In unsupervised contention-based networks such as EDCA mode of IEEE 802.11(e)(s), upon winning the channel, each node gets a transmission opportunity (TXOP) in which the node can transmit multiple frames consequently without releasing the channel. Adjusting TXOP can lead to better bandwidth utilization and QoS provisioning. To improve WLAN throughput performance, EDCA packet bursting can be used in 802.11e, meaning that once a station has gained an EDCA-TXOP, it can be allowed to transmit more than one frame without re-contending for the channel. Following the access to the channel, the station can send multiple frames as long as the total access time does not exceed the TXOP Limit. This mechanism can reduce the network overhead and increase the channel utilization instead. However, packet bursting may cause unfairness in addition to increasing jitter, delay and loss. To the best of the authors’ knowledge, although TXOP tuning has been investigated through different methods, it has not been considered within a game theory framework. In this study, based on the analytical models of EDCA, a game theoretic approach called GTXOP is proposed to determine TXOP dynamically (i.e. according to the dynamisms of WLAN networks and the number of nodes in the network). Using GTXOP, each node can choose its TXOP autonomously, such that in addition to QoS improvement, the overall network performance is also improved.
Abstract-As intrusion detection techniques based on malicious traffic signature are unable to detect unknown attacks, the methods derived from characterizing the behavior of the normal traffic are appropriate in case of detecting unseen intrusions. Based on such a technique, one class Support Vector Machine (SVM) is employed in this research to learn http regular traffic characteristics for anomaly detection. First, suitable features are extracted from the normal and abnormal http traffic; then the system is trained by the normal traffic samples. To detect anomaly, the actual traffic (including normal and abnormal packets) is compared to the deduced normal traffic. An anomaly alert is generated if any deviation from the regular traffic model is inferred. Examining the performance of the proposed algorithm using ISCX data set has delivered high accuracy of 89.25% and low false positive of 8.60% in detecting attacks on port 80. In this research, online step speed has reached to 77 times faster than CPU using GPU for feature extraction and OpenMp for parallel processing of packets.
Delay and capacity (throughput) are two important parameters to route data packets in Mobile Ad Hoc Networks (MANETs). In this paper, a new connectionless routing algorithm has been proposed to overcome the performance limit. The proposed algorithm is an extension of dynamic virtual route (DVR) algorithm. Mobility degree of nodes' neighborhood is used to calculate two mobility metrics. Mobility metrics are utilized to establish a more stable route between source and destination. Simulation study shows that the proposed algorithm can improve the network throughput and decrease average end-to-end delay significantly.
Being an essential issue in digital systems, especially battery-powered devices, energy efficiency has been the subject of intensive research. In this research, a multi-precision FFT module with dynamic runtime reconfigurability is proposed to trade off accuracy with the energy efficiency of OFDM in an SDR-based architecture. To support variable size FFT, a reconfigurable memory-based architecture is investigated. It is revealed that the radix-4 FFT has the minimum computational complexity in this architecture. Regarding implementation constraints such as fixed-width memory, a noise model is exploited to statistically analyze the proposed architecture. The required FFT word-lengths for different criteria-namely BER, modulation scheme, FFT size, and SNR-are computed analytically and confirmed by simulations in AWGN and Rayleigh fading channels. At run-time, the most energyefficient word-length is chosen and the FFT is reconfigured while the required application-specific BER is met. Evaluations show that the implementation area and the number of memory accesses are reduced. The results obtained
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.