2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)最新文献

筛选
英文 中文
Photonic technologies for new generation network 新一代网络的光子技术
N. Wada, S. Shinada, H. Furukawa
{"title":"Photonic technologies for new generation network","authors":"N. Wada, S. Shinada, H. Furukawa","doi":"10.1109/ICTON.2011.5970768","DOIUrl":"https://doi.org/10.1109/ICTON.2011.5970768","url":null,"abstract":"In this paper, we show the recent progress of photonic technologies for new generation network. Modulation format free optical packet switching node, ultra-wide band optical switching technologies, polarization independent optical switch, burst-mode Tx. and Rx., bust mode EDFA, and other rerated key technologies are represented.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131376220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Remote DHCPv6 autoconfiguration for mobile IPv6 nodes 移动IPv6节点的远程DHCPv6自动配置
T. Mrugalski, J. Wozniak, K. Nowicki
{"title":"Remote DHCPv6 autoconfiguration for mobile IPv6 nodes","authors":"T. Mrugalski, J. Wozniak, K. Nowicki","doi":"10.1109/NETWKS.2010.5624915","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624915","url":null,"abstract":"During interdomain handover, IPv6 node requires a new address at its new location. Once the L2 handover procedure is completed, the mobile node (MN) starts its IPv6 configuration process, using stateless (router advertisements) or stateful (DHCPv6) mode. When so-called care-of address (CoA) is assigned, its uniqueness has to be verified, using Duplicate Address Detection (DAD) procedure. Depending on a network type, this procedure may even take more than 1000ms. The obtained CoA can be used only when configuration and DAD procedures are completed for informing corresponding nodes about new MN location. Such significant delay introduces unacceptable gaps in communication capability. This paper proposes a new mechanism that enables obtaining IPv6 address and other configuration options in advance, before actual handover is performed. MN contacts its destination location and obtains its new parameters, while still maintaining connectivity at old location. Such a priori knowledge about target location configuration may be exploited to speed up configuration process itself, but also to initiate Mobile IPv6 operations earlier, thus further shortening delays. Mechanism itself and its verification techniques are discussed. Results of extensive simulations, statistical analysis as well as areas of further study conclude this paper.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126368138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A note on joint optimal transmission range assignment and sensor deployment for Wireless Sensor Networks 无线传感器网络联合最优传输距离分配与传感器部署研究
A. Gogu, D. Nace, Y. Challal
{"title":"A note on joint optimal transmission range assignment and sensor deployment for Wireless Sensor Networks","authors":"A. Gogu, D. Nace, Y. Challal","doi":"10.1109/NETWKS.2010.5624940","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624940","url":null,"abstract":"A major challenge affecting the lifetime of Wireless Sensor Networks (WSN) is energy. This study focuses on the deployment schemes that achieve energy minimization in WSN through appropriate transmission range assignment. We examine two simplified deployment schemes. First, when the sensor nodes have to be placed in a linear network, and next when they have to be placed in a multihop tree network. We present a dynamic programming based method for computing optimal deployment in both cases. Finally, relied on the above results we propose a clustering strategy for energy efficient traffic transmission.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Design of path-segment-protecting p-cycles in survivable WDM mesh networks 可生存WDM网状网络中路径段保护p环的设计
B. Jaumard, Honghui Li, S. Sebbah
{"title":"Design of path-segment-protecting p-cycles in survivable WDM mesh networks","authors":"B. Jaumard, Honghui Li, S. Sebbah","doi":"10.1109/NETWKS.2010.5624936","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624936","url":null,"abstract":"Survivability is an essential feature in the design of WDM mesh networks for continuous service delivery in the case of failures. Segment p-cycles (also known as flow p-cycles) offer an interesting protection approach with a good trade-off between protection capacity cost and recovery speed.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124122488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A theoretical signaling game model for intrusion detection in wireless sensor networks 无线传感器网络入侵检测的理论信令博弈模型
M. Estiri, A. Khademzadeh
{"title":"A theoretical signaling game model for intrusion detection in wireless sensor networks","authors":"M. Estiri, A. Khademzadeh","doi":"10.1109/NETWKS.2010.5624961","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624961","url":null,"abstract":"In this paper, we address a method for an intrusion detection system (IDS) in wireless sensor networks (WSNs). The type of the attack that we address in this paper focuses on dropping packets attacks (DPA) in WSNs and we focus on the design of security enforcement mechanisms for preventing attacks as well. we present a signaling game-theoretic model to analyze intrusion detection in wireless sensor networks. We use a signaling game to model the interactions among nodes of a wireless sensor network. We view the interaction between an attacker and an individual node as a Bayesian game with incomplete information, and construct models for such a game. We prove the authenticity of the proposed model by reaching Nash equilibrium. And achieving Nash equilibrium leads to the defense strategy for the WSN.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Proactive recovery method against multiple network failures with overlay networking technique 基于覆盖网络技术的多网络故障主动恢复方法
Takuro Horie, G. Hasegawa, M. Murata
