J. Networks最新文献

筛选
英文 中文
Pairwise Co-betweenness for Several Types of Network 几种类型网络的两两共间性
J. Networks Pub Date : 2015-03-03 DOI: 10.4304/jnw.10.2.91-98
Liang Li, Gaoxia Wang, Man Yu
{"title":"Pairwise Co-betweenness for Several Types of Network","authors":"Liang Li, Gaoxia Wang, Man Yu","doi":"10.4304/jnw.10.2.91-98","DOIUrl":"https://doi.org/10.4304/jnw.10.2.91-98","url":null,"abstract":"Vertex betweenness centrality is essential in the analysis of social and information networks, and it quantify vertex importance in terms of its quantity of information along geodesic paths in network. Edge betweenness is similar to the vertex betweenness. Co-betweenness centrality is a natural developed notion to extend vertex betweenness centrality to sets of vertices, and pairwise co-betweenness is a special case of co-betweenness. In this paper, we analysis the pairwise co-betweenness of WS network model with the different reconnection probability which including rule, smallworld and random network. The pairwise co-betweenness value is represented by several different ways, and it shows some regularity with changing reconnection probability of each edge in WS network model. Meanwhile, for communitystructure network, we obtain vertex-induced subgraph with the highest betweenness vertices, and the edge-induced subgraph with the highest pairwise co-betweenness edges. We demonstrate that the edge of cross-groups is consistent with the edges with top incidental pairwise co-betweenness. Finally, further illustration to the interaction of pairwise co-betweenness and network structure is provided by a practical social network.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"91-98"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75781418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering and Profiling IP Hosts Based on Traffic Behavior 基于流量行为的IP主机集群和分析
J. Networks Pub Date : 2015-03-03 DOI: 10.4304/jnw.10.2.99-107
Ahmad Jakalan, G. Jian, Weiwei Zhang, Su Qi
{"title":"Clustering and Profiling IP Hosts Based on Traffic Behavior","authors":"Ahmad Jakalan, G. Jian, Weiwei Zhang, Su Qi","doi":"10.4304/jnw.10.2.99-107","DOIUrl":"https://doi.org/10.4304/jnw.10.2.99-107","url":null,"abstract":"The objective of this research is to study the behavior of IP Network nodes (IP hosts) from the prospective of their communication behavior patterns to setup hosts’ behavior profiles of the observed IP nodes by clustering hosts into clusters of similar communication behaviors. The problem of IP address behavior analysis and profile establishment is the one that not fully discussed and the results achieved are not good enough, there is no complete solution yet. There are many potential applications of this work, the results of this research will be useful to the network management and Network security situation awareness in addition to the applications in studying the network user behavior. The contribution of this paper includes: 1) discussion about the features or host behavior communication patterns to be utilized in hosts clustering to characterize accurately and efficiently groups of host behavior traffic. 2) We presented an algorithm to extract most significant IP nodes to be analyzed instead of analyzing the complete list of millions of IP nodes that exist in the trace. 3) We analyzed IP nodes traffic behavior on relatively long periods of traces, which help to extract a more stable host’s behavior. While previous studies focus only on host behavior for relatively short periods of 5 to 15 minutes, we extract host’s behavior patterns over a period of one hour which needs big data analysis to provide results in a reasonable time.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"44 1","pages":"99-107"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86816131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Design Algorithm for QoS Network with Flow Delay Control 具有流延迟控制的QoS网络设计算法
J. Networks Pub Date : 2015-03-03 DOI: 10.4304/jnw.10.2.85-90
K. Jaroenrat
