Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.最新文献

筛选
英文 中文
Dibbler - a portable dynamic host configuration protocol for IPv6 implementation 一个可移植的动态主机配置协议,用于IPv6的实现
T. Mrugalski
{"title":"Dibbler - a portable dynamic host configuration protocol for IPv6 implementation","authors":"T. Mrugalski","doi":"10.1109/CONTEL.2005.185821","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185821","url":null,"abstract":"+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+ -... | . . . . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to integration of network design and simulation tools 一种网络设计与仿真工具集成的方法
Md Azizur Rahman, A. Pakstas, Frank Wang
{"title":"An approach to integration of network design and simulation tools","authors":"Md Azizur Rahman, A. Pakstas, Frank Wang","doi":"10.1109/CONTEL.2005.185845","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185845","url":null,"abstract":"There are available commercial and education network analysis, design, simulation and discovery tools in the market. They help the users/designers in many aspect but different tools are developed for different purposes. Thus, very often such tools are addressing different issues in the network design process, which are complementary to each other. Therefore, these tools can be used in a manner of complementing to each other to cover all aspects of user requirement and because of that there is a genuine need to integrate such tools. This paper is dedicated to the problem of integrating such independently developed network planning, network design and network simulation tools. It is looking at the problem of network meta description language as well as at principles of defining such language using current experience of various tools. Examples of the meta language definitions are shown as well as principles of building a software for conversion between different network models are illustrated.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132222323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Reducing dependency on network reliability and availability by encapsulating the negotiation functionalities in ACL messages 通过将协商功能封装在ACL消息中,减少对网络可靠性和可用性的依赖
M. Bagić, M. Kunstic
{"title":"Reducing dependency on network reliability and availability by encapsulating the negotiation functionalities in ACL messages","authors":"M. Bagić, M. Kunstic","doi":"10.1109/CONTEL.2005.185972","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185972","url":null,"abstract":"Network management of multi-agent system could be provided by FIPA agents communicating via ACL (Agent Communicating Language) messages. Such agents can significantly enhance the possibility of dynamic network negotiation and optimization, i.e. reduce dependency on network availability and reliability, encapsulating these functionalities in ACL messages. Here we offer formal specification of such agents using Coloured Petri Nets (CPN) in order to support their validation and verification. We model inter-agent communication via ACL messages specified by Petri colours. We also give an insight into a correlation between informal (AUML Sequnce Diagram) and formal (CPN Tools Diagram) modelling techniques with suggestion on their merging.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134187951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SafeSMS - end-to-end encryption for SMS SafeSMS -端到端SMS加密
M. Hassinen
{"title":"SafeSMS - end-to-end encryption for SMS","authors":"M. Hassinen","doi":"10.1109/CONTEL.2005.185905","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185905","url":null,"abstract":"Our main contribution is confidentiality, integrity and authentication in SMS (Short Message Services). We will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware. Also, we will show how to authenticate the sender of a message and how to ensure that the message has not been tampered with. Programming language Java is used for the realization of our goals. This paper describes the application solution, while details for the encryption methods are described in the referenced articles.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132284015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A single sign-on framework for web-services-based distributed applications 用于基于web服务的分布式应用程序的单点登录框架
M. Hillenbrand, J. Gøtze, J. Muller, P. Muller
{"title":"A single sign-on framework for web-services-based distributed applications","authors":"M. Hillenbrand, J. Gøtze, J. Muller, P. Muller","doi":"10.1109/CONTEL.2005.185871","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185871","url":null,"abstract":"The basic specifications of Web services com- pletely ignore the need for secure services that are based on a solid authentication and authorization infrastructure. An enhancement of the basic specifications is in progress, but takes time to complete. A large-scale application built today is still in need of an authentication and authorization infrastructure to offer its services to the customers of the service provider and only to the customers. In the following such an infrastructure is described that is able to empower Web services to properly handle authentication and authorization. This infrastructure is designed as services that can be used by any Web service needing authentication and authorization.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Exploiting multihoming for low latency handoff in heterogeneous networks 利用多宿主实现异构网络中的低延迟切换
V.S. Kaulgud, S.A. Mondal
{"title":"Exploiting multihoming for low latency handoff in heterogeneous networks","authors":"V.S. Kaulgud, S.A. Mondal","doi":"10.1109/CONTEL.2005.185816","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185816","url":null,"abstract":"Low latency handoff is critical for supporting delay sensitive applications on a mobile device. Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, we explore how this \"multihoming\" feature effectively reduces handoff latency and corresponding packet loss. We present a number of strategies for link layer handoff. In the proposed scheme, link-layer association procedures and MIP handoff operations are performed proactively to reduce the handoff delay. The paper presents an analysis of the scheme and experimental results based on simulation using ns-2. The results substantiate the efficacy of the scheme in reducing the handoff delay significantly. Keywords—low latency handoff, multihoming, seamless mobility.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115513945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Scalable tree aggregation for multicast 可扩展的多播树聚合
