Download ebooks file Wireless and Satellite Systems 9th International Conference WiSATS 2017 Oxford UK September 14 15 2017 Proceedings 1st Edition Prashant Pillai all chapters
Download ebooks file Wireless and Satellite Systems 9th International Conference WiSATS 2017 Oxford UK September 14 15 2017 Proceedings 1st Edition Prashant Pillai all chapters
Download ebooks file Wireless and Satellite Systems 9th International Conference WiSATS 2017 Oxford UK September 14 15 2017 Proceedings 1st Edition Prashant Pillai all chapters
com
https://textbookfull.com/product/wireless-and-satellite-
systems-9th-international-conference-wisats-2017-oxford-uk-
september-14-15-2017-proceedings-1st-edition-prashant-
pillai/
OR CLICK BUTTON
DOWNLOAD NOW
231
123
Lecture Notes of the Institute
for Computer Sciences, Social Informatics
and Telecommunications Engineering 231
Editorial Board
Ozgur Akan
Middle East Technical University, Ankara, Turkey
Paolo Bellavista
University of Bologna, Bologna, Italy
Jiannong Cao
Hong Kong Polytechnic University, Hong Kong, Hong Kong
Geoffrey Coulson
Lancaster University, Lancaster, UK
Falko Dressler
University of Erlangen, Erlangen, Germany
Domenico Ferrari
Università Cattolica Piacenza, Piacenza, Italy
Mario Gerla
UCLA, Los Angeles, USA
Hisashi Kobayashi
Princeton University, Princeton, USA
Sergio Palazzo
University of Catania, Catania, Italy
Sartaj Sahni
University of Florida, Florida, USA
Xuemin Sherman Shen
University of Waterloo, Waterloo, Canada
Mircea Stan
University of Virginia, Charlottesville, USA
Jia Xiaohua
City University of Hong Kong, Kowloon, Hong Kong
Albert Y. Zomaya
University of Sydney, Sydney, Australia
More information about this series at http://www.springer.com/series/8197
Prashant Pillai Kandeepan Sithamparanathan
•
123
Editors
Prashant Pillai Miguel Ángel Vázquez
University of Wolverhampton Centre Tecnològic de Telecomunicacions
Wolverhampton de Catalunya
UK Barcelona
Spain
Kandeepan Sithamparanathan
RMIT University Paul Daniel Mitchell
Melbourne, VIC University of York
Australia York
UK
Giovanni Giambene
University of Siena
Siena
Italy
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer International Publishing AG
part of Springer Nature
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
We are delighted to introduce the proceedings of the ninth edition of the 2017
European Alliance for Innovation (EAI) International Conference on Wireless and
Satellite Systems (formerly PSATS), which was held in the historic city of Oxford, UK,
during September 14–15, 2017.
The aim of this conference is to bring together researchers, developers, and prac-
titioners from around the world working in the field of wireless and satellite systems.
The theme of WiSATS 2017 was on the means of bringing wireless and satellite
services directly to the user for personal communications, multimedia, and location
identification.
The technical program of WiSATS 2017 comprised 19 full papers, including seven
papers in the main conference track. Other papers were presented as part of a series of
workshops, including: Next-Generation mmWave and Optical Satellite Systems: From
Channel Modelling to System Performance Evaluation (SATPROP: five papers),
Unmanned Aerial Systems (IWUAS: five papers), and Communication Applications in
Smart Grid (CASG: two papers). In addition to the high-quality technical paper pre-
sentations, the technical program also featured two keynote speeches, an invited talk,
and a panel session. The two keynote speeches were given by Dr. Hector Fenech
(Director of Future Satellite Systems at Eutelsat, France) and Vincenzo Pellegrini
(Senior Radiocommunication and SDR Systems Engineer at IDS, Ingegneria dei Sis-
temi S.p.A, Italy). The invited talk was presented by Prof. Fun Hu from the University
of Bradford, UK, and the panel session was on the subject of “SatCom in 5G and
Beyond: Opportunities and Challenges.”
We would like to thank all members of the Organizing and Steering Committees for
their effective cooperation in putting together and delivering the conference. It was a
great pleasure to work with such an excellent team. In particular, the Technical Pro-
gram Committee, led by our TPC co-chairs, Giovanni Giambene and Miguel Ángel
Vázquez, who managed the peer-review process. We are also grateful to our conference
manager, Lenka Bilska, and her colleagues Erika Pokorna and Dominika Kalafutova
for their assistance. We would like to thank all the authors who submitted papers to the
WiSATS 2017 conference and contributed to its success. A special thanks also to all
the sponsors for their support.
