Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.最新文献

筛选
英文 中文
Interactive multimedia networking 交互式多媒体网络
M. Baldi
{"title":"Interactive multimedia networking","authors":"M. Baldi","doi":"10.1109/CONTEL.2005.185988","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185988","url":null,"abstract":"Summary form only given. Applications that require real-time interaction among users are gaining importance and widespread use as computer networks become increasingly powerful and ubiquitous. Many such applications impose stringent requirements on the network; among the applications today widely deployed, videoconferencing is the most demanding. In order for the participants in a videoconference call to interact naturally, the end-to-end delay should be below human perception. We identify the components of the end-to-end delay in various configurations with the objective of understanding how delay can be kept below the desired bound. The most common tools for controlling service quality are presented, and the two major frameworks for their deployment within IP networks, i.e., integrated services (IntServ) and differentiated services (DiffServ), outlined. The tutorial studies the implications of the architecture of packet switches on delay bounds. It also analyzes the end-to-end delay components of a videoconferencing system step-by-step, considering two video encoding schemes. Various queuing and scheduling algorithms for asynchronous and synchronous packet networks are analyzed and compared","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128342629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defining architecture and key issues towards WLAN roaming 定义WLAN漫游的体系结构和关键问题
C. Basios
{"title":"Defining architecture and key issues towards WLAN roaming","authors":"C. Basios","doi":"10.1109/CONTEL.2005.185858","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185858","url":null,"abstract":"Low deployment costs and high demand for wireless access have led to rapid deployments of public WLAN hotspot services by many providers, including startups and telecom operators. As the number of different WLAN operators in a certain geographical region is getting higher, interworking problems arising. Operators cannot reach all the potential customers and customers cannot access their services in all WLANs in the area. The solution to all these problems is \"roaming\". In this paper, we discuss the issue of WLAN roaming (between various operators in the same geographical area) focusing on IEEE 802.11b Standard. We present the public WLAN roaming architecture provided by Wi-Fi Alliance and note the main security issues and forecasted revenues coming out of the WLAN roaming. We end up by briefly mentioning the WLAN/Cellular interworking models and their impact on the WLAN roaming 'market'.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Network virtual machine (NetVM): a new architecture for efficient and portable packet processing applications 网络虚拟机(NetVM):一种高效、便携的数据包处理应用程序的新架构
Loris Degioanni, M. Baldi, Diego Buffa, Fulvio Risso, F. Stirano, Gianluca Varenni
{"title":"Network virtual machine (NetVM): a new architecture for efficient and portable packet processing applications","authors":"Loris Degioanni, M. Baldi, Diego Buffa, Fulvio Risso, F. Stirano, Gianluca Varenni","doi":"10.1109/CONTEL.2005.185843","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185843","url":null,"abstract":"A challenge facing network device designers, besides increasing the speed of network gear, is improving its programmability in order to simplify the implementation of new applications (see for example, active networks, content networking, etc). This paper presents our work on designing and implementing a virtual network processor, called NetVM, which has an instruction set optimized for packet processing applications, i.e., for handling network traffic. Similarly to a Java Virtual Machine that virtualizes a CPU, a NetVM virtualizes a network processor. The NetVM is expected to provide a compatibility layer for networking tasks (e.g., packet filtering, packet counting, string matching) performed by various packet processing applications (firewalls, network monitors, intrusion detectors) so that they can be executed on any network device, ranging from expensive routers to small appliances (e.g. smart phones). Moreover, the NetVM will provide efficient mapping of the elementary functionalities used to realize the above mentioned networking tasks upon specific hardware functional units (e.g., ASICs, FPGAs, and network processing elements) included in special purpose hardware systems possibly deployed to implement network devices.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128259707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Blocking probabilities in multiservice networks with unicast and multicast connections 具有单播和组播连接的多业务网络中的阻塞概率
K. Samouylov, N. Yarkina
