S. Benkirane, Abderrahim Beni Hssane, M. L. Hasnaoui, My Driss El Ouadghiri, M. Laghdir
{"title":"Performance analysis of routing protocols for Mobile Wireless Sensor Network in an environment with obstacles using NCTUns tools","authors":"S. Benkirane, Abderrahim Beni Hssane, M. L. Hasnaoui, My Driss El Ouadghiri, M. Laghdir","doi":"10.1109/NGNS.2012.6656102","DOIUrl":"https://doi.org/10.1109/NGNS.2012.6656102","url":null,"abstract":"A Mobile Wireless Sensor Network (MWSN), is a self-configuring infra structureless network of mobile devices connected by wireless links. In these networks there is no fixed topology due to the mobility of nodes, interference, multipath propagation and path loss. Hence a dynamic routing protocol is needed for these networks to function properly. Many Routing protocols have been proposed and developed for achieving this task. In this paper we study and analyze two mobiles routing protocols for MWSN in an environment without and with obstacles using NCTUns tools.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122572419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emulation of ISDN multi-channel circuit-mode bearer services in next generation networks by TDM pseudo-wires","authors":"J. Muñoz-Calle, A. J. Sierra, J. Vozmediano","doi":"10.1109/NGNS.2012.6656094","DOIUrl":"https://doi.org/10.1109/NGNS.2012.6656094","url":null,"abstract":"The specifications of the Next Generation Networks (NGN) agree on the need for migration mechanisms that enable the replacement of traditional networks, highlighting the ISDN networks. This requirement has a notable impact on NGN in terms of network design. Recent solutions proposed by ITU-T and ETSI for ISDN migration only include support for a subset of current ISDN services, not covering in detail the multi-channel circuit-mode bearer services. This paper examines the use of TDM pseudowires for NGN emulation of ISDN multi-channel calls between ISDN terminals, proposing new payload types.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116982065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed El Mahdi Boumezzough, N. Idboufker, A. A. Ouahman
{"title":"Evaluation of Startup Delay of Video on demand in IMS","authors":"Mohamed El Mahdi Boumezzough, N. Idboufker, A. A. Ouahman","doi":"10.1109/NGNS.2012.6656098","DOIUrl":"https://doi.org/10.1109/NGNS.2012.6656098","url":null,"abstract":"IP Multimedia Subsystem (IMS) is promising architecture for telecom operators that are looking to expand their sources of income by reducing their CAPEX and OPEX. This reduction is due to the ability of IMS to provide various multimedia services and applications such as VoIP, presence, VoD (Video on demand). To ensure that services meet the high expectations of end users, factors affecting the quality of service (QoS) or a user's quality of experience (QoE) must be properly considered. Video On Demand is an example of IMS service which is based on the session initiation protocol (SIP) for session establishment and the RTSP (Real Time Streaming Protocol) for controlling delivery of media streaming. This paper will give a study of an important QoE metric of VoD which is `Startup Delay', we propose an evaluation method of this Startup Delay. Also, we propose to compare VoD QoE in IMS architectures based respectively on IPv4 and IPv6 networks.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130213888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Persistent SCTP timeout policy by using cross-layer mechanism","authors":"Mahamadou Issoufou Tiado, H. Saliah-Hassane","doi":"10.1109/NGNS.2012.6656109","DOIUrl":"https://doi.org/10.1109/NGNS.2012.6656109","url":null,"abstract":"To meet various contingencies of operating wireless networks including for example the change of the state of the channel, cross-layer techniques facilitate the sharing of information between the OSI model layers and can be apply to all various protocols levels, if there are interactions for which the overall performance of the studied system can be improved. Reliable transport protocols use the retransmission timeout management mechanism (RTO-MM) when a bad state of the wireless channel occurs, which temporarily blocks the transmission of data. In this paper, we suggest a new policy of timeout applied to the Stream Control Transmission Protocol (SCTP) called persistent timeout policy. This policy is based on the use of the channel status provided by the 802.11 link layer, through the cross-layer mechanism. The principle of this timeout is that when a bad state of the wireless channel blocks the sending of data, SCTP continuously observes the evolution of this state to detect the next favorable change before sending its segments. We evaluate the following two timeout policies (persistent and traditional RTO-MM) of SCTP in an ad hoc network, and also in comparison with the Transmission Control Protocol (TCP). Section I of this paper presents an overview of the SCTP protocol. Section II presents the principle of the persistent timeout policy. Section III presents the simulation results that are used to compare the two timeout policies of the two reliable transport protocols SCTP and TCP.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133982963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PIM-SM protocol based architecture to transparent mobile sources in multicast mobile IPv6 diffusion","authors":"Youssef Baddi, Mohamed Dafir Ech-Chrif El-Kettani","doi":"10.1109/NGNS.2012.6656079","DOIUrl":"https://doi.org/10.1109/NGNS.2012.6656079","url":null,"abstract":"Internet research community has proposed many Different multicast routing protocols to support efficient multimedia application such as, IPTV, videoconferencing, group games. Nevertheless, these protocols have not been designed for mobile members and roaming sources, and has not been tested in wireless and mobile environment since they were developed for multicast parties whose members and sources are topologically stationary. Studying and solving multicast issues in the stationary multicast infrastructure has been largely studied in the literature. However, fewer efforts have been spent in the specific problems of mobile members and sources. The main problematic of the multicast IP protocols in a Mobile IP environment is the frequent change of membership and members location, especially, the scenario of handover where a mobile source moves from attachment point in one sub-network to another one in another sub-network is challenging. A multicast source is identified by its Home Address HA. Since IP mobility implies acquisition of a new topologically Care-of-Address CoA at each handoff resulting in a change of identity of the multicast source, however, the established multicast routing states are always based on the home address of the mobile source. The key idea of this work is to make the handover of multicast sources transparent and avoid the reconstruction of the entire multicast-based tree, by using an architecture based in PIM-SM multicast distribution trees to hide the mobility of a mobile multicast source from the main multicast delivery tree. Simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130012073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Novakov, Chung-Horng Lung, I. Lambadaris, N. Seddigh