We strongly believe that the WiSATs conference provides a good forum for all
researchers, developers, and practitioners to discuss science and technology pertaining
to wireless and satellite systems. We expect that the next WiSATS conference will be
as successful and stimulating as this edition, as indicated by the contributions presented
in this volume.
Steering Committee
Imrich Chlamtac (Chair) EAI/Create-Net, Italy
Kandeepan RMIT, Australia
Sithamparanathan
Mario Marchese University of Genoa, Italy
Agnelli Stefano ESOA/Eutelsat, France
Prashant Pillai University of Wolverhampton, UK
Organizing Committee
General Co-chairs
Prashant Pillai University of Wolverhampton, UK
Kandeepan RMIT University, Australia
Sithamparanathan
Local Chair
Shumao Ou Oxford Brookes University, UK
Workshops Chairs
Daniele Tarchi University of Bologna, Italy
Sooyoung Kim Chonbuk National University, South Korea
Publications Chair
Paul Daniel Mitchell University of York, UK
Web Chair
Atm S. Alam University of Surrey, UK
VIII Organization
Panels Chair
Bhavani Shankar University of Luxembourg, Luxembourg
Industry Chair
Alberto Ginesi European Space Agency
Tutorials Chair
Aduwati Sali University of Putra Malaysia, Malaysia
Conference Manager
Lenka Bilska European Alliance for Innovation (EAI)
CASG Workshop
1 Introduction
The fifth generation (5G) cellular networks will experience a thousand-fold
increase in data traffic with over 100 billion connected devices by 2020 [1]. Such
surge in traffic will be from smart-phones, tablets, machine-machine connec-
tions and the Internet of Things (IoT). In order to support this sky-rocketing
traffic demand, heterogeneous cloud radio access H-CRAN networks has been
proposed where macro remote radio heads (RRHs) are overlaid by smaller cell
RRHs like femto, pico, micro and relay to increase capacity using spatial fre-
quency reuse. The 5G C-RAN uses cloud computing virtualization techniques
to host basestation (BS) functions in virtual machines (VMs) called virtual BSs
(VBSs) in the BS cloud [2]. One of the driving forces in the BS cloud is VBS
c ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
P. Pillai et al. (Eds.): WiSATS 2017, LNICST 231, pp. 3–10, 2018.
https://doi.org/10.1007/978-3-319-76571-6_1
4 T. Sigwele et al.
placement where VBS are migrated among physical machines (PMs) to maximise
BS resource utilization and reduce energy consumption. Nevertheless, security
issues in the BS cloud in C-RAN have been rarely addressed. The introduction
of running BS functions in PMs in the BS cloud brings about security issues.
A prevalent VBS image with known vulnerabilities can be instantiated by an
attacker in BS cloud, therefore it may generate a large number of security holes
for attackers which may include eavesdropping users conversation. The intro-
duction of VBS images with known security vulnerabilities to a PM can lead to
security risks to the co-located VBSs in that PM. This is because of the one to
many mapping between the PM and the VBSs which makes vulnerabilities prop-
agate rapidly across the entire BS cloud. Some of the attacks that an attacker can
introduce include compromising the hypervisor and also side channel attacks to
the VBSs co-located within the same PM [3]. A VBS that has been compromised
can infect other VBS sharing the same hypervisor, memory or CPU. When a
VBS with no security risks is migrated to the PM with a compromised VBS,
that VBS will be compromised too. As such there is need for a security aware
VBS placement in the BS cloud to avoid the security risks.
In this paper, a VBS and PM security evaluation based on their vulnerabili-
ties is first conducted then, based on these security evaluations, a novel security
aware VSB placement is developed which minimises the security risks in the BS
cloud. The VBSs and PMs are grouped into vulnerability levels such that a VBS
with low vulnerability will be allocated to a PM with low vulnerability and a
VBS with high vulnerability will be allocated to a PM with high vulnerabil-
ity. The rest of the paper is organised as follows. Section 2 describes the related
work on VBS placement in C-RAN. The proposed security aware VBS place-
ment framework is described in details in Sect. 3. The results and discussions are
presented in Sect. 4. Then Finally the conclusions are presented in Sect. 5.
