T. Janevski, A. Tudzarov, D. Temkov, P. Stojanovski, G. Stojanov, M. Janevska, D. Kantardziev, M. Pavlovski, T. Bogdanov
{"title":"AAA solution for interworking between mobile networks and wireless LANs","authors":"T. Janevski, A. Tudzarov, D. Temkov, P. Stojanovski, G. Stojanov, M. Janevska, D. Kantardziev, M. Pavlovski, T. Bogdanov","doi":"10.1109/CONTEL.2005.185859","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185859","url":null,"abstract":"In this paper we propose and describe a unified solution for interoperability between mobile cellular network and WLAN. The integration between two networks, cellular and WLAN, is performed on the Authentication, Authorization and Accounting i.e. AAA side. For that purpose we developed WLAN Access Controller and WLAN AAA Gateway, which provide gateway-type access control as well as charging and billing functionalities for the WLAN service, respectively. In the development process of these elements we have considered current development stadium of all needed network entities and protocols. The developed solution provides cost- effective and easy-to-deploy PLMN-WLAN internetworking scenario.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123495301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Borella, G. Cancellieri, E. Frontoni, V. Pallotta
{"title":"A 4-colorable mapping for a class of crosstalkfree permutations in dilated networks for photonic switching","authors":"A. Borella, G. Cancellieri, E. Frontoni, V. Pallotta","doi":"10.1109/CONTEL.2005.185941","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185941","url":null,"abstract":"In order to reduce the impact of crosstalk in optical switching, dilated architectures can be adopted to build interconnection networks. This approach, that avoids the necessity of optical buffers, is considered here for the development of 4-layered switches, based on the Omega topology. In particular, the correlation existing between the crosstalk-free configurations of the switch and the 4- colorability properties of the correspondent permutation graphs is demonstrated. Then, the theorems presented in this paper allow to define a method to identify either such crosstalk-free configurations, or their relative optimal permutations partitions.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic steering and service continuity in GSM-WCDMA seemless networks","authors":"D. Turina, A. Furuskar","doi":"10.1109/CONTEL.2005.185825","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185825","url":null,"abstract":"","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124806376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing web-surveys for software requirements elicitation","authors":"H. Belani, K. Pripužić, K. Kobas","doi":"10.1109/CONTEL.2005.185931","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185931","url":null,"abstract":"This paper presents a practical approach to a survey as one of requirements elicitation techniques. A fundamental goal in requirements engineering is to discover the stakeholders’ real needs. Conducting a good survey enables acquiring the appropriate information from the stakeholders. The paper discusses the means to elicit software requirements through surveys, and ways to improve the given technique. Advantages of electronic surveys (e.g. Websurveys) versus paper-surveys are pointed out. Architecture of Web-survey tool is proposed, taking the related work into the consideration. User-tool interactions are carefully analyzed. Solution for additional security and privacy issues is suggested.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing ip security by integrating quantum key distribution into communication processes","authors":"M. Sfaxi, S. Ghernaouti-Helie, G. Ribordy, O. Gay","doi":"10.1109/CONTEL.2005.185814","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185814","url":null,"abstract":"The applications of quantum cryptography are linked to telecommunication services that require very high level of security. Quantum cryptography could be integrated in various existing concepts and protocols to secure communications. One of the possible use of quantum cryptography is within IPSEC or IPv6. The aim of this paper is to analyse the use of quantum cryptography within IPSEC to secure communications and to present the estimated performances of this solution. In this paper, we introduce basic concepts in quantum cryptography, we propose a solution that integrate quantum key distribution into IPSEC. A performance analysis is done to demonstrate the operational feasibility of this solution 1 .","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124409181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haibo Wen, Xudong Zhu, Ying-Yuan Jiang, Renxiang Yan
