2012 18th IEEE International Conference on Networks (ICON)最新文献

筛选
英文 中文
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment 在云间环境中使用动态VPN提供安全通信
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506596
Ali Sajjad, A. Zisman, M. Rajarajan, S. Nair, T. Dimitrakos
{"title":"Secure communication using dynamic VPN provisioning in an Inter-Cloud environment","authors":"Ali Sajjad, A. Zisman, M. Rajarajan, S. Nair, T. Dimitrakos","doi":"10.1109/ICON.2012.6506596","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506596","url":null,"abstract":"Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services. Nevertheless, a single cloud does not have limitless resources to offer to its users, hence the notion of an Inter-Cloud enviroment where a cloud can use the infrastructure resources of other clouds. However, there is no common framework in existence that allows the service owners to seamlessly provision even some basic services across multiple cloud service providers, albeit not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud platforms are built. In this paper we present a novel solution which aims to cover a gap in a subsection of this problem domain. Our solution offers a security architecture that enables service owners to provision a dynamic and service-oriented secure virtual private network on top of multiple cloud IaaS providers. It does this by leveraging the scalability, robustness and flexibility of peer-to-peer overlay techniques to eliminate the manual configuration, key management and peer churn problems encountered in setting up the secure communication channels dynamically, between different components of a typical service that is deployed on multiple clouds. We present the implementation details of our solution as well as experimental results carried out on two commercial clouds.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey on routing protocols in Wireless Sensor Networks 无线传感器网络路由协议研究进展
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506539
M. Patil, R. Biradar
{"title":"A survey on routing protocols in Wireless Sensor Networks","authors":"M. Patil, R. Biradar","doi":"10.1109/ICON.2012.6506539","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506539","url":null,"abstract":"This paper presents a survey of state-of-the-art routing techniques in Wireless Sensor Networks (WSNs). Compared with traditional wireless networks, WSNs are characterized with denser levels of node deployment, higher unreliability of sensor nodes and severe power, computation and memory constraints. Various design challenges such as energy efficiency, data delivery models, quality of service, overheads etc., for routing protocols in WSNs are highlighted. We addressed most of the proposed routing methods along with scheme designs, benefits and result analysis wherever possible. The routing protocols discussed are classified into seven categories such as Data centric routing, Hierarchical routing, Location based routing, Negotiation based routing, Multipath based routing, Quality of Service (QoS) routing and Mobility based routing. This paper also compares the routing protocols against parameters such as power consumption, scalability, mobility, optimal routing and data aggregation. The paper concludes with possible open research issues in WSNs.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"46 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134323972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2066
A physical layer implementation of IEEE 802.22 prototype IEEE 802.22原型的物理层实现
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506574
K. Toh, M. Takekawa, K. Hasegawa, Kei Yanagisawa, Seishi Sasaki, Masahiro Asano
{"title":"A physical layer implementation of IEEE 802.22 prototype","authors":"K. Toh, M. Takekawa, K. Hasegawa, Kei Yanagisawa, Seishi Sasaki, Masahiro Asano","doi":"10.1109/ICON.2012.6506574","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506574","url":null,"abstract":"In this paper, we present a recently developed physical layer implementation of IEEE 802.22 prototype. The prototype includes the following components: a channel (CH) unit, a Medium Access Control Layer (MAC) Control unit, a Global Positioning System (GPS) unit and a Radio Frequency (RF) control unit. The prototype is developed in a flexible and scalable platform to enable future enhancement for higher data rate application. In order to achieve higher data rate, the prototype is designed to accommodate multiple channel units for multiple channel access capability. A channel unit consists of a MAC Layer unit, a Physical Layer (PHY) unit and a Transceiver (TRX) unit. In this paper, we will concentrate our discussion on the physical layer implementation of IEEE 802.22 prototype and show the Bit Error Rate (BER) performances of the implemented physical layer of IEEE 802.22 prototype.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133827026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Migration cost aware virtual network re-embedding in presence of resource failures 在资源失效的情况下,迁移成本感知的虚拟网络重新嵌入
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506528
Xiaolin Chang, J. Muppala, Bin Wang, Jiqiang Liu, Longmei Sun