2 Related Work
Researchers have proposed several VBS placement strategies to improve resouce
utilization and improve energy consumption within 5G C-RAN. However, to the
best of our knowledge, there are no efforts on VBS placement strategies in 5G
C-RAN to minimize the security risks for the BS cloud platform. The author
in [4] proposed a VBSs virtualization scheme that minimizes the power con-
sumption with a linear computational complexity order. The scheme is based on
a heuristic simulated annealing (HSA) algorithm, which combines a bin pack-
ing algorithm with simulated annealing. Simulation results show that the HSA
effectively decreases system power consumption when compared to standard
approaches. However, the simulated annealing VBS placement scheme does not
consider security in migration of VBSs. Authors in [5] proposed a BBU reduc-
tion scheme for C-RAN that allocates VBSs to RRHs based on the imbalance of
subscribers in office/residential areas. A set of upper limit of VBS utilization is
defined to avoid overloading of the VBS. However, the author did not consider
security in their VBS consolidation scheme. Namba et al. in [6] proposed a base-
band unit (BBU) reduction network architecture called Colony-RAN due to its
Security Aware 5
ability to flexibly change cell layout by changing the connections of BBUs and
RRHs in respect to traffic demand. However, the proposed method has frequent
ping pong reselections of RRH to BBU. The author in [7] proposed a model for
reducing power consumption in H-CRAN by turning off the BBU in the cloud.
However, the author assumes that all the BBUs in the BS cloud operate at
full load which is unrealistics. The author in [8] proposed a VBS virtualization
scheme that minimizes the power consumption of the BS cloud. The VBS vir-
tualization problem is formulated as a bin packing problem, where each VBS is
treated as a bin with finite computing expressed in million Operations per Time
Slot (MOPTS). The dynamics of the cell traffic load is treated as an item that
needs to be packed into the bins with the size equal to the computing resources
in MOPTS, required to support the traffic load. Nevertheless, security has not
been considered. Authors in [9] proposed a C-RAN system using virtualization
technology on general purpose processors (GPPs) where BBUs are dynamically
provisioned according to traffic load. In [10], Cheng et al. developed an energy
efficient C-RAN system with a reconfigurable backhaul that allows 4 BBUs to
connect flexibly with 4 RRHs using radio-over-fiber technology. The backhaul
architecture allows the mapping between BBUs and RRHs to be flexible and
changed dynamically to reduce energy consumption in the BBU pool. However,
the paper assumes static user traffic whereas in reality BS traffic is dynamic.
The security evaluation procedure consists of evaluating the risks of both the
VBSs and PMs in the BS cloud.
6 T. Sigwele et al.
PM PM PM
Vj
CV BSj = n (1)
m=1 Vm
Start
PM Security Evaluation
For
For
Does state No
match j=j+1
state
Yes
A
End
To analyse the proposed SAV framework, a 2 tier H-CRAN long term evolution
(LTE) layout is considered where macro RRHs are overlaid by small cells RRHs.
Up to 200 RRHs are considered and each RRH has its own VBS in the BS cloud.
As explained before, to the best of our knowledge, there are no security aware
VBS placement schemes in 5G C-RAN at the moment, this paper is the first
to proposed such framework. Therefore, the proposed SAV will be compared
with the HSA scheme in [4] which consider VBS placement for saving energy
consumption in the BS cloud without considering security. Figure 3 shows the
effects of increasing the number of VBSs in the network on the PM survivability
for all the schemes. For both the proposed SAV scheme and the HSA schemes,
as the number of VBSs in the BS cloud increases, the PM survivability decreases
because the chances of comprimised VBSs are higher with the increase of VBSs.
Also it can be observed in the diagram than the SAV scheme performs better than
the HSA scheme by 16% with high chances of survivability of an average of 0.65
compared to the HSA scheme with chances of survivability of 0.5. This is because
Security Aware 9
0.9
0.8
0.7
PM survavibility
0.6
0.5
0.4
0.3
0.2 SAV
HSA
0.1
0
20 40 60 80 100 120 140 160 180 200
Number of VBSs
35
30
Power Consumption (KW)
25
20
15
10
SAV
5 HAS
0
20 40 60 80 100 120 140 160 180 200
Number of VBSs
the SAV scheme considers security of VBSs and PMs before performing the VBS
placement. Figure 4 shows the effects of varying the number of VBSs on the power
consumption in the BS cloud. For both the schemes, as the number of VBSs
increases, the power consumption also increases as more VBSs requires more
PMs which will consume more power. On average, the SAV scheme consumes
15% more energy compared to the HSA scheme. This is because, even though
10 T. Sigwele et al.
the SAV scheme provide some security benefits, this results in the penalty of
more power of 15% being consumed by the SAV scheme as a results of the VBS
placement scheme security overheads which requires more PMs to be deployed.
5 Conclusion
The existing researches mostly focus on how to maximize resource utilization and
reduce energy consumption in fifth generation (5G) cloud radio access networks
(C-RAN) using virtual base station (VBS) placement. However, security issues in
the context of VBS placement within 5G C-RAN have been rarely addressed. In
this paper, a security aware VBS placement (SAV) scheme is proposed where the
placement of VBSs to physical machines (PMs) considers the security levels of
both the VBS and the PM. A rigorous simulation study is conducted for validat-
ing the proposed scheme, which shows a significant security improvement since
the proposed SAV scheme outperforms the heuristic simulated scheme (HSA) by
16% with power consumption penalty of 15%.
