Connect : ComSoc Linkedin ComSoc Twitter ComSoc Facebook ComSoc You Tube

ComSoc technews

Auction-based resource allocation in cognitive radio systems

CTN Issue: December 2012
Cognitive radio has emerged as a promising technology to efficiently utilize the scarce radio resources by allowing the unlicensed users to opportunistically and dynamically access the spectrum owned by licensed users. By allowing the secondary users to access the licensed radio resources, the licensed users can gain monetary returns from the unlicensed users. In this context, models based on market- and microeconomic theory can be used to efficiently manage the radio resources to bring benefits to both the primary and secondary systems. Recently, auction theory, which provides rich economic tools and solutions, has been employed to model, analyze, and optimize the radio resource allocation and management in cognitive radio systems. This article provides a comprehensive survey on auction methods adopted for resource allocation in cognitive radio systems. IEEE Communications Magazine

Incentivizing Time-Shifting of Data: A Survey of Time-Dependent Pricing for Internet Access

CTN Issue: November 2012
ISPs are starting to use pricing as a congestion management tool, as seen from the elimination of flat-rate data plans in favor of usage-based pricing. This article outlines the sources of today's congestion and pricing challenges and then discusses regulatory and technological trends that influence this issue. Proposals for incentivizing time-shifting of data by customers are also described. This article would be of considerable interest to readers who wish to go beyond technology-based issues to the underlying business aspects of telecommunications and mobile networks. IEEE Communications Magazine

New Models for Long-Term Internet Traffic Forecasting Using Artificial Neural Networks and Flow Based Information

CTN Issue: October 2012
Despite many Internet Service Providers (ISPs) administrators still perform the prevision of resource’s future needs based on experience and intuition, this approach is not adequate for planning large networks. Since it can be a limitation when there is a need for information in other layers of the protocol stack, the paper by Miguel et al. proposes a different method for collecting historical data from Internet data flows. They also present the use of new long-term forecasting models based on multiple settings of Time-Lagged Feedforward Networks (TLFN), which is a static neural network whose model includes a delay window that works as a short-term memory. Results show that this approach is a good option for planning network links that transport Internet traffic. Network Operations and Management Symposium 2012

Smart Attacks in Smart Grid Communications Networks

CTN Issue: September 2012
Smart grids are the hot topic of the day, and issues around their integrity are very important because of the critical dependence of modern societies on power Networks. As control grids potentially share public networks, and at the same time as security issues are affected by non-state actors, it could well be that the success or failure of smart grids will depend heavily on whether they can be made sufficiently secure. The article by Chen. et. al. provides an excellent overview of the challenges facing smart grids from a network security standpoint. IEEE Communications Magazine

Synchronous Ethernet to Transport Frequency and Phase/Time

CTN Issue: September 2012
Traditional Ethernet networks operated using local clocks with relatively low accuracy compared with traditional optical network clocks. In 2005, the ITU initiated a study on transport of synchronization information over Ethernet links. The goal of this work was to facilitate a transition from the traditional optical network to the newer data-centric, packet-based networks. This has resulted in the definition of a new technology called Synchronous Ethernet, which is capable of carrying telecom-quality synchronization information over Ethernet links. This paper provides an introduction to this technology suitable for the general reader. It then provides background on the relevant standards, and on an underlying messaging protocol, which may be followed up for further information. IEEE Communications Magazine