A. Guitton, J. Moulierac
{"title":"Scalable tree aggregation for multicast","authors":"A. Guitton, J. Moulierac","doi":"10.1109/CONTEL.2005.185834","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185834","url":null,"abstract":"IP multicast is not widely deployed yet over Internet. This is mainly due to the forwarding entries scalability and control explosion problems. In this paper, we propose an algorithm called STA (Scalable Tree Aggregation) which reduces the number of trees by allowing several groups to be aggregated to the same tree: the less trees, the less forwarding entries and the less control messages to maintain trees. STA performs faster aggregations than previous aggregation algorithms by evaluating fewer trees for each group, while keeping the same performance. We show the scalability and the fastness of STA by extensive simulations and we compare its performance to the previous algorithm.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Hardware-based network management framework for monitoring and testing of system-on-chips 用于监控和测试片上系统的基于硬件的网络管理框架
O. Laouamri, C. Aktouf
{"title":"Hardware-based network management framework for monitoring and testing of system-on-chips","authors":"O. Laouamri, C. Aktouf","doi":"10.1109/CONTEL.2005.185837","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185837","url":null,"abstract":"This paper describes a way of monitoring and testing embedded cores within a System On a Chip (SoC) through classical network management protocols. All embedded cores can be tested and monitored through the hardware-based SNMP (Simple Network Management Protocol) proxy agent implemented within an SoC. The basic idea of this work is to extrapolate the advantages of network management functions (monitoring, control, test…) to the chip level. The proposed approach is described and its efficiency is illustrated through extensive experimentations.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124106538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of ML carrier estimation schemes based on APSSB and preamble for OFDMA in fading channel 衰落信道中基于APSSB和preamble的OFDMA ML载波估计方案的比较
W. Xie, Shuang Li, Jianhua Zhang, Ping Zhang
{"title":"Comparison of ML carrier estimation schemes based on APSSB and preamble for OFDMA in fading channel","authors":"W. Xie, Shuang Li, Jianhua Zhang, Ping Zhang","doi":"10.1109/CONTEL.2005.185849","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185849","url":null,"abstract":"The paper proposes a novel estimation scheme of carrier frequency offset (CFO) based on Added Preamble Sequence Semi-Blind (APSSB) scheme. The proposed maximum-likelihood (ML) CFO estimator is based on APSSB OFDMA model in which Gold sequence is added to the output of IFFT modulator and exploited for CFO estimation at the receiver. CFO estimators based on APSSB scheme and preamble are compared by both SINR analysis and simulation. We propose that the APPSB scheme should be employed for fine frequency synchronization in OFDMA especially in delay-insensitive service. In this paper, we propose the APSSB OFDMA model in which APSSB sequence is added to the output of IFFT modulator. The APSSB sequence is exploited for CFO estimation by correlation detection with the local APSSB sequence at the receiver. Comparison of SINR is made between CFO estimation schemes based on APSSB and preamble. The APSSB scheme suffers no data rate loss, and is more accurate than preamble scheme when APSSB symbol number for CFO estimation is large enough to excess the threshold. Compared with preamble scheme, the APPSB scheme has the property of better accuracy as well as larger delay. We propose the APPSB scheme should be employed for fine frequency synchronization in delay-insensitive service. The rest sections of the paper are organized as follows. In Section 2, the proposed APSSB OFDMA system model is described. Based on this model, section 3 presents the ML CFO estimation scheme based on APSSB. A comparison is made in section 4 in terms of SINR of the two schemes in fading channel. Simulation and analysis are presented in section 5. Finally, section 6 concludes the paper.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"407 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120882307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPv6 security: improvements and implementation aspects IPv6安全:改进和实现方面
D. Zagar, S. Vidaković
{"title":"IPv6 security: improvements and implementation aspects","authors":"D. Zagar, S. Vidaković","doi":"10.1109/CONTEL.2005.185813","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185813","url":null,"abstract":"IPv6 provides many new possibilities and features and also enables significant improvements in confidentiality of information transmitted through the network. Many modifications implemented in IPv6 are expected to directly or indirectly improve security environment for devices connected to both public and private networks. Security features developed for IPv6 are known as IP Security (IPsec). This protocol assures a certain level of security, but does not solve all existing security issues. In this paper methods for network security improvement by implementation of firewalls and intrusion detection systems were analyzed. Furthermore, the methods for ensuring privacy in IPv6 were evaluated and available tools were analyzed. Security tests were done and comments of their results were given. Finally, suggestions about network security improvement and implementation of security mechanisms in IPv6 networks were given.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信