{"title":"Photonic technologies for new generation network","authors":"N. Wada, S. Shinada, H. Furukawa","doi":"10.1109/ICTON.2011.5970768","DOIUrl":"https://doi.org/10.1109/ICTON.2011.5970768","url":null,"abstract":"In this paper, we show the recent progress of photonic technologies for new generation network. Modulation format free optical packet switching node, ultra-wide band optical switching technologies, polarization independent optical switch, burst-mode Tx. and Rx., bust mode EDFA, and other rerated key technologies are represented.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131376220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote DHCPv6 autoconfiguration for mobile IPv6 nodes","authors":"T. Mrugalski, J. Wozniak, K. Nowicki","doi":"10.1109/NETWKS.2010.5624915","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624915","url":null,"abstract":"During interdomain handover, IPv6 node requires a new address at its new location. Once the L2 handover procedure is completed, the mobile node (MN) starts its IPv6 configuration process, using stateless (router advertisements) or stateful (DHCPv6) mode. When so-called care-of address (CoA) is assigned, its uniqueness has to be verified, using Duplicate Address Detection (DAD) procedure. Depending on a network type, this procedure may even take more than 1000ms. The obtained CoA can be used only when configuration and DAD procedures are completed for informing corresponding nodes about new MN location. Such significant delay introduces unacceptable gaps in communication capability. This paper proposes a new mechanism that enables obtaining IPv6 address and other configuration options in advance, before actual handover is performed. MN contacts its destination location and obtains its new parameters, while still maintaining connectivity at old location. Such a priori knowledge about target location configuration may be exploited to speed up configuration process itself, but also to initiate Mobile IPv6 operations earlier, thus further shortening delays. Mechanism itself and its verification techniques are discussed. Results of extensive simulations, statistical analysis as well as areas of further study conclude this paper.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126368138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A note on joint optimal transmission range assignment and sensor deployment for Wireless Sensor Networks","authors":"A. Gogu, D. Nace, Y. Challal","doi":"10.1109/NETWKS.2010.5624940","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624940","url":null,"abstract":"A major challenge affecting the lifetime of Wireless Sensor Networks (WSN) is energy. This study focuses on the deployment schemes that achieve energy minimization in WSN through appropriate transmission range assignment. We examine two simplified deployment schemes. First, when the sensor nodes have to be placed in a linear network, and next when they have to be placed in a multihop tree network. We present a dynamic programming based method for computing optimal deployment in both cases. Finally, relied on the above results we propose a clustering strategy for energy efficient traffic transmission.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of path-segment-protecting p-cycles in survivable WDM mesh networks","authors":"B. Jaumard, Honghui Li, S. Sebbah","doi":"10.1109/NETWKS.2010.5624936","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624936","url":null,"abstract":"Survivability is an essential feature in the design of WDM mesh networks for continuous service delivery in the case of failures. Segment p-cycles (also known as flow p-cycles) offer an interesting protection approach with a good trade-off between protection capacity cost and recovery speed.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124122488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A theoretical signaling game model for intrusion detection in wireless sensor networks","authors":"M. Estiri, A. Khademzadeh","doi":"10.1109/NETWKS.2010.5624961","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624961","url":null,"abstract":"In this paper, we address a method for an intrusion detection system (IDS) in wireless sensor networks (WSNs). The type of the attack that we address in this paper focuses on dropping packets attacks (DPA) in WSNs and we focus on the design of security enforcement mechanisms for preventing attacks as well. we present a signaling game-theoretic model to analyze intrusion detection in wireless sensor networks. We use a signaling game to model the interactions among nodes of a wireless sensor network. We view the interaction between an attacker and an individual node as a Bayesian game with incomplete information, and construct models for such a game. We prove the authenticity of the proposed model by reaching Nash equilibrium. And achieving Nash equilibrium leads to the defense strategy for the WSN.