{"title":"A Design Algorithm for QoS Network with Flow Delay Control","authors":"K. Jaroenrat","doi":"10.4304/jnw.10.2.85-90","DOIUrl":"https://doi.org/10.4304/jnw.10.2.85-90","url":null,"abstract":"A Mesh Network Topological Optimization and Routing II (MENTOR-II) algorithm is a low complexity and efficient network design algorithm for IP networks with OSPF routing protocol in which appropriate link weights are assigned to the installed links such that the traffic always routes on the path with minimum distance. However, it should be noted that the flow delay of traffic assigned by MENTOR-II are not controlled because MENTOR-II gives the link weights for only assigning traffic flow into the worthy path, therefore routing of traffic flow does not get together with the traffic engineering. This study proposed a new modified version of MENTOR called Q-MENTOR which is able to assign traffic under flow delay controlled. The Q-MENTOR are evaluated in terms of installation cost, routing cost and reliability for 486 network design conditions. The design results are compared with MENTOR-II and it was found that Q-MENTOR is suitable for designing high maximum utilization networks with good delay and reliability. The results also show that low traffic flow delay requirements often present the worst installation cost, routing cost and reliability.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"77 1","pages":"85-90"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90531205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach to Resisting Malformed and Flooding Attacks on SIP Servers 一种抵抗SIP服务器畸形和泛洪攻击的方法
J. Networks Pub Date : 2015-03-03 DOI: 10.4304/jnw.10.2.77-84
Ming-Yang Su, Chen-Han Tsai
{"title":"An Approach to Resisting Malformed and Flooding Attacks on SIP Servers","authors":"Ming-Yang Su, Chen-Han Tsai","doi":"10.4304/jnw.10.2.77-84","DOIUrl":"https://doi.org/10.4304/jnw.10.2.77-84","url":null,"abstract":"As a result of its low costs and high degree of integration with other services, Voice over Internet Protocol (VoIP) has become very widely used, while Session Initiation Protocol (SIP) is one of the most important protocols for providing the VoIP service. Since SIP is an open source code with a simple structure and high expansibility, SIP servers are more vulnerable to attack by SIP messages malformed in order to stunt the server, or by a flood of SIP messages causing server congestion or shutdown. The system proposed in this paper therefore has two functions; one is to filter malformed messages that conflict with the SIP protocol, and the other is to determine whether an SIP server is under flooding attack. This study used the Chi- square test, usually applied in statistics, to identify flooding attacks. The proposed system can automatically modify an SIP server's blacklist to deter an attacker's subsequent attempts.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"94 1","pages":"77-84"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79037961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Stable Path Routing Protocol for Cognitive Radio Ad hoc Networks based on the Maximum Number of Common Primary User Channels 基于最大公共主用户信道数的认知无线电自组织网络稳定路径路由协议
J. Networks Pub Date : 2015-03-03 DOI: 10.4304/jnw.10.2.117-124
N. Meghanathan
{"title":"A Stable Path Routing Protocol for Cognitive Radio Ad hoc Networks based on the Maximum Number of Common Primary User Channels","authors":"N. Meghanathan","doi":"10.4304/jnw.10.2.117-124","DOIUrl":"https://doi.org/10.4304/jnw.10.2.117-124","url":null,"abstract":"We propose a novel local spectrum knowledge-based distributed stable path routing protocol for cognitive radio ad hoc networks (CRAHNs) where the unlicensed secondary users (SUs) make use of the licensed channels of the Primary Users (PUs) when the latter are not actively using the channels. We model a time-variant CRAHN of SUs with links between any two SUs if they have at least one common PU channel available for use in their neighborhood and the weight of an edge is the number of such common PU channels available for use. Referred to as the Maximum Common Primary User channel-based Routing (MCPUR) protocol, the proposed protocol prefers to choose an SU-SU source-destination ( s-d ) path with the largest value for the sum of the number of common PU channels available for use across each of its constituent edges. Our hypothesis is that such an s-d route is likely to exist for a longer time (and incur fewer broadcast route discoveries) as the end nodes of the constituent SU-SU edges are more likely to have at least one common available PU channel that can be used to complete the transmission and reception of data packets. Simulation results confirm our hypothesis to be true: the number of path transitions incurred with MCPUR could be at most 62% lower than that of the path transitions incurred with a minimum hop-based shortest path routing (SPR) protocol. The tradeoff is a low-moderate increase in the hop count per path (as large as 17%)","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"117-124"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86405138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Intelligent Management of Multiple Access Schemes in Wireless Body Area Network 无线体域网络中多接入方案的智能管理
