2006 8th International Conference Advanced Communication Technology最新文献

筛选
英文 中文
Source-based multiple gateway selection routing protocol in ad-hoc networks 自组网中基于源的多网关选择路由协议
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-12-13 DOI: 10.1007/11943952_10
S. Yoo, ByungSeub Lee
{"title":"Source-based multiple gateway selection routing protocol in ad-hoc networks","authors":"S. Yoo, ByungSeub Lee","doi":"10.1007/11943952_10","DOIUrl":"https://doi.org/10.1007/11943952_10","url":null,"abstract":"","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132120810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lifetime Maximization by Cross-Layer Interaction in Wireless Sensor Networks 无线传感器网络中跨层交互的寿命最大化
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206401
In-Yeup Kong, W. Hwang
{"title":"Lifetime Maximization by Cross-Layer Interaction in Wireless Sensor Networks","authors":"In-Yeup Kong, W. Hwang","doi":"10.1109/ICACT.2006.206401","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206401","url":null,"abstract":"We consider the cross-layer design considering physical layer, MAC layer, and network layer to maximize the lifetime of energy-constrained wireless sensor network. Our solution is based on system model that considers reliability as well as physical layer (i.e., power control), data link layer (i.e., and link scheduling) and network layer (i.e., routing protocol) jointly. To obtain more energy-efficient solution for lifetime maximization of wireless sensor networks, we enhance existing cross-layer model using energy-efficient MAC protocol and energy-consumption model instead of TDMA","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115162636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Periodic medium reservation timer mechanism for VoIP in IEEE 802.11 wireless LAN IEEE 802.11无线局域网中VoIP的周期介质预留定时器机制
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206326
Daeyoung Kim, Koo Ki Jong, Do Young Kim
{"title":"Periodic medium reservation timer mechanism for VoIP in IEEE 802.11 wireless LAN","authors":"Daeyoung Kim, Koo Ki Jong, Do Young Kim","doi":"10.1109/ICACT.2006.206326","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206326","url":null,"abstract":"The IEEE 802.11 wireless LAN is providing convenient mobile service and is gaining popularity for data applications in campus networks. So the IEEE 802.11-compliant wireless LAN equipments become dominant. Also, the voice service through wireless LANs has become an important issue. Quality-of-service (QoS) for voice-over-IP (VoIP) is also an important issue in IP networks. In this paper, we propose new medium access mechanism for VoIP packets to reduce the delay by medium access in IEEE 802.11 or IEEE 802.11e wireless LANs","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The expansion of key infection model for dynamic sensor network 动态传感器网络关键感染模型的扩展
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206018
Young-Sik Hwang, Seung-wan Han, Taekyong Nam
{"title":"The expansion of key infection model for dynamic sensor network","authors":"Young-Sik Hwang, Seung-wan Han, Taekyong Nam","doi":"10.1109/ICACT.2006.206018","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206018","url":null,"abstract":"The establishment of shared cryptography keys is one of the challenging problems in the sensor networks. Key infection (R. Anderson et al., 2004) is a promising model to solve this problem without complex mechanism on the commodity sensor networks. This model, however, does not consider the mobility of sensor, so it can not support dynamic sensor network fields. Therefore, key infection model has to be extended to handle the mobility of sensor, and then an extended key infection model can be used on the dynamic sensor network. In this paper, we propose a scheme to extend the key infection model for supporting dynamic sensor networks and explain how the proposed scheme is operated in detail. Also we prove that the proposed scheme is secure","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125239826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Protection Algorithm against security holes of IPv6 routing header IPv6路由报头安全漏洞防护算法
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206388
Jae-Deok Lim, Youngki Kim
{"title":"Protection Algorithm against security holes of IPv6 routing header","authors":"Jae-Deok Lim, Youngki Kim","doi":"10.1109/ICACT.2006.206388","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206388","url":null,"abstract":"Current Internet is based on IPv4 protocol. However the limitation of IPv4 protocol such as a lack of address can put obstacles to continuous progress of Internet. IPv6 protocol is suggested and developed as an alternative of IPv4 protocol. IPv6 protocol has many features for example the expanded addressing capability, auto-configuration mechanism, simplification of the header format, improved support for extensions and options, extensions for authentication and privacy, flow labeling capability and so on. But many security holes of IPv6 are being reported together with the features as mentioned above. This paper suggests the algorithm to solve the security hole caused by a routing header. Routing header is a kind of extension headers of IPv6 and is used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet's destination. But routing header has the security hole that an attacker can detour the access list of security system, for example firewall, and then he can access the protected internal system by using routing header","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121043039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and implementation of status based application manager for telematics 基于状态的远程信息处理应用管理器的设计与实现
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206225
Minjung Kim, Yeonjune Choi, YoungBag Moon, Sun-joong Kim, O. Kwon
{"title":"Design and implementation of status based application manager for telematics","authors":"Minjung Kim, Yeonjune Choi, YoungBag Moon, Sun-joong Kim, O. Kwon","doi":"10.1109/ICACT.2006.206225","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206225","url":null,"abstract":"The applications for telematics are not any more limited to classical embedded control system but cover a broad range from driver assistance to infortainment and vehicle information management. To manage various kinds of telematics application, we need furthermore new application manager for the automotive domain that allow to support the different software types specifically, corresponding to their vehicle's status and later on integrate the system parts to one reliable and manageable system. This paper is intended to suggest an architecture for applications management in the field of in-vehicle software. This architecture is based on international standards, such as OSGi framework and AMI-C Specification","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An approach for optimal system selection for ISHO in future convergence network 未来收敛网络中ISHO的最优系统选择方法