{"title":"Migration cost aware virtual network re-embedding in presence of resource failures","authors":"Xiaolin Chang, J. Muppala, Bin Wang, Jiqiang Liu, Longmei Sun","doi":"10.1109/ICON.2012.6506528","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506528","url":null,"abstract":"The virtual network embedding (VNE) problem deals with the embedding of virtual network (VN) requests in an underlying physical infrastructure (substrate network). Re-embedding of an already embedded VN may be precipitated due to failure of physical resources (nodes and/or links) in the substrate network. Our endeavor in this paper is to design a VN re-embedding algorithm to address these dynamics. Our algorithm, named OVER, minimizes the virtual node-migration cost during the active VN re-embedding process while trying to increase the long-term revenue of the infrastructure providers. We demonstrate the effectiveness of our approach through extensive simulations.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"004 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130600785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the connectivity of wireless networks with multiple directional antennas 多方向天线无线网络的连通性研究
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506551
Huiwen Xu, Hongning Dai, Qinglin Zhao
{"title":"On the connectivity of wireless networks with multiple directional antennas","authors":"Huiwen Xu, Hongning Dai, Qinglin Zhao","doi":"10.1109/ICON.2012.6506551","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506551","url":null,"abstract":"The network connectivity is one of important measures of the performance of wireless networks. However, most of current studies on the network connectivity only consider either an SOMN network, where each node is mounted with a single omni-directional antenna, or an SDA network, where each node is mounted with a single directional antenna. Using multiple directional antennas instead of a single directional antenna can potentially improve the network performance. In this paper, we investigate the connectivity of a novel network, in terms of an MDA network, where each node is mounted with multiple directional antennas. We found that MDA networks have much stronger network connectivity than other existing networks (such as SOMN and SDA networks), and its connectivity degree heavily depends on the number of antennas, the beamwidth of each antenna and the path loss factor. The enhancement mainly owes to the usage of multiple antennas and the longer transmission range of directional antennas.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133580398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Empirical analysis and comparison of IPv4-IPv6 traffic: A case study on the campus network IPv4-IPv6流量的实证分析与比较——以校园网为例
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506590
Qiang Li, Tao Qin, X. Guan, Q. Zheng
{"title":"Empirical analysis and comparison of IPv4-IPv6 traffic: A case study on the campus network","authors":"Qiang Li, Tao Qin, X. Guan, Q. Zheng","doi":"10.1109/ICON.2012.6506590","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506590","url":null,"abstract":"With the exhaustion of global IPv4 address, IPv6 technologies have attracted increasing attention and have been deployed widely. Meanwhile, new applications running over IPv6 networks will change the traditional traffic characteristics of IPv4 networks. In this paper, we present a measurement study on the traffic features and behaviors of the users over IPv4 and IPv6 in the campus network of XJTU. We shall investigate the differences between IPv4 and IPv6 traffic features in terms of the distribution of the average packet size, flow size, flow duration, and self-similarity of the packet size and traffic volume. As to the user's behaviors, we employ the connection degree to capture the behavior characteristics and Renyi entropy to measure behavior dynamics. The experimental results based on the traffic traces collected from the Northwest Regional Center of CERNET (China Education and Research Network) indicate that there exists distinct differences between IPv4 and IPv6 traffic due to the newly-emerged applications. The analysis results provide strategic guidance for traffic management and exhibit great potential in abnormal behavior detection in next generation network.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114416958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A blind power differentiation scheme for energy detection-based spectrum sensing 一种基于能量检测的频谱感知盲功率分异方案
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506577
Bingxuan Zhao, S. Sasaki
{"title":"A blind power differentiation scheme for energy detection-based spectrum sensing","authors":"Bingxuan Zhao, S. Sasaki","doi":"10.1109/ICON.2012.6506577","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506577","url":null,"abstract":"The performance of energy detection-based spectrum sensing is greatly compromised by the problem of noise uncertainty consisting of device noise uncertainty and environmental interference uncertainty. This paper first compares these two kinds of uncertainties and comes to the conclusion that the environmental interference dominates the noise uncertainty problem. Aiming at alleviating the environmental interference, this paper proposed a power differentiation scheme to differentiate the target primary signal from the environmental interference produced by the simultaneously transmitted secondary signals and the device noise. The differentiated target primary signal power, rather than the total received composited power used in most conventional schemes, is used to construct the test statics for the energy detection to improve the sensing performance. The proposed power differentiation scheme does not require any prior knowledge of the primary signal except the geolocations of the primary transmitters and secondary users, thus, is a noncoherent scheme. Simulation results show that the proposed scheme can effectively cope with the environmental interference and can greatly improve the performance of energy detection-based spectrum sensing.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123940880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An analytical model of A-MSDU scheme with enhanced Block ACK for IEEE 802.11n networks IEEE 802.11n网络中增强Block ACK的A-MSDU方案的分析模型