References
1. 5G: A Technology Vision, Huawei Tech. White Paper (2013)
2. Chen, K., Duan, K.: C-RAN: the road towards green RAN. In: China Mobile
Research Institute White Paper (2011)
3. Yuchi, X., Sachin, S.: Enabling security-aware virtual machine placement in IaaS
clouds. In: Military Communications Conference, MILCOM 2015, pp. 1554–1559.
IEEE (2015)
4. Qian, M., Hardjawana, W., Shi, J., Vucetic, B.: Baseband processing units virtu-
alization for cloud radio access networks. IEEE Wirel. Commun. Lett. 4, 189–192
(2015)
5. Namba, S., Warabino, T., Kaneko, K.: BBU-RRH switching schemes for central-
ized RAN. In: 2012 7th International ICST Conference on Communications and
Networking in China (CHINACOM), pp. 762–766. IEEE (2012)
6. Namba, S., Matsunaka, T., Warabino, T.: Colony-RAN architecture for future
cellular network. In: Network and Mobile Summit (FutureNetw), pp. 1–8. IEEE
(2012)
7. Domenico, A., Katranaras, E.: Energy efficiency benefits of RAN-as-a-service con-
cept for a cloud-based 5G mobile network infrastructure. IEEE Access 2, 1586–1597
(2014)
8. Qian, M., Hardjawana, W., Vucetic, B.: Baseband processing units virtualization
for cloud radio access networks. IEEE Wirel. Commun. Lett. 4(2), 189–192 (2015)
9. Kong, Z., Gong, C., Xu, Z.: eBase: a baseband unit cluster testbed to improve
energy-efficiency for cloud radio access network. In: IEEE International Conference
on Communications (ICC), pp. 4222–4227. IEEE (2013)
10. Liu, C., Sundaresan, K., Jiang, M., Rangarajan, S., Chang, G.K.: The case for
re-configurable backhaul in cloud-RAN based small cell networks. In: 2013 Pro-
ceedings of IEEE INFOCOM, pp. 1124–1132. IEEE (2013)
11. United State Government: US National Vulnerability Database. https://nvd.nist.
gov. Accessed Mar 2017
DoS Attack Impact Assessment
on Software Defined Networks
1 Introduction
Computer networks have become part of our everyday lives from government to
commercial enterprises to individuals [1]. These networks are built from large
number of devices such as routers, switches and middle boxes with complex pro-
tocols running on them. Network administrators are saddled with the responsi-
bility of configuring these vendor-specific devices and configuration policies are
c ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
P. Pillai et al. (Eds.): WiSATS 2017, LNICST 231, pp. 11–22, 2018.
https://doi.org/10.1007/978-3-319-76571-6_2
12 A. Sangodoyin et al.
Fig. 1. SDN architecture illustrating the data, control and application layers.
The experimental method and tools are presented in Sect. 3. Then Sect. 4 shows
the experimental set-up. The results and analysis are presented in Sect. 5. Finally,
the conclusion and future work are presented in Sect. 6.
2 Related Work
2.1 SDN Architecture
SDN architecture encompasses the complete network platform. It is a modular
approach that defines chain of command and interoperability within network.
Unlike traditional network, the intelligence of data plane devices is removed to
a logically centralised control system [10]. Figure 1 presents the SDN architec-
ture showing the data/infrastructure, control and application layer. In an SDN
architecture, there are two main elements: the controllers and the forwarding
devices. A forwarding device is a hardware or software element specialised in
packet forwarding and based on a pipeline of flow tables where each entry of a
flow table has: a matching rule, action to be executed on matching packets and
counters that keep statistics of matching packets [4]. The controller serves as the
brain of the network and it deals with management of network state. Below is a
description of various layers:
Infrastructure layer: This layer is also known as data plane. It consists
of simple forwarding elements without embedded control or software to take
autonomous decisions. It is accessible through the southbound interface and
allows packet switching and forwarding.
14 A. Sangodoyin et al.
(i) Southbound Interfaces: Southbound interface allows the controller and for-
warding elements to interact in the infrastructure layer, thus being the
crucial instrument for clearly separating the control and data plane func-
tionality.
(ii) Northbound Interfaces: This interface is the connecting bridge between
application layer and control layer. It enables the programmability of the
controllers by exposing the data models and other functionalities within the
controllers for use by applications at the application layer. The northbound
interface is mostly a software ecosystem, hence, a common northbound
interface is still an open issue.
(iii) East/Westbound Interfaces: This interface is a special communication inter-
face envisioned for distributed controllers to synchronise state for high avail-
ability. Its function include import/export data between controllers and
monitoring/notification capabilities to check if a controller is up or notify
a takeover on a set of forwarding elements.