{"title":"The deployment of IPv6 stateless auto-configuration in access network","authors":"Haibo Wen, Xudong Zhu, Ying-Yuan Jiang, Renxiang Yan","doi":"10.1109/CONTEL.2005.185811","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185811","url":null,"abstract":"IPv6, the successor of IPv4, has gotten a lot of investigation from the academic and research community as well as the manufacturers. Since it is coming near to commercialization, the deployment of IPv6 is becoming more and more urgent. One of the most appealing features in IPv6, stateless auto-configuration mechanism, can make the IPv6 terminal true \"plug & play\" and also provide convenience for node's mobility. However, this mechanism is originally designed for open friendly computer network environments, it cannot be directly applied in telecommunication access networks. This paper investigates how to deploy of IPv6 stateless auto-configuration in access network. Firstly, the architecture of the future IPv6 access network is described, and the potential problems are identified. Then, stateless auto-configurations in different network models are carefully investigated, including proposing some effective solutions to deploying IPv6 stateless auto-configuration mechanism in them. In addition, the issues related to the stateless auto-configuration mechanism (e.g., network service selection & authentication and multiple prefixes selection in ISP/multi-homing environments) are also discussed. I. INTRODUCTION With the rapid development of Internet, the network architecture is required to evolve to support the fast growing numbers of users, applications, and services. IPv6, which is designed to meet these requirements, provides such a vast number of available addresses that nearly every electrical device/terminal in the world could be connected","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116883538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diagnosis of QoS degradation in multi-standard radio networks","authors":"A. Gonguet, G. Delègue, S. Betgé-Brezetz","doi":"10.1109/CONTEL.2005.185854","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185854","url":null,"abstract":"","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133154283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of space-frequency coded COFDM in narrowband interference","authors":"C. Esli, H. Deliç","doi":"10.1109/CONTEL.2005.185848","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185848","url":null,"abstract":"Channel coded orthogonal frequency-division multiplexing (COFDM) is considered under narrowband interference (NBI). Analytical expressions for the bit error probability (BEP) are derived for COFDM with and without space-frequency coding (SFC) in a frequency-selective fading environment. It is shown that SFC increases the resistance of COFDM against NBI and reduces the BEP considerably. Specific attention is paid to Digital Television Terrestrial Broadcasting (DTTB), and the associated coding gains are discussed. I. INTRODUCTION","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121251933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering network simulation: graph partitioning approach","authors":"Z. Puljiz, M. Mikuc","doi":"10.1109/CONTEL.2005.185844","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185844","url":null,"abstract":"Scalability is one of the main challenges faced by every network simulator. Various techniques can be applied in order to improve scalability. The most common include increasing simulation speed or reducing the level of detail as a trade-off to network reality. Clustering the simulated network by applying graph partitioning algorithms is an alternative approach and also the main topic of this paper. The idea is to distribute the network simulation over the existing topology. We consider two graph partitioning algorithms available in literature. The algorithms were implemented and tested on randomly generated networks in order to compare their performances. Our motivation for research in this area is driven by the need for efficient techniques which could improve the simulation capabilities and increase the scalability of IMUNES. IMUNES is a network simulator which has been developed at the University of Zagreb, FER.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121430103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Goudarzi, H. Saidi, F. Sheikholeslam, R. Hassanzadeh
{"title":"A high-speed minimum potential delay-fair rate allocation algorithm","authors":"P. Goudarzi, H. Saidi, F. Sheikholeslam, R. Hassanzadeh","doi":"10.1109/CONTEL.2005.185919","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185919","url":null,"abstract":"Fairness is an important aspect of any rate allocation strategy. Many fairness criteria have been proposed by different researchers. Mo and Walrand have introduced the notion of (Ω,α)-fairness in their pioneering work in 2000. Different fairness criteria such as proportional, minimum potential delay and max-min fairness are derived as special cases of (Ω,α)-fairness. In the current paper, a fast second-order rate allocation algorithm is proposed that can improve the convergence speed of conventional minimum potential delay fair rate allocation algorithm. Under certain (and almost) practical premises about the network topology, an end-to-end implementation of well-known minimum potential delay fair rate allocation algorithm is introduced. The proposed algorithm has been compared with the conventional method and TCP using simulation. The simulation results show that the proposed method outperforms the conventional one in convergence rate.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126807679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}