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206126
Hung Ngoc Le, Q. X. Nguyễn, S. Choi, Yeonseung Shin
{"title":"An approach for optimal system selection for ISHO in future convergence network","authors":"Hung Ngoc Le, Q. X. Nguyễn, S. Choi, Yeonseung Shin","doi":"10.1109/ICACT.2006.206126","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206126","url":null,"abstract":"The vision of ubiquitous service has required an increase in the development of future convergence network (FCN) that supports mobile users with seamless migration among heterogeneous networks while maintaining the QoS. The FCN allows mobile users to access to the services at anytime and from anywhere, use various devices, and move among different radio interfaces by executing inter-system handover (ISHO) function. The ISHO can redirect streams of application communication between heterogeneous overlay networks while maintaining the application with QoS. However, current research in ISHO has mainly focused on handovers activated by user's interruptions when user moves out of current network coverage. ISHO for the FCN should not only meet the above criterion, but also meet the other conditions such as predict interruption, improve QoS, support user preference for communication network. The ISHO procedures are divided into 3 steps; system discovery, system selection and decision, and execution. The paper is mainly concentrated on 1st step and 2nd step, the system discovery, selection and decision, in order to extend ISHO to support all above criteria and therefore allow mobile host to have dynamic network changing capabilities to maintain a continuous network connection while moving among heterogeneous networks. In order to select an optimal system among multitude points of attachment available to the network, there is a need for a more investigation into the resource management and the fuzzy logic applicable to the ISHO","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast handover scheme based on enhanced access point (EAP) for Mobile IPv6 基于增强接入点(EAP)的移动IPv6快速切换方案
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206075
Byungjoo Park, H. Latchman
{"title":"Fast handover scheme based on enhanced access point (EAP) for Mobile IPv6","authors":"Byungjoo Park, H. Latchman","doi":"10.1109/ICACT.2006.206075","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206075","url":null,"abstract":"Mobile IPv6 has been proposed to support host mobility in the Internet, yet during a handover Mobile IPv6 (MIPv6) suffers from packet disruption and packet loss. Furthermore, inherent delays associated with movement detection are unavoidable in standard MIPv6. In this paper, we propose to mitigate such effects with a more efficient fast neighbor discovery routine which requires each access point to execute movement detection using an enhanced beacon signal with stored router advertisement (RA) messages; we also implement a modified access point to handle fast configuration of the care-of address (CoA). Performance analysis indicates the handover latency in the proposed scheme could be reduced compared to standard MIPv6. The proposed scheme is also a strong candidate to support real-time application like VoIP","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125893702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaboration Services to Support Interactions in Disaster Relief Scenarios 支持救灾场景中交互的协作服务
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206192
S. Ochoa, R. Aldunate
{"title":"Collaboration Services to Support Interactions in Disaster Relief Scenarios","authors":"S. Ochoa, R. Aldunate","doi":"10.1109/ICACT.2006.206192","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206192","url":null,"abstract":"Many groupware applications developed on top of platforms supporting collaborative work are limited in their portability and interoperability because they are platform locked. In heterogeneous scenarios, such as disaster relief efforts or police operations, the interoperability of the several systems becomes a critical issue to coordinate the efforts of every operative unit. This paper presents a middleware called DCSL collaboration services layer - that provides a set of standard groupware services for both client and server applications allowing interoperability among heterogeneous groupware systems. The services encapsulate and hide incompatibilities among groupware platforms and thus, they allow developers to build interoperable groupware applications with a minor effort","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126191895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Role of Ethernet over SDH in QoS Switch/Router 以太网over SDH在QoS交换机/路由器中的作用
2006 8th International Conference Advanced Communication Technology Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206137
Hong-ju Kim, S. Myong, H. Hong, Jong Hyun Lee, Jung Sik Kim
{"title":"The Role of Ethernet over SDH in QoS Switch/Router","authors":"Hong-ju Kim, S. Myong, H. Hong, Jong Hyun Lee, Jung Sik Kim","doi":"10.1109/ICACT.2006.206137","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206137","url":null,"abstract":"This paper describes the role of a standards-based Ethernet over SDH architecture that unites SDH, RPR and MPLS for the transport of Ethernet in QoS switch/router (QSR). One of QSR transport solution uses SDH as the physical layer and employs technologies such as GFP, VC and LCAS to enable transparent Ethernet over existing SDH infrastructure. Ethernet traffic can be carried over the RPR-enabled transport infrastructure using MPLS in QSR's EoS line card. In the aspect of the required SDH capacity the significant savings of capital expenditure are obtained from EoS and RPR-enabled overlay solution comparing to Ethernet point-to-point solution. EoS enables a service provider to offer Ethernet services efficiently by using existing SDH resources and to increase the value of existing SDH networks","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125329921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信