{"title":"Proactive recovery method against multiple network failures with overlay networking technique","authors":"Takuro Horie, G. Hasegawa, M. Murata","doi":"10.1109/NETWKS.2010.5624903","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624903","url":null,"abstract":"In this paper, we propose a proactive recovery method against multiple network failures for large-scale packet switching networks. The proposed method exploits the overlay networking technique. Specifically, it constructs multiple logical network topologies from the original overlay network topology by assuming various failure patterns. When a failure is detected, our method selects one topology. Consequently, it can immediately recover from the failure by utilizing the selected topology without waiting for routing convergence in the network. When constructing multiple logical topologies, we take into account the correlation among overlay links in terms of the underlay links, and we merge multiple logical topologies into a single topology to decrease the number of topologies while keeping the recovery efficiency. Through the numerical evaluation results of the network reachability and average path length, we show that our method improves network reachability from 69% to 99% while keeping the path length short, when 5% underlay links are simultaneously down.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125285456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Diameter based testing system in Next Generation Mobile Network 下一代移动网络中基于直径的测试系统
Tran Quang Thanh, D. Vingarzan, Y. Rebahi, T. Magedanz
{"title":"A Diameter based testing system in Next Generation Mobile Network","authors":"Tran Quang Thanh, D. Vingarzan, Y. Rebahi, T. Magedanz","doi":"10.1109/NETWKS.2010.5624958","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624958","url":null,"abstract":"Diameter protocol is getting more and more important roles in Next Generation Mobile Network Infrastructure. However, in many cases Diameter interfaces are still under standardization. In this paper, we introduce a flexible Diameter based testing system. The strong point of this system is the capability to keep up with the development of Diameter related standards. It is also friendly, scalable and extensible. This system as well as the OpenEPC testbed are in the series of ongoing research and development activities at Fraunhofer Institute FOKUS, Germany.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131287647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Migration to VoIP over mobile networks: Technical challenges and economic opportunity analysis 通过移动网络迁移到VoIP:技术挑战和经济机会分析
Benoît Badard, V. Diascorn, G. Boulmier, Annie Druault Vicard, Vladimir Renard, Abdel Hedi Dimassi
{"title":"Migration to VoIP over mobile networks: Technical challenges and economic opportunity analysis","authors":"Benoît Badard, V. Diascorn, G. Boulmier, Annie Druault Vicard, Vladimir Renard, Abdel Hedi Dimassi","doi":"10.1109/NETWKS.2010.5624906","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624906","url":null,"abstract":"In 3GPP standard, LTE networks are currently specified by considering Mobile VoIP combined with IMS for session control to ensure voice calls support. So, Mobile VoIP over LTE with IMS can be considered as a target for voice support migration from the current support in Circuit Switched (CS) Domain. Because Mobile VoIP services could potentially be supported over HSPA in the coming years and LTE coverage will probably not correspond to HSPA networks coverage before several years, it is necessary to assess if there is a potential interest and way to anticipate Mobile VoIP services launch with, first, a support over HSPA/HSPA+.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Assessment of the Next Generation Mobile Network candidate technologies 下一代移动网络候选技术评估
Stefan Berg, Arne Chrestin, A. Schieder, Dietmar Springer
{"title":"Assessment of the Next Generation Mobile Network candidate technologies","authors":"Stefan Berg, Arne Chrestin, A. Schieder, Dietmar Springer","doi":"10.1109/NETWKS.2010.5624925","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624925","url":null,"abstract":"This paper provides a comparative overview of the candidates being discussed as successors for current mobile broadband data networking technologies. The comparison is based on typical network operator requirements that are summarized under the term “Next Generation Mobile Networks” (NGMN) and governed by a comprehensive approach to technology evaluation, which is presented in this paper. As the application of the technology evaluation approach in full requires considering a specific use case and business situation, only an exemplary range of aspects is assessed here. The technology evaluation is carried out for the technologies known as WiMAX, LTE and HSPA+. We conclude and motivate that all three technology candidates have their prospective application scenarios, but LTE will dominate the mobile broadband network arena in the long run.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133874171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multicast Routing Algorithm for packet networks with the application of the Lagrange Relaxation 基于拉格朗日松弛的分组网络组播路由算法
M. Piechowiak, M. Stasiak, P. Zwierzykowski
{"title":"Multicast Routing Algorithm for packet networks with the application of the Lagrange Relaxation","authors":"M. Piechowiak, M. Stasiak, P. Zwierzykowski","doi":"10.1109/NETWKS.2010.5624921","DOIUrl":"https://doi.org/10.1109/NETWKS.2010.5624921","url":null,"abstract":"The paper presents a proposal of a new multicast routing algorithm for finding a multicast tree in packet-switched networks. The objective of the MLRA (Multicast Routing Algorithm with Lagrange Relaxation) is to minimize the cost of paths between the source and each destination node using Lagrange relaxation, and eventually, minimize the total cost of multicast tree. A wide range of simulation experiments carried out by the authors for many network topologies and parameters confirmed the effectiveness of the proposed algorithm.","PeriodicalId":202408,"journal":{"name":"2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115137021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信