(i) Resource connection: Once a malicious user obtains access to one exper-
iment node, attacks can easily be launched by utilising the huge ProtoGENI
computing resources as a launchpad to harm existing internet users.
(ii) Wireless Nodes Distribution: Network sniffing or spoofing can be done
here to identify desired node for launching attacks.
(iii) Virtualization Technology: In ProtoGENI virtualisation, ProtoGENI
resources are shared among as many user as possible. Any bug or compro-
mise from a single device will expose other users in sharing resources to
attacks.
DoS and Distributed DoS (DDoS) attack remains one of the severe network secu-
rity problems in both traditional network and SDN. Due to separation of control
and data plane, an attacker could saturate the controller with malformed packets
requiring a flow rule decision. On the other hand, the flow table of the infras-
tructure device can be overwhelmed with malicious packets. To address bottle-
necks of potential saturation attack, AVANT-GUARD [16] introduce connection
migration to reduce amount of data-to-control-plane interactions. The method
enables the data plane to shield the control plane from saturation attacks. How-
ever, the data plane itself is subject to attack. Similarly, a backup strategy which
offers resilience against failures in a centralised controlled network is presented
in [17]. This approach is an attempt to solve single point of failure bottleneck
and it provides seamless transition between primary controller to a back-up con-
troller. However, this solution is limited to centralised implementation and it
also raises concern in terms of trust between the east-west interface communi-
cations. In addition, Braga et al. [18] proposed lightweight, a new method for
detecting DDoS. The proposed method boasts of high rate of true positives and
low rate of false alarm using Self Organising Maps (SOM) for flow analysis. The
lightweight method consider median values in training the SOM. The drawback
of this method is that false negatives are reported when the attack parameter is
set to a low value.
The controller has been compared to an operating system capable of manag-
ing applications through programmatic interface [19]. Similarly, ETHANE was
built to provide network-wide fine-grain policy using a centralised declaration
16 A. Sangodoyin et al.
and enforcing it [6]. While the concept of a centralised controller allow the sim-
plification of policy enforcement and management tasks for network managers,
it creates quite a number of bottle necks. In [9], analysis of SDN implementation
key challenges has been carried out. The authors opined deployment of SDN
technology will contribute to the vision of future communications if outstand-
ing challenges were resolved. In [20] the possibility of DoS attacks and poor
rule design that can lead to saturating volumes of controller queries is discussed.
Though OpenFlow vulnerabilities in terms of lack of adoption of Transport Layer
Security (TLS) for controller-switch communication is highlighted in [20], a num-
ber of vulnerabilities proposed was not verified in the work.
Step1 Start
Launch
Hosts make requests
Step3 ICMP attack
from UDP and TCP
servers
Plot graph of
Step5
throughput and jitter
Step6 End
The TCP server is made to listen on port 5566 with a default window size of
85.3 KB. Similarly, UDP server is made to listen on port 5566 with a default
UDP buffer size of 208 KB while receiving 1470 bytes datagrams and the result
is monitored every 1 s.
Step 3: Hosts make requests from TCP server and UDP server
Step 4 and Step 5: Results were extracted using AWK file and results plotted
using MATLAB. Then, malicious hosts 5 and 6 launched flooding attack on the
servers (similar to step 3). Legitimate traffic is started at the beginning of an
experiment, and an attack is launched shortly after for a duration of 100 s.
Step 6: End
4 Experimental Set-Up
In this section, a series of experiments are performed to verify the effects of DoS
attack in the SDN network. The experimental setup is shown in Fig. 3. To create
the scenario in Fig. 3, many software and tools are used as shown in Table 1.
There are two servers and four switches in the network. Each switch has a host
connected to it. The Transmission Control Protocol (TCP) server is connected
to OpenFlow switch1 while User Datagram Protocol (UDP) server is connected
to OpenFlow switch3. ICMP flood attack will be launched against both servers
by malicious hosts 5 and 6.
18 A. Sangodoyin et al.
Simulation Details
Platform/Enviroment -Oracle Virtual Box as base environment for simulations
-Ubuntu OS as base for Mininet v2.2 emulator
-Ubuntu Server as base for OpenDaylight (Boron) controller
-Host CPU as intel core i7, 12 G RAM
Attack tool Hping tool - Hping3 used for flooding attack
250
150
100
50
0 10 20 30 40 50 60 70 80 90 100
Time(sec)
Fig. 4. TCP requests from host 4 to TCP server under ICMP attack.
