with arXiv:1207.356

    The UN Security Council as legislator. A critical analysis

    No full text
    The UN Security Council’s scope of intervention has broadened significantly over the past years. The Council has intervened in such a diverse number of situations, ranging from resolutions concerning a specific conflict to adopting more general resolutions and enforcing general obligations to Member States. The latter is a new role that goes beyond its conventionally accepted power of implementing specific legally binding obligations on Member States under Chapter VII of the UN Charter. This newfound role, although presenting its advantages, has been largely criticized. It is evident that in assuming this new role the UN Security Council has stepped out of the competency of its original function as a political organ. In this study, we examine cases in which the Security Council has made use of both direct and indirect normative powers, namely while establishing the Statute of the ICTY and the ICTR, and also in the adoption of Resolution 1373 and 1540. Finally, we discuss why it should avoid making use of any legislative powers
    corecore