{"title":"Blocking probabilities in multiservice networks with unicast and multicast connections","authors":"K. Samouylov, N. Yarkina","doi":"10.1109/CONTEL.2005.185920","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185920","url":null,"abstract":"This paper is concerned with blocking probabili- ties in loss networks where both multicast and unicast con- nections are present. Each connection specifies a route and a bandwidth requirement. Multicast connections are point-to- multipont and allow transmission from one source to several receivers, any of which can join the connection at any time. Users that subscribe to the same data stream share one mul- ticast connection so that no additional bandwidth is re- quired. We present a Markov process model of a single net- work link. We also develop a convolution algorithm that finds the blocking probabilities on a single link and a re- duced load approximation for estimating end-to-end block- ing probabilities in a network.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128436852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Enhancement of binding updates for mobile networks with multicast in IPv6 environment IPv6环境下多播移动网络绑定更新的增强
Yen-Wen Chen, Ji-Min Shih
{"title":"Enhancement of binding updates for mobile networks with multicast in IPv6 environment","authors":"Yen-Wen Chen, Ji-Min Shih","doi":"10.1109/CONTEL.2005.185819","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185819","url":null,"abstract":"In order to reduce the routing overhead, IPv6 allows the mobile node to send the binding updates to its correspondent node so that the correspondent node can send packets to the mobile node directly (also named as the route optimization). Thus, the binding update message is sent to create the association of a peering connection. It is obvious that the procedure of binding update will become complex for the movement of a network. Because several active connections may exist within a moving network and each of them may have different correspondent node. In this paper, the scheme of independent binding update is studied in detail to deal with the procedures required for mobile networks. This approach makes the operation scenarios of the mobile node and the mobile router the same no matter when it travels alone or travels with a mobile network. Furthermore, the multicast scheme is proposed to reduce the overhead of binding update of the mobile network. The simulation results illustrate that the proposed scheme can effectively reduce the number of binding update messages especially when the number of nodes in the mobile network is getting large. And the results also indicate that the percentage of direct-transmitted packets is also increased.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129775960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of quantum key distribution with noisy channels 具有噪声信道的量子密钥分配仿真
A. Pereszlényi
{"title":"Simulation of quantum key distribution with noisy channels","authors":"A. Pereszlényi","doi":"10.1109/CONTEL.2005.185853","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185853","url":null,"abstract":"In this paper secure schemes for cryptographic key distribution - called quantum key distribution protocols - are investigated by means of computer simulation. For this, a general purpose quantum circuit designer and simulator program was developed and used. To be more realistic the protocols were ran on different noisy quantum channels. The aim is to determine the grade of security of the protocols in function of the channel parameters they are using; and also to propose a method for selecting the best protocol for a given channel.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126518882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Quality model for the world wide web 万维网的质量模型
G. Gledec
{"title":"Quality model for the world wide web","authors":"G. Gledec","doi":"10.1109/CONTEL.2005.185873","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185873","url":null,"abstract":"This paper proposes the quality model and methodology that guides the Web site quality evaluation. The model can be viewed as a hierarchical tree with three levels. The first level is composed of six quality characteristics defined by ISO standards: functionality, usability, reliability, efficiency, maintainability and portability. The second level decomposes characteristics into subcharacteristics, which are further decomposed into third-level measurable indicators. The four stages of evaluation process are defined. The paper proposes the application of Goal-Question-Metrics model to evaluate indicators, subcharacteristics and characteristics, as well as the overall quality of the site. The proposed model and metrics are verified on the selected set of Web sites at the Faculty of Electrical Engineering and Computing. In spite of tremendeous growth of the World Wide Web in the last several years, the number of Web sites that offer useful and reliable information is still negligable. The quality of the information delivered through the Web is not merely the result of good design and visual appereance of the site, but is a part of a much broader process in which the information and its presentation are tailored according to users' needs and expectations. Therefore, a high-quality Web site is the one that meets the users'","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128901376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Forecasting mobile market development 预测移动市场发展
I. Gjerde, R. Venturin, K. Stordahl