300
250
Throughput (Mbps)
200
100
50
0 10 20 30 40 50 60 70 80 90 100
Time(sec)
Fig. 5. TCP requests from host 2 to TCP server under ICMP attack.
recorded for H4 requests from server1 without ICMP flood attack. The impact of
the attack launched by host 5 and 6 became noticeable after 15 s of transmission
and the bandwidth utilisation degraded for the rest of the transmission. The trend
is similar for host2 requests from TCP server as degradation started after 8 s of
transmission and degraded for the rest of the transmission. The average through-
put for h2 requests from TCP server dropped from 233 Mbits/s to 87.4 Mbits/s
when the server is under attack. The degradation is more severe for host 2 when
under attack even though higher throughput is recorded during normal operation.
Hence, the need for better network design, traffic isolation based on priority for
mission-critical network and dynamic proactive ways of addressing DoS attacks
when the system is under serious attack.
Exploring the Variety of Random
Documents with Different Content
ON A COLLECTION OF BIRDS LATELY
MADE BY MR. F. STEPHENS IN ARIZONA.
BY WILLIAM BREWSTER.
210, ♂ ad., Cienega Station, April 16. Length, 5; extent, 7.50; wing, 2.75; tail,
2.20; tarsus, .74. “Iris dark brown; bill dark horn color above, lighter below; legs
pale brown. Common in the migrations.”
343, ♂ ad., Tucson, May 7. Length, 5.80; extent, 9.52; wing, 3.05; tail, 2.75. “Iris
dark brown; bill and legs black.”
37. Dendrœca nigrescens (Towns.) Baird. Black-throated Gray Warbler.
—On April 1, Mr. Stephens secured five males of this species among the Chiricahua
Mountains. The only additional specimens in the collection are two females taken
late in the season (No. 203, ♀ ad., Cienega Station, April 15. No. 357, Santa Rita
Mountains, May 12.).
2.98, ♀ ad., Tucson, April 28. Length, 5.10; extent, 7.70; wing, 2.45. “Iris dark
brown; bill and legs black; soles of the feet yellow. Among mesquites.”
373, ♂ ad., Santa Rita Mountains, May 13. Length, 5.30; extent, 8.10; wing, 2.64.
374, ♀ ad., same locality and date. Length, 4.90; extent, 7.40; wing, 2.44. “Iris
dark brown; soles of feet yellowish. Water oaks of foot-hills; very fat.”
Even the most adult males of this species seem to have the throat-patch slightly
sprinkled with yellow. At least I have yet to see one with the black absolutely pure
and unmixed.
310, ♂ ad., Tucson, April 30. Length, 7.50; extent, 9.40; wing, 3.12; tail, 3.52.
“Bill and legs black.”
318, ♂ ad., Tucson, May 3. Length, 7.70; extent, 9.60; wing, 3.05; tail, 3.61.
335, ♂ ad., Tucson, May 5. Length, 7.30; extent, 9.70; wing, 3.12; tail, 3.45.
521, ♂ ad., Tucson, June 11. Length, 7.10; extent, 9.40; wing, 3.15; tail, 3.36.
narrow and several shades lighter in color. Compared with eastern examples
they of course present an even greater contrast. Dr. Coues was undoubtedly right
in saying (Birds of the Colorado Valley, p. 327) that pileolatus “is not confined to
the Pacific coast region”; but I cannot agree with him in thinking it an inconstant
form. On the contrary, I find its characters, as proposed by Mr. Ridgway, so well
maintained that any one of my western birds can be separated at a glance when
placed in a series of twenty-one specimens from the Atlantic States.
221, ♂ ad., Cienega Station, April 17. Length, 4.70; extent, 6.80; wing, 2.17; tail,
2.23; width of bill below nostrils, .12. “Iris brown; bill dark above, pale brown
below. Common here in willows and underbrush along streams.”
257, ♂ ad., Tucson, April 21. Length, 4.90; extent, 7; wing 2.27; tail, 2.30; width
of bill below nostrils, .12.
Ch. Sp.— ♂ ♀ Similis V. huttoni sed rostro robustiori, alis longioribus. Supra
griseo-cinereus, infra fusco-albidus. Uropygio et marginibus caudæ sordide
virenti-olivaceis. Alis albo bifasciatis; remigibus albo-marginatis. Loris et orbe
circum-oculari (macula fusco-brunnea in palpebra superiori excepta), cinereo-
albis.
Adult ♂ (No. 5,728, author’s collection—collector’s No. 41—Chiricahua
Mountains, Arizona, March 14, 1881. F. Stephens). Bill stout; wings from .30 to .40
inches longer than tail. Above grayish-ash; the crown, vertex and sides of head and
neck nearly pure; the back faintly tinged with olive; the rump and an edging on the
tail feathers, dull olive-green. Wings with two nearly confluent bands on the
coverts, and the outer edges of the inner secondaries, broadly white; outer quills
edged more narrowly with the same color. Beneath brownish or smoky-white, with
a mere wash of yellowish on the sides and crissum. Upper eyelid dusky brown;
remainder of orbital region, with the lores, ashy-white in decided contrast with the
nearly clear cinereous of the head generally. Lining of wings white.
