2009 First International Conference on Communications and Networking最新文献

筛选
英文 中文
WCDS-induced routing for data-aggregation in wireless sensor networks 无线传感器网络中wcds诱导的数据聚合路由
2009 First International Conference on Communications and Networking Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373558
Nesrine Chakchouk, B. Hamdaoui, M. Frikha
{"title":"WCDS-induced routing for data-aggregation in wireless sensor networks","authors":"Nesrine Chakchouk, B. Hamdaoui, M. Frikha","doi":"10.1109/COMNET.2009.5373558","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373558","url":null,"abstract":"Wireless sensor networks (WSNs) are often deployed in harsh environments with little human control, thereby necessitating self organizing and maintenance mechanisms for medium sharing and data routing. Moreover, since sensor nodes operate on energy-limited batteries, designing energy-efficient routing techniques that extend the network lifetime is of a paramount importance. In this paper, we propose WCDS-DCR, a fully distributed, data-centric, routing technique that makes use of an underlying clustering structure induced by the construction of WCDS (Weakly Connected Dominating Set) to prolong network lifetime. WCDS-DCR aims at extending network lifetime through the use of data aggregation (based on the elimination of redundant data packets) by some particular nodes. It also utilizes both the energy availability information and the distances (in number of hops) from sensors to the sink in order to make hop-by-hop, energy-aware, routing decisions. Simulation results show that our solution is scalable, and outperforms existing schemes in terms of network lifetime.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127047440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
High availability in IMS virtualized network IMS虚拟化网络中的高可用性
2009 First International Conference on Communications and Networking Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373553
M. Fakhfakh, O. Cherkaoui, Imen Limam Bedhiaf, M. Frikha
{"title":"High availability in IMS virtualized network","authors":"M. Fakhfakh, O. Cherkaoui, Imen Limam Bedhiaf, M. Frikha","doi":"10.1109/COMNET.2009.5373553","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373553","url":null,"abstract":"Virtualization, in telecommunication, has been given great interest over the 20 past years. Migrating operating system instances between physical hosts is one of the most important features of this technology. It allows network administrators to resolve serious problem such us hardware failure, lack in server capacity, while facilitates the management and the upgrade of their systems. With the strong use of Internet Protocol Multimedia Subsystem (IMS) by most of third Generation (3G) network operators as a common infrastructure, live migration may be useful to resolve the overload problem that affects Call Session Control Function (CSCF) components. Our objective is to propose a High availability solution in order to avoid performance degradation. Thus, we aim to proof that when introducing the migration technique within the IMS architecture, we resolve the overload problem and guarantee Quality of Service (QoS) for IMS client. Based on previous work on high availability using virtualization, we describe, in this paper, our methodology and implementation of an experimental scenario using live migration. Then, we evaluate the registration and the session setup delays. The use of migration reduces considerably the delays by 40% for registration and by 38% for session setup. So, we obtain acceptable values compared to the thresholds.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Link analysis approach to improve detection of fragmentation attacks in Misuse IDS 链接分析方法改进误用IDS中碎片攻击的检测
2009 First International Conference on Communications and Networking Pub Date : 2009-11-01 DOI: 10.1109/COMNET.2009.5373571
O. Ben Ahmed, Z. Choukair
{"title":"Link analysis approach to improve detection of fragmentation attacks in Misuse IDS","authors":"O. Ben Ahmed, Z. Choukair","doi":"10.1109/COMNET.2009.5373571","DOIUrl":"https://doi.org/10.1109/COMNET.2009.5373571","url":null,"abstract":"Intrusion detection system (IDS) is a security technology that attempts to identify and isolate “Intrusions” against computer systems. The major problem of IDS is the vulnerability to fragment attacks. For this problem we propose a new approach (ARD-FA : Association Rules to Detect Fragment Attack) using data mining techniques of links analyses. We develop this approach and show some improvement in managing the problem.","PeriodicalId":185933,"journal":{"name":"2009 First International Conference on Communications and Networking","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131745998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信