{"title":"New multistage interconnection network for multicast","authors":"Dong Li, Mei Ming, Bo Fu","doi":"10.1109/APCC.2003.1274247","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274247","url":null,"abstract":"In this paper, we propose a new multistage interconnection network for multicast named PNN(k) (part non-blocking network) together with its multicast routing algorithm. This network has comparable hardware costs with the permutation network in a considerable range, achieving the balance between the hardware costs and the practical demands.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An extension of stochastic process algebra for optical networks","authors":"Tony Tsang","doi":"10.1109/APCC.2003.1274431","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274431","url":null,"abstract":"An open research topic is how to combine the real-time traffic with the conventional formal language to allow modelling and efficient analysis of optical communication systems. We present a formal modelling language, called real-time stochastic process algebra (RT-SPA), to describe the real-time stochastic behaviour of optical communication systems. The language combines conventional stochastic process algebra with realtime semantics to describe complex systems in a compositional manner. It includes timed transition, parallel composition, probabilistic branching and hard real-time aspects. With this performance analysis methodology it is possible to obtain the design parameters of implementation using simulation with a lower computational time and cost than using conventional techniques. The adequacy of this framework applicability check is assessed by applying it to model and analyze wavelength-routed packet buffering techniques for optical networks.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"9 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129964627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bit-error rate performance analysis of spectrum based detector for FSK digital modulation","authors":"A. Sha'ameri","doi":"10.1109/APCC.2003.1274414","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274414","url":null,"abstract":"FSK is widely used digital modulation technique due to its simplicity in implementation using noncoherent detection. Further availability of digital signal processing algorithms such as the FFT (fast Fourier transform) and necessary supporting technology makes it possible to implement spectrum based detector for FSK. This paper formulates the BER (bit-error rate) performance of the spectrum based detector. Generally, the performance lies between the optimum that is the coherent detector and the suboptimum that is the noncoherent detector. Verification was performed by computer simulation to confirm the results.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130292348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed and scalable architecture for packet processing","authors":"B. Roabtmili, Nasser Yazdani, M. Nourani","doi":"10.1109/APCC.2003.1274245","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274245","url":null,"abstract":"Growth of network line speeds and needs for new services in routers have led to the emergence of new generation of fast and scalable devices for packet processing, called network processors. In this paper, we propose a distributed model for packet processing, which is appropriate for network processors. In this model, the systems are extended to small networks of some basic connected nodes. Architecture of connections and topology of networks is the most important challenging task facing the designer. The proposed architecture contains a special instruction set devised for network environments. The architecture can be easily scaled and redesigned in functionality, instructions, memory and I/O system.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133941434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ung-Hee Park, Young-Bae Jung, Kyunghee Lee, S. Jeon, Chang Ju Kim
{"title":"The IMD cancellation characteristics of predistortion linearizer in microwave transistor","authors":"Ung-Hee Park, Young-Bae Jung, Kyunghee Lee, S. Jeon, Chang Ju Kim","doi":"10.1109/APCC.2003.1274465","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274465","url":null,"abstract":"A predistortion linearizer, the method that IMD signals are combined at the input port of the amplifier, because of its small size and good efficiency is frequently used in high power amplifier linearizer system. The amount of IMD signal cancellation by adjusting the amplitude and phase of predistorter is investigated by new experiment method. In the combining method of predistorter type, the magnitude and phase of combining signals cannot be easily expected due to different magnitude and phase of incoming signals. By experiment, it is measured that a predistortion linearizer has lower amounts of IMD signal cancellation than those of the parallel cancellation method at the same condition (amplitude and phase).","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced counter mode","authors":"M. A. Tarhuni, S. H. Ng, Azman Samsudin, W. P. Ng","doi":"10.1109/APCC.2003.1274448","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274448","url":null,"abstract":"There are plenty of modes of operation for block ciphers available. All of them are developed as ciphers' extension or enhancement tool to gain better security or additional features. NITS had defined 5 modes as the