Dimensions. Length, 5.20; extent, 8.50; wing, 2.90; tail, 2.25; culmen, .50.
Habitat. Arizona and New Mexico.
Four additional specimens offer no variations affecting any of the characters
above detailed.
In its generally dull, grayish coloration, with little trace of olive or yellow shades,
this Vireo is curiously like V. pusillus, but the under parts are obscured with
brownish, while the differences in size and proportions are too evident to require
detailed comparison. From the smaller, much brighter-colored V. huttoni, which is
unmistakably its nearest United States relative, it may be distinguished by the
following diagnoses.
V. huttoni.—Wing, 2.28 to 2.37. Olive-green above and olivaceous-yellowish
beneath. No clear white anywhere.
V. huttoni stephensi.—Wing, 2.55 to 2.90. Grayish-ash above with no decided
olive-green excepting on the rump and tail. Beneath brownish-white, untinged
with yellowish excepting on the sides and crissum. Wing-bands pure white and
nearly confluent.
It will be observed that the above differences are closely parallel to those which
separate Vireo belli and V. pusillus, while they are in no respect less important.
Indeed were I disposed to emphasize certain peculiarities presented in the wing-
formula of my type, it would not be difficult to make out an equally good case of
specific distinctness, but unfortunately, the relative length of the wing-quills
(including the spurious primaries) proves to be quite as variable in V. huttoni and
its Arizona race, stephensi, as I find it to be in V. pusillus and V. belli, and, I might
add, in all closely allied species which I have so far studied. In short, I am
convinced that this feature, if ever of any diagnostic value, is so with only a small
proportion of the birds to which it has been so freely and confidently applied.
In naming this Vireo after its discoverer, Mr. F. Stephens, I have paid but a
deserved compliment to that gentleman’s zeal and energy as a field ornithologist.
He notes the bird as “not uncommon in scrub oaks” among both the Chiricahua
and Santa Rita Maintains. He also writes me that he has taken specimens in New
Mexico, where, near Fort Bayard, a nest with four eggs was obtained in 1876. In
both Territories it seems to be confined to the mountain ranges, where it
undoubtedly breeds in all suitable localities.
41, ♂ ad., Morse’s Mill, Chiricahua Mountains, March 14. Length, 5.20; extent,
8.50; wing, 2.90; tail, 2.25; tarsus, .73; culmen, .50; depth of bill at nostrils, .15.
“Iris brown.”
50, ♂ ad., Morse’s Mill, March 16. Length, 4.90; extent, 8; wing, 2.55; tail, 2.20;
tarsus, .73; depth of bill at nostrils, .15.
118, ♂ ad., Morse’s Mill, March 28. Length, 5; extent, 7.90; wing, 2.68; tail, 2.30;
tarsus, .70; culmen, .50; depth of bill at nostrils, .15.
140, ♂ ad., Chiricahua Mountains, March 31. Length, 5.10; extent, 8.40; wing,
2.65; tail, 2.25; tarsus, .73; culmen, .49; depth of bill at nostrils, .15.
353, ♂ ad., Santa Rita Mountains, May 11. Length, 5; extent, 8.10; wing, 2.74;
tail, 2.25; tarsus, .70; culmen, .48; depth of bill at nostrils, .15.
Seven California specimens of V. huttoni measure as follows:—
1443, ♂, Nicasio. Wing, 2.35; tail, 2.20; tarsus, .75; culmen, .50; depth of bill, .11.
1445, ♂, Nicasio. Wing, 2.31; tail, 2.15; tarsus, .76; culmen, .51; depth of bill, .11.
1444, ♀ , Nicasio. Wing, 2.35; tail, 2.25; tarsus, .76: culmen, .49; depth of bill,
.10.
1446, ♀ , Nicasio. Wing, 2.32; tail, 2.28; tarsus, .74; culmen, .50; depth of bill,
.14.
6800, ♂ , Berkeley Co. Wing, 2.37; tail, 2.30; tarsus, .75; culmen, .46; depth of
bill, .11.
6801, ♀, Berkeley Co. Wing, 2.28; tail, 2.15; tarsus, .75; culmen, .51; depth of bill,
.11.
6339, ♀, Riverside. Wing, 2.34; tail, 2.14; tarsus, .75; culmen, .52; depth of bill,
.14.
48. Vireo pusillus Coues. Least Vireo.—An abundant summer
species frequenting willows along streams and, near Tucson, thickets
of mesquites. “It is active, restless and very noisy.”
