{"title":"Applying spread spectrum technique for transmitting extra bits over AWGN channel","authors":"T. Amornraksa, P. Sweeney","doi":"10.1109/ICON.2001.962373","DOIUrl":"https://doi.org/10.1109/ICON.2001.962373","url":null,"abstract":"This paper describes an encoding scheme based on direct sequence spread spectrum technique for conveying some extra bits in a communication channel. In the encoding process, a small amount of information is added into the original transmitted signal to generate the output signal for transmission, and the user at the receiver end is able to obtain both contents. In the decoding process, the added extra bits are first extracted from the received signal, and then used to recover the original signal. The scheme was examined by simulation method and its performance was measured. Error control codes were applied to the extra bits before the encoding process so that the scheme's performance can be significantly improved. The scheme was also examined by transmitting the data through an AWGN channel to observe its performance when implemented in general applications. With the proposed scheme, the existing allocated bandwidth in the broadcast channel can be utilized in a more efficient way.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132656920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active route-maintenance protocol for signal-based communication path in ad-hoc networks","authors":"Chih-Yung Chang, Shin-Chih Tu","doi":"10.1109/ICON.2001.962312","DOIUrl":"https://doi.org/10.1109/ICON.2001.962312","url":null,"abstract":"Ad-hoc wireless networks consist of mobile hosts in a network without of base stations and are characterized by a highly dynamic network topology. The network topology changes frequently due to host migration, signal interference and power outages. This makes routing maintenance challenging for routing protocol design. We present an active route maintenance protocol to prevent the existing route from disconnecting. By monitoring the status of signal strength and the stability of individual hosts, an active node that causes the route to have a weak connection actively issues a route reestablishing process in which the active host selects one of its neighbors as the candidate for partial reconstruction of the weak connection. An enhanced active route maintenance protocol is also proposed to reduce the probability of route breakage and enhance the route efficiency. Performance simulation results show that the proposed route maintenance protocol effectively reduces both the overhead and route maintenance, as well as alleviating the route-break phenomenon.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114571260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of accounting model within SNMPv3 architecture","authors":"B. Stancev, L. Gavrilovska","doi":"10.1109/ICON.2001.962323","DOIUrl":"https://doi.org/10.1109/ICON.2001.962323","url":null,"abstract":"This paper presents an implementation of a new accounting model within the existing SNMPv3 architecture. The model discussed is based on the SNMPv3 structure defined in RFC 2570-2575. This model defines accounting functionality, which is a result of the growth of importance of the SNMP and its wide usage. We assume that this will be one of the steps to improve and upgrade SNMP to answer the modern requirements. The accounting mechanism is an addition to the authentication and authorization functionalities that are already implemented in SNMPv3 by using the USM (user-based security model) and VACM (view-based access control model). This model provides minimal structure modification of the existing SNMPv3 architecture.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114655656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards securing 3G mobile phones","authors":"R. Safavi-Naini, W. Susilo, Gelareh Taban","doi":"10.1109/ICON.2001.962344","DOIUrl":"https://doi.org/10.1109/ICON.2001.962344","url":null,"abstract":"Third-generation (3G) mobile phones are capable of high data rate Internet connection and promise seamless connectivity for a free roaming user. They can provide an \"always on\" Internet, and make a range of services, traditionally available on desktop computers, accessible to mobile users, irrespective of their location. Providing adequate security for these phones and the services that they offer is a central concern for their acceptability and uptake. We briefly review the security of second generation mobile phones and then discuss security architecture proposed for 3G phones. The new security issues that are of importance because of the combination of their advanced capabilities and limitations are discussed.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124011778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The multi-layer RSIP framework","authors":"Jia-Ning Luo, S. Shieh","doi":"10.1109/ICON.2001.962335","DOIUrl":"https://doi.org/10.1109/ICON.2001.962335","url":null,"abstract":"Network Address Translation (NAT) and Realm Specific IP (RSIP) were proposed to extend the lifetime of IPv4 architecture. However NAT and RSIP do not have the ability to communicate with multi-layer private networks. This paper proposes an enhanced framework of multi-layer Realm-Specific IP (MRSIP) that not only inherits all the benefit of RSIP but also provides both end-to-end transparent-access capabilities and cascade private network connectivity. The MRSIP framework we propose includes the concept of cascade private network architecture, inter-private network accessing capabilities, and tunnel optimization. In addition, we provide a mechanism to avoid the private address collision problem.