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506572
Teuku Yuliar Arif, R. F. Sari
{"title":"An analytical model of A-MSDU scheme with enhanced Block ACK for IEEE 802.11n networks","authors":"Teuku Yuliar Arif, R. F. Sari","doi":"10.1109/ICON.2012.6506572","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506572","url":null,"abstract":"Wireless Local Area Network (WLAN) has experienced substantial development both from its usage and its technological advances. The development of WLAN technology is marked by the emergence of IEEE 802.11 standard family which are b, a, g, and n. The newest IEEE 802.11n standard is aimed at improving throughput especially in MAC layer by using frame aggregate mechanism utilizing the A-MSDU and A-MPDU schemes. On the other hand, the compressed Block ACK scheme, which is an extension of the Basic Block ACK scheme in IEEE 802.11e standard, was introduced. In this paper, we propose an analytical model to investigate the throughput performance which is produced by using A-MSDU scheme and Block ACK scheme. The throughput produced by the analytical model is then compared to the throughput produced by the A-MSDU and Block ACK scheme from the NS-3 network simulator. The mathematical simulation and NS-3 simulation results show the same outcome that demonstrates the accuracy of our proposed analytical model. The simulation result has also shown that the usage of A-MSDU and Block ACK scheme simultaneously can increase the throughput in MAC layer of IEEE 802.11n.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132578161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A generic SLA negotiation protocol for Virtualized Environments 用于虚拟化环境的通用SLA协商协议
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506525
R. Gomes, L. Bittencourt, E. Madeira
{"title":"A generic SLA negotiation protocol for Virtualized Environments","authors":"R. Gomes, L. Bittencourt, E. Madeira","doi":"10.1109/ICON.2012.6506525","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506525","url":null,"abstract":"Many companies use the Internet as a basis for their services, defining Service Level Agreements (SLA) with their respective Internet Service Providers. However, the current Internet works in a Best Effort manner, what points toward the concept of network virtualization to support the Future Internet. Within this context, this work proposes a generic SLA negotiation protocol for Virtualized Environments (VEs). The proposed protocol allows the client to negotiate resources (for example, the bandwidth for the virtual network or the storage capacity of the cloud) and features (for example, protocol stack of the virtual network or operating system in the cloud) used in the VE. Experiments showed the effectiveness of the proposed protocol in fulfilling the requirements defined by the client.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131171317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance optimization based on non-additive measurement under heterogeneous network 异构网络下基于非加性测量的性能优化
2012 18th IEEE International Conference on Networks (ICON) Pub Date : 2012-12-01 DOI: 10.1109/ICON.2012.6506546
Q. Tan, Yanni Han, Hui Tang, S. Ci
{"title":"Performance optimization based on non-additive measurement under heterogeneous network","authors":"Q. Tan, Yanni Han, Hui Tang, S. Ci","doi":"10.1109/ICON.2012.6506546","DOIUrl":"https://doi.org/10.1109/ICON.2012.6506546","url":null,"abstract":"By integrating different radio technologies, the heterogeneous wireless network is excepted to support end-to-end QoS and provide the “best” user experience. However these integrated networks have different access technologies and complex designed parameters. Current researches on the uncertain relationship among those parameters in such a dynamic and complicated system made it difficult to optimize the global network performance. As their inter-dependencies of each parameter may have a nonlinear relationship on the system performance metric of interest. This paper proposes a novel approach to analyze the global optimization problem in a heterogeneous network. We adopt a non-additive model based on Choquet integral to deal with the observed data in order to determine the network parameters' significance. By adjusting the most significant parameter, we can optimize network transfer performance. A simulation platform, which is deployed two applications such as voice and video conferencing, has been developed using OPNET to support our approach. Experimental evaluation shows that the proposed method's feasibility and effectiveness.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125328917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信