{"title":"Forecasting mobile market development","authors":"I. Gjerde, R. Venturin, K. Stordahl","doi":"10.1109/CONTEL.2005.185857","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185857","url":null,"abstract":"","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127881634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Introduction to the special session on formal verification of telecommunications systems 关于正式核查电信系统特别会议的导言
T. Kapus, G. Jezic
{"title":"Introduction to the special session on formal verification of telecommunications systems","authors":"T. Kapus, G. Jezic","doi":"10.1109/CONTEL.2005.185967","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185967","url":null,"abstract":"Formal verification may be defined as a method which takes a formal description of a system and a formal specification of correctness requirements, and proves – or disproves – that the system satisfies them. Whereas the use of some formal and semi-formal languages (e.g. SDL, UML, MSC) for system description is quite well established in the telecommunications industry, when it comes to system verification, less efficient and more timeconsuming methods, such as (non-exhaustive) simulation and testing largely prevail over the use of formal verification techniques. Having recognized the significant potential benefits of applying formal verification techniques, the researchers from the Faculty of Electrical Engineering and Computing (FER) in Zagreb and from the Faculty of Electrical Engineering and Computer Science (FERI) in Maribor jointly organized a Workshop on Formal Verification of Telecommunication Systems in 2004. One of the conclusions of the Workshop was to organize a Special Session on Formal Verification of Telecommunications Systems within ConTEL 2005, with the goal to discuss this important topic in a wider forum. We primarily solicited original submissions on the application of formal verification in industrial projects and on new methods and tools for enabling such applications. Submissions related to the use of formal verification in telecommunications systems design were also welcome. A total of 10 papers have been submitted to the special session, and five of them have been accepted. The first paper is Formalizing Operator Requirements of the Development of Telecommunications Networks and Services by Krzysztof M. Brzezinski from Warsaw University of Technology, Poland. Network operators design their networks and service packages by using a set of “industrial” concepts and practices, which are relatively informal compared to other phases of the system life-cycle (protocol design using formal verification/validation, conformance and interoperability testing). This paper proposes a semi-formal operator requirements notation and tool support for handling operator requirements documents in order to increase the formalisation level of the overall telecommunications system life-cycle. The second paper is Modeling, Verifying and Testing the Mobility Management in the Mobile IPv6 Protocol by Francine Ngani Noudem and César Viho from IRISA – Université de Rennes I, France. Mobility is an important characteristic of modern telecommunications systems. The authors present an approach to modelling mobility management of mobile IPv6 with SDL, which allows them to perform validation of certain properties regarding mobility by the exhaustive simulation capability of the ObjectGeode industrial toolset. Based on the SDL model, they also present an approach to automatic test case generation in the new language TTCN-3. The third paper is Predicate Abstraction in Protocol Verification by Edgar Pek and Nikola Bogunovi from FER, Croatia. Model checking is a","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133406415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless sensor networks: the product of a marriage made in heaven 无线传感器网络:天作之合的产物
M. Bayoumi
{"title":"Wireless sensor networks: the product of a marriage made in heaven","authors":"M. Bayoumi","doi":"10.1109/CONTEL.2005.185806","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185806","url":null,"abstract":"Computers, communication and sensing technologies are converging to change the way we live, interact, and conduct business. Wireless Sensor networks reflect such convergence. These networks are based on collaborative efforts of a large number of sensor nodes. They should be low-cost, low-power, and multifunction. These nodes have the capabilities of sensing, data processing, and communicating. Sensor networks have wide range of applications, from monitoring sensors in industrial facilities to control and management of energy applications to military and security fields. Because of the special features of sensor networks, new network technologies; communication and protocol, are needed for cost effective, low power, and reliable communication. These network protocols and architectures should take into consideration the special features of sensor networks such as the large number of nodes, their failure rate, limited power, high density, etc. In this talk the impact of wireless sensor networks will be addressed, several of the design and communication issues will be discussed, and a case study of a current project of using such networks in drilling and management off-shore oil will be given.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133491765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信