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125512085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient connection scheme for mobile IP","authors":"Hye-young Kim, C. Hwang","doi":"10.1109/ICON.2001.962374","DOIUrl":"https://doi.org/10.1109/ICON.2001.962374","url":null,"abstract":"Computer users in this varied and rapidly changing world does not stay in one place, and the correspondence among computers through the Internet has increased due to the quick development of Web based applications. But the Internet TCP/IP communication protocol was not designed to cover a mobile host, so the IP protocol should detect a mobile host that independently moves and have a moving management system to transmit the data. That is, the mobile IP protocol, must provide the mobile host with the continuous connection to the Internet. The mobile IP proposed by the IETF is efficient, but if the mobile host moves frequently and communicates with others in a specific zone, it may be inefficient. This is because there would be a delay in registering the mobile hosts and in setting up a secure tunnel in the Internet environment, and also in transmitting the data. These inefficiencies were maximized by the mobile host that has an incessant mobility. When the mobile host registered itself with the home agent, the registration cost can be reduced by using boarder router to manage the mobility within a specific zone. It enables the mobile host to detect quickly by placing an anchor FA that uses the anchor chain scheme, which is a combined pointer forwarding and caching method. Therefore, to solve the inefficiencies of the mobile IP, we suggest the border router and anchor FA to manage the mobility in the specific zone and to efficiently detect the mobile host.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127242425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of mobile IP and SLM","authors":"R. Hsieh, A. Seneviratne","doi":"10.1109/ICON.2001.962391","DOIUrl":"https://doi.org/10.1109/ICON.2001.962391","url":null,"abstract":"We present a performance analysis of two architectures for Internet host mobility management, namely, mobile IP and session layer mobility management (SLM). The mobile IP architecture is designed with the principle that the fixed Internet hosts should remain unmodified while only the underlying IP routing infrastructure should change. By contrast, SLM requires no changes to the existing IP infrastructure as well as the transport protocols but only modifications to the session layer protocols and the applications at the end hosts. We compare the performance advantages of the end-to-end mobility scheme with the network-layer mobility, scheme, and prove by experiments that the end-to-end scheme, i.e. SLM, is a better solution for host mobility in many situations.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114888486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Server based QoS routing with implicit network state updates","authors":"Sungha Kim, Meejeong Lee","doi":"10.1109/ICON.2001.962394","DOIUrl":"https://doi.org/10.1109/ICON.2001.962394","url":null,"abstract":"We propose centralized server based QoS routing schemes, where a route server is responsible for determining QoS paths on behalf of all the routers in the routing domain. In the proposed server based schemes, the dynamic link QoS state information, which is required for a QoS path computation, is implicitly maintained at the route server as it assigns or retrieves QoS paths. By maintaining the network state information this way, we may not only eliminate the overhead in exchanging network state update messages but also achieve higher routing performance. We discuss techniques for reducing the amount of processing overhead at the route server, and evaluate the performance of the proposed schemes using simulation. The simulation results show that the proposed server based QoS routing schemes may improve the routing performance compared to the distributed QoS routing schemes proposed in the literature, and the proposed processing reduction methods may significantly reduce the processing cost at the route server.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133259916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Domain based approach for QoS provisioning over Mobile IP","authors":"Ki-Il Kim, Sang-Ha Kim","doi":"10.1109/ICON.2001.962393","DOIUrl":"https://doi.org/10.1109/ICON.2001.962393","url":null,"abstract":"Mobile IP (MIP) ensures packet routing to the mobile host when its attachment is changed on Internet. MIP defines two functional entities - HA (home agent) and FA (foreign agent) - to pursue the location of mobile host and tunneling to deliver packets that are destined to the mobile node's home address. But, this tunneling has difficulties in adapting Internet service architecture - Integrated Service and Differentiated Service. Since both identify the service session as destination IP address, IP protocol number and destination port, a new different service session must be defined over the IP tunnel. For that reason, how to guarantee the QoS over IP tunnel and interoperate with end-to-end service session are key features for MIP QoS. Since MIP QoS is mostly dependent on host mobility supporting protocol, we believe that the host mobility supporting protocol must be regarded as important factor. The current host mobility supporting protocol has hierarchical architecture as micro mobility and macro mobility. So, if the MIP QoS could be viewed as the same hierarchical architecture, the better QoS guarantee might be possible. This paper specifies a hierarchical scheme, which uses not only aggregate RSVP between domain level agents, but also applies specific local policy between domain level agent and mobile host in a domain.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125543029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}