standards; they are ECB, CBC, CFB, OFB and CTR mode. Among these modes, the CTR mode is the one that capable to be fully parallelized and possess more security features. However the disadvantage in the implementation of CTR mode is the deviation of the counter value between the encryptor and decryptor. The synchronization of the counter value can be easily lost during delivery or transmission, hence affecting the integrity of the system. This paper proposed a method to eliminate the synchronization issue by calculating the initial counter value from the initial value. The new counter value is calculated using an algorithm comprises of the cipher algorithm and a hash algorithm. This new method introduce minimum overhead at the beginning of each encryption or decryption process. By using the enhanced version of CTR mode, the implementation has become simplified, while maintaining its attractive features of better security and its ability of parallel processing.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing optical fiber transmission bandwidth using SCM-WDM technique","authors":"M. Yusof, M. Al-Qdah, S. Anas, M. Abdullah","doi":"10.1109/APCC.2003.1274291","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274291","url":null,"abstract":"Increasing the bandwidth until the physical limit of the optical medium itself (fiber optics) has always been the striving goal in designing an optical fiber communication system. Wavelength division multiplexing (WDM) and its dense version (DWDM) are widely accepted as the best approaches thus far. In this paper, a study on the sub-carrier multiplexing at radio frequency (RF) bands is proposed as a complementary technique to increase the transmission bandwidth. Two channels (each at 155 Mbps rate) and eight channels (each at 622 Mbps rate) of pseudo-random bit sequence of the NRZ-encoded data were tested. The channels were sub-carried by two RF signals at 500 MHz and 1 GHz respectively, while the eight channels system were sub-carried by 1 GHz, 2 GHz, 3 GHz and 4 GHz over each of the two wavelengths. The simulations were carried out over a fiber distance of 70 km. The effect of transmission native rate on the selection of the sub-carrier frequency is also presented.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134300148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web server scanner: scanning on IIS CGI and HTTP","authors":"S. R. Selamat","doi":"10.1109/APCC.2003.1274232","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274232","url":null,"abstract":"This paper explains about the design and implementation of Web server scanner. The scanner detected the security weaknesses on IIS, CGI and HTTP. A report is produced for audit log purposes to help decrease the security weaknesses. In Internet security, no hacking tool is more celebrated than the scanner. The scanner is a program that automatically detects security weaknesses in a remote or local host. It might reveal certain inherent weakness within the target host. The primary attributes of the scanner includes the capability to find a machine or network, the capability to find out what services are being run on the host, and the capability to test those services for known holes.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133289961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ueda, S. Miyazaki, T. Iwata, H. Nakamura, H. Sunaga
{"title":"Peer-to-peer network topology control within a mobile ad-hoc network","authors":"K. Ueda, S. Miyazaki, T. Iwata, H. Nakamura, H. Sunaga","doi":"10.1109/APCC.2003.1274351","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274351","url":null,"abstract":"This paper discusses effective configuration methods for peer-to-peer (P2P) network topologies within a mobile ad-hoc network. With recent progress in mobile ad-hoc network technology promoting the creation of new and attractive services, we are examining and developing P2P network systems for operation within ad-hoc networks. Our focus is on identifying methods of network-topology control that provide the best balance between performance and availability. We evaluated three methods through computer simulation from the viewpoints of resource consumption and network integrity and clarified their domains of applicability. The results is useful in the design of future P2P networks for operation within mobile ad-hoc networks.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131969864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effects of receiver impairments in terrestrial digital video broadcasting","authors":"R. Palipana, K. Chung","doi":"10.1109/APCC.2003.1274279","DOIUrl":"https://doi.org/10.1109/APCC.2003.1274279","url":null,"abstract":"In this paper, receiver impairments associated with zero intermediate frequency (zero-IF) dual branch receiver architectures are considered in the context of terrestrial digital video broadcasting (DVB-T). The receiver impairments studied are the DC-offset, the gain and phase imbalances, and the frequency offset. Bit error rate simulation is used to observe the influence of first order capacitive coupling for removing DC-offset. Based on the study of gain and phase imbalances, we arrive at values which are required in order to maintain the proper operation of the DVB-T signal. Also, acceptable frequency offset limits for the proper operation of the DVB-T signal are given.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132271565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}