{"title":"Combining statistical and spectral analysis techniques in network traffic anomaly detection","authors":"S. Novakov, Chung-Horng Lung, I. Lambadaris, N. Seddigh","doi":"10.1109/NGNS.2012.6656106","DOIUrl":"https://doi.org/10.1109/NGNS.2012.6656106","url":null,"abstract":"Rapid increase in number of computer attacks prompts a need to detect network anomalies quickly and effectively. This area has been widely studied and solutions typically use data not freely available. A labeled available network traffic flow dataset, Kyoto2006+, has been recently created. Most existing works using Kyoto2006+ for network anomaly detection, apply various clustering approaches. Clustering approaches typically require thresholds for minimum size or distance, or the number of clusters. Results could be sensitive to the selection of such thresholds. This paper leverages existing spectral analysis and statistical analysis techniques for network anomaly detection. One well known spectral analysis technique is Haar Wavelet filtering analysis. It measures the amount and magnitude of abrupt changes in data. Another popular approach is a statistical analysis technique called Principal Component Analysis (PCA). PCA describes data in a new dimension to unlock otherwise hidden characteristics. Both approaches have strengths and limitations. In response, this paper proposes a Hybrid PCA-Haar Wavelet Analysis; a modified PCA which incorporates time shifting to account for changes over time is considered. In addition, the hybrid approach uses PCA to describe the data and Haar Wavelet filtering for analysis. Based on prototyping and measurement, an investigation of the Hybrid PCA-Haar Wavelet Analysis technique is performed using the Kyoto2006+ dataset. We present experimental results to demonstrate the accuracy and precision of the hybrid approach as compared to the two algorithms individually. Furthermore, tests to examine the impact of various parameters used in the algorithm are discussed.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116515793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of SIP infrastructure","authors":"M. Voznák, J. Rozhon","doi":"10.1109/NGNS.2012.6656107","DOIUrl":"https://doi.org/10.1109/NGNS.2012.6656107","url":null,"abstract":"The paper deals with performance measurement and assessment of SIP based network. The complex methodology for SIP benchmarking and performance testing based on IETF draft versions has been developed by our team so that the results coming from the measurement specified in this methodology could be compared platform independently. Our earliest implementations of this methodology relied on open-source software and virtualization tools and were greatly improved during the last year with the emphasis on ease of use, understandability and repeatability. The development of this platform and its current stage are the topic of this paper which presents both the cornerstone technologies of the new platform and the main aspects of the methodology in relation to the result analysis.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125773981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Errais Mohammed, Bellafkih Mostapha, R. Brahim, D. Ranc
{"title":"Cost optimization of monitoring and supervision of IP Multimedia Subsystem networks","authors":"Errais Mohammed, Bellafkih Mostapha, R. Brahim, D. Ranc","doi":"10.1109/NGNS.2012.6656096","DOIUrl":"https://doi.org/10.1109/NGNS.2012.6656096","url":null,"abstract":"The new INQA approach (IMS Network QoS Architecture) for IMS network (IP Multimedia Subsystem) monitoring, provides innovative solutions for management and monitoring services, in real time. This approach aims to change the reliability of services deployed by operators in a multi technological context which raises many challenges. However, the deployment costs of management entities are significant, particularly in terms of execution time and resources load. To this end, we propose in this paper a comparison between the deployment costs via both CORBA and SOA technologies, in order to identify the most appropriate one for monitoring IMS networks.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121385268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure HeNB network management based VPN IPSec","authors":"A. Laguidi, A. Hayar, M. Wetterwald","doi":"10.1109/NGNS.2012.6656105","DOIUrl":"https://doi.org/10.1109/NGNS.2012.6656105","url":null,"abstract":"Femtocells are small base stations used inside buildings to improve radio coverage (Indoor). In this paper we present an overview of femtocells, focusing more particularly our research topic on the congestion, power and security management of HeNB (Home eNodeB). We also propose new architecture for managing in a secure way femtocells network using VPN IPSec.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130922372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rabab Chakhmoune, Hicham Behja, Y. Benghabrit, A. Marzak
{"title":"Toward the validation of knowledge in corporate memory","authors":"Rabab Chakhmoune, Hicham Behja, Y. Benghabrit, A. Marzak","doi":"10.1109/NGNS.2012.6656093","DOIUrl":"https://doi.org/10.1109/NGNS.2012.6656093","url":null,"abstract":"Knowledge is one of the organization's most important values that influencing its competitiveness. One way to capture organization's knowledge and make it available to all their members is through the use of knowledge management systems. A critical process in the whole knowledge management life cycle is validation. A Knowledge Base (KB) incorporated into such systems has to be verified or (more generally) validated. There have been many approaches to develop specialised procedures and techniques, aimed at assuring the highest level of knowledge quality, so the paper deals with practical guidelines of Knowledge Validation (KV). This paper defines certain principles useful in the validation procedures referring to the structural assumption for KV. Finally it presents our approach to build a corporate memory in industrial study case comparing with other case studies.","PeriodicalId":102045,"journal":{"name":"2012 Next Generation Networks and Services (NGNS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128131957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}