J. Networks Pub Date : 2015-03-03 DOI: 10.4304/JNW.10.2.108-116
Jing Zhou, Aihuang Guo, H. Nguyen, S. Su
{"title":"Intelligent Management of Multiple Access Schemes in Wireless Body Area Network","authors":"Jing Zhou, Aihuang Guo, H. Nguyen, S. Su","doi":"10.4304/JNW.10.2.108-116","DOIUrl":"https://doi.org/10.4304/JNW.10.2.108-116","url":null,"abstract":"Wireless Body Area Network is a novel technology to provide efficient, convenient and safe health, medical and personal entertainment services but it still faces longstanding challenges in the application. A smart communication standard is essential to solve some problems in wireless data transmission and optimize system performance. This paper proposes an intelligent management of multiple access schemes for contention access and contention free access with game theory. The strategies are determined by requirements of applications and channel status. Nodes in a network choose various strategies for best payoff according to different conditions including normal status, packets-oriented services, emergent situation and bad link states with specific utility functions. The novel management model supports flexible resource allocation and enhances the system performance, which are evaluated by simulations of Castalia under various conditions.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"15 21","pages":"108-116"},"PeriodicalIF":0.0,"publicationDate":"2015-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91521541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Epidemic Strategies in Delay Tolerant Networks from an Energetic Point of View: Main Issues and Performance Evaluation 从能量的角度看容延迟网络的流行策略:主要问题和性能评价
J. Networks Pub Date : 2015-02-28 DOI: 10.4304/jnw.10.01.4-14
F. Rango, Salvatore Amelio, P. Fazio
{"title":"Epidemic Strategies in Delay Tolerant Networks from an Energetic Point of View: Main Issues and Performance Evaluation","authors":"F. Rango, Salvatore Amelio, P. Fazio","doi":"10.4304/jnw.10.01.4-14","DOIUrl":"https://doi.org/10.4304/jnw.10.01.4-14","url":null,"abstract":"In this work we investigate Epidemic novel strategies called SNPS and EAER-SNPS applied to a DTN Network. These strategies extend the approach of the basic epidemic routing by using the node density estimation and the nodes energy levels; they adopt the forwarding scheme of the n-Epidemic routing. However, differently from n-Epidemic, it applies a dynamic forwarding scheme based on nodes density, that is able to reduce energy consumption and increase message delivery probability. A deep campaign of simulations was carried out in order to verify the effectiveness of the SNPS and EAER-SNPS. Simulation campaigns were conducted to evaluate the message delivery ratio, the average hop count, the average end-to-end delay and the average residual energy. Different mobility scenarios have been considered through the Working Day mobility model and by simulating pedestrians, buses and cars, in order to see how the performance can degrade on the basis of mobility and nodes characteristics","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"30 1","pages":"4-14"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86495839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Capacity Analysis in the Next Generation Wireless Networks Based on SINR Constraints 基于SINR约束的下一代无线网络容量分析
J. Networks Pub Date : 2015-02-28 DOI: 10.4304/jnw.10.01.29-38
Wahida Mansouri, K. Mnif, F. Zarai, M. Obaidat, L. Kamoun
{"title":"Capacity Analysis in the Next Generation Wireless Networks Based on SINR Constraints","authors":"Wahida Mansouri, K. Mnif, F. Zarai, M. Obaidat, L. Kamoun","doi":"10.4304/jnw.10.01.29-38","DOIUrl":"https://doi.org/10.4304/jnw.10.01.29-38","url":null,"abstract":"The demand for accessing services while on the move, at any place and anytime, has led to the current efforts towards integration ofheterogeneous wireless networks. In particular, interoperability of cellular networks and Wireless Local Area Network (WLAN), as complementarysystems in providing capacity and coverage, has drawn a lot of attention. Next Generation Wireless Networks (NGWNs) are expected to be heterogeneous networks which integrate different Radio Access Technologies (RATs) such as 3GPP’s Long Term Evolution (LTE) andWLANwhere a transmission is supported