Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.最新文献

筛选
英文 中文
Applying spread spectrum technique for transmitting extra bits over AWGN channel 采用扩频技术在AWGN信道上传输额外比特
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001. Pub Date : 2001-10-10 DOI: 10.1109/ICON.2001.962373
T. Amornraksa, P. Sweeney
{"title":"Applying spread spectrum technique for transmitting extra bits over AWGN channel","authors":"T. Amornraksa, P. Sweeney","doi":"10.1109/ICON.2001.962373","DOIUrl":"https://doi.org/10.1109/ICON.2001.962373","url":null,"abstract":"This paper describes an encoding scheme based on direct sequence spread spectrum technique for conveying some extra bits in a communication channel. In the encoding process, a small amount of information is added into the original transmitted signal to generate the output signal for transmission, and the user at the receiver end is able to obtain both contents. In the decoding process, the added extra bits are first extracted from the received signal, and then used to recover the original signal. The scheme was examined by simulation method and its performance was measured. Error control codes were applied to the extra bits before the encoding process so that the scheme's performance can be significantly improved. The scheme was also examined by transmitting the data through an AWGN channel to observe its performance when implemented in general applications. With the proposed scheme, the existing allocated bandwidth in the broadcast channel can be utilized in a more efficient way.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132656920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active route-maintenance protocol for signal-based communication path in ad-hoc networks 自组织网络中基于信号的通信路径的主动路由维护协议
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001. Pub Date : 2001-10-10 DOI: 10.1109/ICON.2001.962312
Chih-Yung Chang, Shin-Chih Tu
{"title":"Active route-maintenance protocol for signal-based communication path in ad-hoc networks","authors":"Chih-Yung Chang, Shin-Chih Tu","doi":"10.1109/ICON.2001.962312","DOIUrl":"https://doi.org/10.1109/ICON.2001.962312","url":null,"abstract":"Ad-hoc wireless networks consist of mobile hosts in a network without of base stations and are characterized by a highly dynamic network topology. The network topology changes frequently due to host migration, signal interference and power outages. This makes routing maintenance challenging for routing protocol design. We present an active route maintenance protocol to prevent the existing route from disconnecting. By monitoring the status of signal strength and the stability of individual hosts, an active node that causes the route to have a weak connection actively issues a route reestablishing process in which the active host selects one of its neighbors as the candidate for partial reconstruction of the weak connection. An enhanced active route maintenance protocol is also proposed to reduce the probability of route breakage and enhance the route efficiency. Performance simulation results show that the proposed route maintenance protocol effectively reduces both the overhead and route maintenance, as well as alleviating the route-break phenomenon.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114571260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Implementation of accounting model within SNMPv3 architecture SNMPv3体系结构中计费模型的实现
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001. Pub Date : 2001-10-10 DOI: 10.1109/ICON.2001.962323
B. Stancev, L. Gavrilovska
{"title":"Implementation of accounting model within SNMPv3 architecture","authors":"B. Stancev, L. Gavrilovska","doi":"10.1109/ICON.2001.962323","DOIUrl":"https://doi.org/10.1109/ICON.2001.962323","url":null,"abstract":"This paper presents an implementation of a new accounting model within the existing SNMPv3 architecture. The model discussed is based on the SNMPv3 structure defined in RFC 2570-2575. This model defines accounting functionality, which is a result of the growth of importance of the SNMP and its wide usage. We assume that this will be one of the steps to improve and upgrade SNMP to answer the modern requirements. The accounting mechanism is an addition to the authentication and authorization functionalities that are already implemented in SNMPv3 by using the USM (user-based security model) and VACM (view-based access control model). This model provides minimal structure modification of the existing SNMPv3 architecture.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114655656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards securing 3G mobile phones 迈向3G手机安全
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001. Pub Date : 2001-10-10 DOI: 10.1109/ICON.2001.962344
