2009 Eighth International Conference on Networks最新文献

筛选
英文 中文
Secure H.323 Data Transmission between Private Networks 私有网络之间的H.323数据传输安全
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.81
M. Balík, Lubomir Cvrk, M. Sykora
{"title":"Secure H.323 Data Transmission between Private Networks","authors":"M. Balík, Lubomir Cvrk, M. Sykora","doi":"10.1109/ICN.2009.81","DOIUrl":"https://doi.org/10.1109/ICN.2009.81","url":null,"abstract":"This paper shortly describes a conception of H.323 videoconference networking and security module that is part of integrated multimedia support system for research consortia. First, the requirements of this videoconference system are presented. This is followed by a description of common security conceptions. H.323 network suffers from the fact that the protocol itself codes the IP addresses of videoconference participants in the application level data. We propose here a unified system which solves this problem and allows an interconnection of private H.323 networks over the common public network. Results from our previous research are used to establish and maintain a secured communication tunnel and therefore all H.323 communications are encrypted and authenticated. In conclusion, a brief summary of the results obtained during verification of this security conception is given.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical Analysis of EDCA Medium Access-Control Method in Simplified Network Environment 简化网络环境下EDCA介质访问控制方法的理论分析
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.38
P. Rajmic, D. Komosny, K. Molnar
{"title":"Theoretical Analysis of EDCA Medium Access-Control Method in Simplified Network Environment","authors":"P. Rajmic, D. Komosny, K. Molnar","doi":"10.1109/ICN.2009.38","DOIUrl":"https://doi.org/10.1109/ICN.2009.38","url":null,"abstract":"The IEEE 802.11e standard was designed to extend the basic WLAN access-control methods with QoS support. It is achieved by allowing the network administrators to tune several access-control related parameters. Our analysis is focused on the effect of these parameters on the probability of a station gaining access to the wireless medium. We provide a mathematical analysis in a simplified model with two stations, which were not in collision within the preceding contention.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130348239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CoUniverse: Framework for Building Self-Organizing Collaborative Environments Using Extreme-Bandwidth Media Applications 宇宙:使用极端带宽媒体应用程序构建自组织协作环境的框架
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1007/978-3-642-00955-6_39
M. Liska, P. Holub
{"title":"CoUniverse: Framework for Building Self-Organizing Collaborative Environments Using Extreme-Bandwidth Media Applications","authors":"M. Liska, P. Holub","doi":"10.1007/978-3-642-00955-6_39","DOIUrl":"https://doi.org/10.1007/978-3-642-00955-6_39","url":null,"abstract":"","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129987749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Impact of Handover on VoIP Speech Quality in WiMAX Networks 切换对WiMAX网络中VoIP语音质量的影响
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.11
Zdenek Becvar, P. Mach, R. Bestak
{"title":"Impact of Handover on VoIP Speech Quality in WiMAX Networks","authors":"Zdenek Becvar, P. Mach, R. Bestak","doi":"10.1109/ICN.2009.11","DOIUrl":"https://doi.org/10.1109/ICN.2009.11","url":null,"abstract":"VoIP is one of the most emerging technologies in the area of speech communications. VoIP is widely deployed in fixed line access networks. However, user’s requirements on the mobility within communication and on the quality of the speech communications are increasing. Therefore, VoIP technology is more and more integrated into broadband wireless networks with QoS support such as WiMAX. The latest version of WiMAX standard, based on IEEE 802.16e, has implemented a full mobility support. The mobility is allowed due to a handover procedure. IEEE 802.16e specifies only one mandatory handover procedure: hard handover. This handover type is easy to implement, but it increases end-to-end packet delay that is critical for delay sensitive services such as VoIP. This paper evaluates an impact of the handover on the speech quality in VoIP networks.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"42 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128217958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Multiple Interface Management of Multihomed Mobile Hosts in Heterogeneous Wireless Environments 异构无线环境下多主移动主机的多接口管理
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.82
J. Puttonen, G. Fekete, T. Väärämäki, T. Hämäläinen
{"title":"Multiple Interface Management of Multihomed Mobile Hosts in Heterogeneous Wireless Environments","authors":"J. Puttonen, G. Fekete, T. Väärämäki, T. Hämäläinen","doi":"10.1109/ICN.2009.82","DOIUrl":"https://doi.org/10.1109/ICN.2009.82","url":null,"abstract":"In this paper we present our solution for intelligent network interface selection and (vertical) handover control for heterogeneous multi-access environments. The 4th generation mobile communication system is seen as a combination of several access technologies optimized for different purposes. A combination of these access technologies can constitute, with intelligent control, a 4G access with capabilities to support various application and user requirements and preferences. A policy based vertical handover controller system, called VERHO, utilizes input from several cross-layer sources, the Mobile IPv6 protocol and network interface selection to achieve both proactive and intelligent vertical handovers between a variety of access interfaces. Real-time link status information, access point scanning support, user profiles, policies and Multiple Attribute Decision Making algorithms provide flexibility in interface selection and result in an Always-Best-Connected access for the user. We present the VERHO architecture along with discussing and showing the possible benefits of such system in the future.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134624403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Degree-Based Power Control Method for Increasing Spatial Reuse in TDMA-Based Wireless Mesh Networks 基于tdma的无线网状网络中提高空间复用度的功率控制方法