if the signal-to-interference-plus-noise ratio (SINR) at the receiver is greater than some threshold. It is based on the fact that several competing technologies, which have different requirements and capabilities, can co-exist. This approach tries to select always the best network according to a set of requirements and perform the inter-system handover between them, when those requirements are not fulfilled. In this article, we analyze the interference in heterogeneous wireless networks and determinethe capacity, in a study based on Markov chains, by taking into considerationthe class of traffic of each call and considering both intra-network interference and inter-network interference. Our analysis approach is based on modeling of the system as a multi-dimensional Markov chain which represents the current number of ongoing calls of different classes of services in the system. This analysis allows us to simplify the estimation of capacity under SINR interference constraints in different wireless networks. Based on this analysis, we derive performance evaluation results regarding blocking of real-time and non-real-time calls in each RAT and under different network sizes","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"5092 4 1","pages":"29-38"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75093990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-objective Routing Algorithm for Wireless Mesh Network in a Smart Cities Environment 智慧城市环境下无线Mesh网络的多目标路由算法
J. Networks Pub Date : 2015-02-28 DOI: 10.4304/jnw.10.01.60-69
C. Lozano-Garzon, M. Camelo, P. Vilà, Y. Donoso
{"title":"A Multi-objective Routing Algorithm for Wireless Mesh Network in a Smart Cities Environment","authors":"C. Lozano-Garzon, M. Camelo, P. Vilà, Y. Donoso","doi":"10.4304/jnw.10.01.60-69","DOIUrl":"https://doi.org/10.4304/jnw.10.01.60-69","url":null,"abstract":"Wireless Mesh Networks (WMN) is one of the most common network infrastructure that provides the technical characteristics to fulfill the requirements proposed by the Smart Cities. In order to obtain an efficient allocation and use of resources in such kind of infrastructures, the design of routing protocols that support Quality of Service (QoS) is fundamental. In this paper we propose a routing algorithm based on the Strength Pareto Evolutionary Algorithm (SPEA). This algorithm intends to build the most efficient routes by considering the shortest path, the energy consumption, the free space lost and QoS restrictions (delay and bandwidth) at the same time. As result, the designed routing protocol could be used in unicast or multicast transmission schemes, with or without restrictions and into centralized or decentralized environments.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"147 1","pages":"60-69"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76239596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing 大规模部署Cloudlets实现高效移动云计算
J. Networks Pub Date : 2015-02-28 DOI: 10.4304/jnw.10.01.70-76
L. Tawalbeh, Y. Jararweh, Fadi Ababneh, Fahd Dosari
{"title":"Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing","authors":"L. Tawalbeh, Y. Jararweh, Fadi Ababneh, Fahd Dosari","doi":"10.4304/jnw.10.01.70-76","DOIUrl":"https://doi.org/10.4304/jnw.10.01.70-76","url":null,"abstract":"Interest in using Mobile Cloud Computing (MCC) for compute intensive mobile devices jobs such as multimedia applications has been growing. In fact, many new research efforts were invested to maximize the mobile intensive jobs offloading to the cloud within the cloud system coverage area. However, a large scale MCC deployment challenges and limitations are not considered. In this paper, a large scale Cloudlet-based MCC system deployment is introduced, aiming at reducing the power consumption and the network delay of multimedia applications while using MCC. The proposed deployment offers a large coverage area that can be used by mobile devices while they are moving from one location to another to reduce broadband communication needs. Practical experimental results and simulated results using show that using the proposed model reduces the power consumption of the mobile devices as well as reducing the communication latency when the mobile device requests a job to be performed remotely while satisfying the high quality of service requirements of mobile users.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"16 1","pages":"70-76"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82470586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信