R. Safavi-Naini, W. Susilo, Gelareh Taban
{"title":"Towards securing 3G mobile phones","authors":"R. Safavi-Naini, W. Susilo, Gelareh Taban","doi":"10.1109/ICON.2001.962344","DOIUrl":"https://doi.org/10.1109/ICON.2001.962344","url":null,"abstract":"Third-generation (3G) mobile phones are capable of high data rate Internet connection and promise seamless connectivity for a free roaming user. They can provide an \"always on\" Internet, and make a range of services, traditionally available on desktop computers, accessible to mobile users, irrespective of their location. Providing adequate security for these phones and the services that they offer is a central concern for their acceptability and uptake. We briefly review the security of second generation mobile phones and then discuss security architecture proposed for 3G phones. The new security issues that are of importance because of the combination of their advanced capabilities and limitations are discussed.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124011778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The multi-layer RSIP framework 多层RSIP框架
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001. Pub Date : 2001-10-10 DOI: 10.1109/ICON.2001.962335
Jia-Ning Luo, S. Shieh
{"title":"The multi-layer RSIP framework","authors":"Jia-Ning Luo, S. Shieh","doi":"10.1109/ICON.2001.962335","DOIUrl":"https://doi.org/10.1109/ICON.2001.962335","url":null,"abstract":"Network Address Translation (NAT) and Realm Specific IP (RSIP) were proposed to extend the lifetime of IPv4 architecture. However NAT and RSIP do not have the ability to communicate with multi-layer private networks. This paper proposes an enhanced framework of multi-layer Realm-Specific IP (MRSIP) that not only inherits all the benefit of RSIP but also provides both end-to-end transparent-access capabilities and cascade private network connectivity. The MRSIP framework we propose includes the concept of cascade private network architecture, inter-private network accessing capabilities, and tunnel optimization. In addition, we provide a mechanism to avoid the private address collision problem.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125512085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient connection scheme for mobile IP 一个高效的移动IP连接方案
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001. Pub Date : 2001-10-10 DOI: 10.1109/ICON.2001.962374
Hye-young Kim, C. Hwang
{"title":"An efficient connection scheme for mobile IP","authors":"Hye-young Kim, C. Hwang","doi":"10.1109/ICON.2001.962374","DOIUrl":"https://doi.org/10.1109/ICON.2001.962374","url":null,"abstract":"Computer users in this varied and rapidly changing world does not stay in one place, and the correspondence among computers through the Internet has increased due to the quick development of Web based applications. But the Internet TCP/IP communication protocol was not designed to cover a mobile host, so the IP protocol should detect a mobile host that independently moves and have a moving management system to transmit the data. That is, the mobile IP protocol, must provide the mobile host with the continuous connection to the Internet. The mobile IP proposed by the IETF is efficient, but if the mobile host moves frequently and communicates with others in a specific zone, it may be inefficient. This is because there would be a delay in registering the mobile hosts and in setting up a secure tunnel in the Internet environment, and also in transmitting the data. These inefficiencies were maximized by the mobile host that has an incessant mobility. When the mobile host registered itself with the home agent, the registration cost can be reduced by using boarder router to manage the mobility within a specific zone. It enables the mobile host to detect quickly by placing an anchor FA that uses the anchor chain scheme, which is a combined pointer forwarding and caching method. Therefore, to solve the inefficiencies of the mobile IP, we suggest the border router and anchor FA to manage the mobility in the specific zone and to efficiently detect the mobile host.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127242425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of mobile IP and SLM 移动IP和SLM的性能分析
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001. Pub Date : 2001-10-10 DOI: 10.1109/ICON.2001.962391
R. Hsieh, A. Seneviratne