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.22
T. Hidekuma, G. Hasegawa, Masahiro Sasabe, H. Nakano
{"title":"Degree-Based Power Control Method for Increasing Spatial Reuse in TDMA-Based Wireless Mesh Networks","authors":"T. Hidekuma, G. Hasegawa, Masahiro Sasabe, H. Nakano","doi":"10.1109/ICN.2009.22","DOIUrl":"https://doi.org/10.1109/ICN.2009.22","url":null,"abstract":"Wireless Mesh Networks (WMNs) have attracted significant interest as a cost-effective wireless network infrastructure. However, the efficiency of wireless resource utilization decreases by radio interference when multiple transmissions in an interference region occur simultaneously. So decreasing radio interference is one of the major problems in wireless network.In the present paper, we propose a degree-based power control method of wireless mesh nodes to enhance spatial reuse in WMNs with TDMA MAC protocol.  The proposed method is an attempt to reduce the radio interference and improve the spatial reuse of the WMN by decreasing the transmission power of mesh nodes, while maintaining the network connectivity at a certain level. Numerical evaluation results reveal that the proposed method decreases the frame length by up to 22%.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114075435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation Based Performance Analysis of Ethernet MPI Cluster 基于仿真的以太网MPI集群性能分析
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.55
Boleslaw Tokarski, L. Koszalka
{"title":"Simulation Based Performance Analysis of Ethernet MPI Cluster","authors":"Boleslaw Tokarski, L. Koszalka","doi":"10.1109/ICN.2009.55","DOIUrl":"https://doi.org/10.1109/ICN.2009.55","url":null,"abstract":"This paper shows the influence of network aspects and MPI implementation on the performance of an Ethernet based computer cluster. Following factors are considered: message size, number of nodes, node heterogeneity, network speed,switching technology and MPI implementation. The basic index of performance is throughput measured with Intel MPI Benchmark.This paper shows that there is a specific message size that is optimal for each cluster configuration. Most important factor is the network speed, the second is MPI implementation. One can also find that using a faster master node can give a speed bonus.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Channel Allocation Scheme with Triangle Communication 基于三角通信的有效信道分配方案
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.64
Sungbum Hong, Q. Malluhi, Tom Jacob
{"title":"Efficient Channel Allocation Scheme with Triangle Communication","authors":"Sungbum Hong, Q. Malluhi, Tom Jacob","doi":"10.1109/ICN.2009.64","DOIUrl":"https://doi.org/10.1109/ICN.2009.64","url":null,"abstract":"Radio is a valuable resource for wireless/mobile communication systems. In this paper, we present an ef-ficient algorithm using a novel triangle communication model to synchronize processes effectively by searching for free channels for wireless mobile communication systems. A geographical area controlled by a Mobile Switching Center (MSC) is divided into many small hexagonal regions called cells. Each cell in a sub-cluster can effectively collect channel information from the first tier of co-channel cells through the triangle communication model. The performance of the communication model is characterized in terms of message complexity, response time and failure locality. For fair evaluation, we introduce a novel metric, which is called Accumulated Failure Locality (AFL). The triangle communication model improves message complexity,response time and AFL of the algorithm. With AFL, we examine our algorithm, and produce an AFL vectr. We discuss the algorithm and prove its correctness. We also show that the algorithm requires at most O(Nsc) messages,where Nsc is the number of cells in a sub-cluster.This is compared to the algorithms [3] which requires O((Ng)2), where Ng is the number of channel groups in the large bandwidth allocated to the system.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Filter Design for Image Preprocessing in Image Communication 图像通信中图像预处理的滤波器设计
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.20
P. Zahradnik, B. Simák, M. Vlcek
{"title":"Filter Design for Image Preprocessing in Image Communication","authors":"P. Zahradnik, B. Simák, M. Vlcek","doi":"10.1109/ICN.2009.20","DOIUrl":"https://doi.org/10.1109/ICN.2009.20","url":null,"abstract":"An effective approach in the design of two-dimensional notch FIR filters for image preprocessing useful in image communication is presented. The completely analytical design method is based on Zolotarev polynomials. Closed form formulas for the filter design are presented. One example demonstrates the design procedure. An application of the 2-D notch FIR filter for image preprocessing is presented.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130589636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LS2RP: Link-State RAID Routing Protocol l2rp:链路状态RAID路由协议
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.76
N. Tabbane
{"title":"LS2RP: Link-State RAID Routing Protocol","authors":"N. Tabbane","doi":"10.1109/ICN.2009.76","DOIUrl":"https://doi.org/10.1109/ICN.2009.76","url":null,"abstract":"We introduce here a novel routing protocol for a class of reconfigurable wireless ad hoc networks. The main features of these ad hoc networks are increased nodes mobility, a larger number of nodes, and a large network span. We argue that current routing protocols do not provide a satisfactory solution for routing in this type of environment. We propose a scheme, called the Link-State RAID Routing Protocol: LS2RP, which dynamically adjusts itself to operational conditions by sizing a cluster. More specifically, LS2RP reduces the cost of frequent updates to the constantly changing network topology by limiting the scope of the updates to the immediate neighbourhood of the change. We study the performance of the scheme, evaluating the average number of control messages required to discover a route within the network. Furthermore, we compare the scheme's performance with reactive flood search and LS2RP protocols.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126978463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信