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive recovery method against multiple network failures with overlay networking technique","authors":"Takuro Horie, G. Hasegawa, M. Murata","doi":"10.1109/NETWKS.2010.5624903","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624903","url":null,"abstract":"In this paper, we propose a proactive recovery method against multiple network failures for large-scale packet switching networks. The proposed method exploits the overlay networking technique. Specifically, it constructs multiple logical network topologies from the original overlay network topology by assuming various failure patterns. When a failure is detected, our method selects one topology. Consequently, it can immediately recover from the failure by utilizing the selected topology without waiting for routing convergence in the network. When constructing multiple logical topologies, we take into account the correlation among overlay links in terms of the underlay links, and we merge multiple logical topologies into a single topology to decrease the number of topologies while keeping the recovery efficiency. Through the numerical evaluation results of the network reachability and average path length, we show that our method improves network reachability from 69% to 99% while keeping the path length short, when 5% underlay links are simultaneously down.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125285456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tran Quang Thanh, D. Vingarzan, Y. Rebahi, T. Magedanz
{"title":"A Diameter based testing system in Next Generation Mobile Network","authors":"Tran Quang Thanh, D. Vingarzan, Y. Rebahi, T. Magedanz","doi":"10.1109/NETWKS.2010.5624958","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624958","url":null,"abstract":"Diameter protocol is getting more and more important roles in Next Generation Mobile Network Infrastructure. However, in many cases Diameter interfaces are still under standardization. In this paper, we introduce a flexible Diameter based testing system. The strong point of this system is the capability to keep up with the development of Diameter related standards. It is also friendly, scalable and extensible. This system as well as the OpenEPC testbed are in the series of ongoing research and development activities at Fraunhofer Institute FOKUS, Germany.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131287647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Benoît Badard, V. Diascorn, G. Boulmier, Annie Druault Vicard, Vladimir Renard, Abdel Hedi Dimassi
{"title":"Migration to VoIP over mobile networks: Technical challenges and economic opportunity analysis","authors":"Benoît Badard, V. Diascorn, G. Boulmier, Annie Druault Vicard, Vladimir Renard, Abdel Hedi Dimassi","doi":"10.1109/NETWKS.2010.5624906","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624906","url":null,"abstract":"In 3GPP standard, LTE networks are currently specified by considering Mobile VoIP combined with IMS for session control to ensure voice calls support. So, Mobile VoIP over LTE with IMS can be considered as a target for voice support migration from the current support in Circuit Switched (CS) Domain. Because Mobile VoIP services could potentially be supported over HSPA in the coming years and LTE coverage will probably not correspond to HSPA networks coverage before several years, it is necessary to assess if there is a potential interest and way to anticipate Mobile VoIP services launch with, first, a support over HSPA/HSPA+.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Berg, Arne Chrestin, A. Schieder, Dietmar Springer
{"title":"Assessment of the Next Generation Mobile Network candidate technologies","authors":"Stefan Berg, Arne Chrestin, A. Schieder, Dietmar Springer","doi":"10.1109/NETWKS.2010.5624925","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624925","url":null,"abstract":"This paper provides a comparative overview of the candidates being discussed as successors for current mobile broadband data networking technologies. The comparison is based on typical network operator requirements that are summarized under the term “Next Generation Mobile Networks” (NGMN) and governed by a comprehensive approach to technology evaluation, which is presented in this paper. As the application of the technology evaluation approach in full requires considering a specific use case and business situation, only an exemplary range of aspects is assessed here. The technology evaluation is carried out for the technologies known as WiMAX, LTE and HSPA+. We conclude and motivate that all three technology candidates have their prospective application scenarios, but LTE will dominate the mobile broadband network arena in the long run.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133874171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multicast Routing Algorithm for packet networks with the application of the Lagrange Relaxation","authors":"M. Piechowiak, M. Stasiak, P. Zwierzykowski","doi":"10.1109/NETWKS.2010.5624921","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624921","url":null,"abstract":"The paper presents a proposal of a new multicast routing algorithm for finding a multicast tree in packet-switched networks. The objective of the MLRA (Multicast Routing Algorithm with Lagrange Relaxation) is to minimize the cost of paths between the source and each destination node using Lagrange relaxation, and eventually, minimize the total cost of multicast tree. A wide range of simulation experiments carried out by the authors for many network topologies and parameters confirmed the effectiveness of the proposed algorithm.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115137021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}