{"title":"Performance analysis of mobile IP and SLM","authors":"R. Hsieh, A. Seneviratne","doi":"10.1109/ICON.2001.962391","DOIUrl":"https://doi.org/10.1109/ICON.2001.962391","url":null,"abstract":"We present a performance analysis of two architectures for Internet host mobility management, namely, mobile IP and session layer mobility management (SLM). The mobile IP architecture is designed with the principle that the fixed Internet hosts should remain unmodified while only the underlying IP routing infrastructure should change. By contrast, SLM requires no changes to the existing IP infrastructure as well as the transport protocols but only modifications to the session layer protocols and the applications at the end hosts. We compare the performance advantages of the end-to-end mobility scheme with the network-layer mobility, scheme, and prove by experiments that the end-to-end scheme, i.e. SLM, is a better solution for host mobility in many situations.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114888486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving the Timed Token Protocol 改进定时令牌协议
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001. Pub Date : 2001-07-09 DOI: 10.1007/3-540-47728-4_51
Y. Bouzida, Rachid Beghdad
{"title":"Improving the Timed Token Protocol","authors":"Y. Bouzida, Rachid Beghdad","doi":"10.1007/3-540-47728-4_51","DOIUrl":"https://doi.org/10.1007/3-540-47728-4_51","url":null,"abstract":"","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121391264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Server based QoS routing with implicit network state updates 具有隐式网络状态更新的基于服务器的QoS路由
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001. Pub Date : 1900-01-01 DOI: 10.1109/ICON.2001.962394
Sungha Kim, Meejeong Lee
{"title":"Server based QoS routing with implicit network state updates","authors":"Sungha Kim, Meejeong Lee","doi":"10.1109/ICON.2001.962394","DOIUrl":"https://doi.org/10.1109/ICON.2001.962394","url":null,"abstract":"We propose centralized server based QoS routing schemes, where a route server is responsible for determining QoS paths on behalf of all the routers in the routing domain. In the proposed server based schemes, the dynamic link QoS state information, which is required for a QoS path computation, is implicitly maintained at the route server as it assigns or retrieves QoS paths. By maintaining the network state information this way, we may not only eliminate the overhead in exchanging network state update messages but also achieve higher routing performance. We discuss techniques for reducing the amount of processing overhead at the route server, and evaluate the performance of the proposed schemes using simulation. The simulation results show that the proposed server based QoS routing schemes may improve the routing performance compared to the distributed QoS routing schemes proposed in the literature, and the proposed processing reduction methods may significantly reduce the processing cost at the route server.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133259916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Domain based approach for QoS provisioning over Mobile IP 基于域的移动IP服务质量提供方法
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001. Pub Date : 1900-01-01 DOI: 10.1109/ICON.2001.962393
Ki-Il Kim, Sang-Ha Kim
{"title":"Domain based approach for QoS provisioning over Mobile IP","authors":"Ki-Il Kim, Sang-Ha Kim","doi":"10.1109/ICON.2001.962393","DOIUrl":"https://doi.org/10.1109/ICON.2001.962393","url":null,"abstract":"Mobile IP (MIP) ensures packet routing to the mobile host when its attachment is changed on Internet. MIP defines two functional entities - HA (home agent) and FA (foreign agent) - to pursue the location of mobile host and tunneling to deliver packets that are destined to the mobile node's home address. But, this tunneling has difficulties in adapting Internet service architecture - Integrated Service and Differentiated Service. Since both identify the service session as destination IP address, IP protocol number and destination port, a new different service session must be defined over the IP tunnel. For that reason, how to guarantee the QoS over IP tunnel and interoperate with end-to-end service session are key features for MIP QoS. Since MIP QoS is mostly dependent on host mobility supporting protocol, we believe that the host mobility supporting protocol must be regarded as important factor. The current host mobility supporting protocol has hierarchical architecture as micro mobility and macro mobility. So, if the MIP QoS could be viewed as the same hierarchical architecture, the better QoS guarantee might be possible. This paper specifies a hierarchical scheme, which uses not only aggregate RSVP between domain level agents, but also applies specific local policy between domain level agent and mobile host in a domain.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125543029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信