Numerous nests were taken. The only one sent me is a shallower,
but nevertheless rather more elaborate structure, than that of V. belli
to which, however, it bears a strong resemblance. It is mainly
composed of fibrous shreds, apparently obtained from the stalks of
some herbaceous plant. The lining is of delicate, bleached grasses,
which are very neatly arranged. The eggs are white with a cluster of
small black spots about the larger ends. The clutch comprised three,
a number which was not exceeded in any of the other nests. The
notes relating to this set are as follows: “Tucson, June 11. Nest
pensile between the forks of a small mesquite branch, about five feet
from the ground, in a thicket of weeds and brush. Incubation
commenced. Female shot. This species seems to abandon a nest if it
is found before any eggs are laid.”
205, ♂ ad., Cienega Station, April 15. Length, 5; extent, 7.10; wing, 2.21; tail,
2.25. “Iris dark brown; bill dark above, light below; legs dark.”
235, ♀ ad., Tucson, April 19. Length, 5.10; extent, 7.30; wing, 2.23; tail, 2.25.
262, ♂ ad., Tucson, April 22. Length, 6; extent, 7.10; wing, 2.28; tail, 2.34.
275, ♂ ad., Tucson, April 25. Length, 5; extent, 7; wing, 2.21; tail, 2.25.
276, ♀ ad., same locality and date. Length, 4.90; extent, 6.90; wing, 2.18; tail,
2.25.
282, ♂ ad., same locality and date. Length, 5; extent. 7.10; wing, 2.30; tail, 2.30.
461, ♀ ad., Camp Lowell, May 31. Length, 5; extent, 6.90; wing, 2.21; tail, 2.25.
“Laying.”
499, ♀ ad., Tucson, June 7. Length, 5; extent, 6.90. Skin lost.
589, ♀ ad., Camp Lowell, June 24. Length, 4.80; extent, 6.80; wing, 2.21; tail,
2.25.
438, ♂ ad., Tucson, May 26. Length, 7.6; extent, 15.7; wing, 5.45. “Iris dark
brown; bill black; legs blackish.”
53. Petrochelidon lunifrons (Say) Lawr. Cliff Swallow.—At
Yuma. “They were breeding abundantly along a bluff above the
town.”
54. Tachycineta bicolor (Vieill.) Caban. White-bellied
Swallow.—“Common in the migrations.”
195, ♂ ad., Cienega Station, April 15. “Iris dark brown; bill black; legs brown.”
212, ♀ ad., Cienega Station, April 16. “Iris dark brown; bill and legs black.”
211, ♀ ad., Cienega Station, April 16. “Iris and legs dark brown.”
408, ♂ ad., Santa Rita Mountains, May 18. Length, 7.30; extent, 7.60; wing,
3.80; tail, 3.17. “Iris dark brown; bill blackish horn-color above, greenish-yellow
below.”
359, ♀ ad., Santa Rita Mountains, May 12. Length, 7.80; extent, 12.10; wing,
3.75. “Bill black above, bluish horn-color below; legs lead-color; iris brown.”
377, ♂ ad., Santa Rita Mountains, May 14. Length, 8.20; extent, 12.70; wing,
4.20.
380, ♀ ad., Santa Rita Mountains, May 14. Length, 8.10; extent, 12.40; wing,
4.07. “This bird would have laid in about ten days.”
386, ♂ ad., Santa Rita Mountains, May 15. Length, 8.20; extent, 12.80; wing,
4.10.
227, ♂ ad., Tucson, April 19. Length, 8.10; extent, 12.40; wing, 3.83; tail, 3.50.
“Iris brown; bill pale horn-color; legs pale brown. Skin very tender. The first seen
this season.”
268, ♂ ad., Tucson, April 23. Length, 8.20; extent, 12.40.
297, ♂ ad., Tucson, April 27. Length, 7.90; extent, 12.20; wing, 4; tail, 3.60.
515, ♂ ad., Tucson, June 10. Length, 8.10; extent, 12.20; wing, 3.85; tail, 3.60.
522, ♂ im. Tucson, June 11. Length, 8; extent, 12.20; wing, 3.78; tail, 3.46. In
mixed yellow and red plumage.
526, ♂ ad., same locality and date. Length, 8.10; extent, 12.50; wing, 3.89; tail,
3.45.
579, ♂ ad., Camp Lowell, June 23. Length, 8; extent, 11.60; wing, 3.99; tail, 3.58.
339, ♀ ad., Tucson, May 7. Length, 7.90; extent, 12.20; wing, 3.75; tail, 3.39.
NOTES ON THE SUMMER BIRDS OF THE
UPPER ST. JOHN.
BY CHARLES F. BATCHELDER.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com