{"title":"Secure H.323 Data Transmission between Private Networks","authors":"M. Balík, Lubomir Cvrk, M. Sykora","doi":"10.1109/ICN.2009.81","DOIUrl":"https://doi.org/10.1109/ICN.2009.81","url":null,"abstract":"This paper shortly describes a conception of H.323 videoconference networking and security module that is part of integrated multimedia support system for research consortia. First, the requirements of this videoconference system are presented. This is followed by a description of common security conceptions. H.323 network suffers from the fact that the protocol itself codes the IP addresses of videoconference participants in the application level data. We propose here a unified system which solves this problem and allows an interconnection of private H.323 networks over the common public network. Results from our previous research are used to establish and maintain a secured communication tunnel and therefore all H.323 communications are encrypted and authenticated. In conclusion, a brief summary of the results obtained during verification of this security conception is given.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theoretical Analysis of EDCA Medium Access-Control Method in Simplified Network Environment","authors":"P. Rajmic, D. Komosny, K. Molnar","doi":"10.1109/ICN.2009.38","DOIUrl":"https://doi.org/10.1109/ICN.2009.38","url":null,"abstract":"The IEEE 802.11e standard was designed to extend the basic WLAN access-control methods with QoS support. It is achieved by allowing the network administrators to tune several access-control related parameters. Our analysis is focused on the effect of these parameters on the probability of a station gaining access to the wireless medium. We provide a mathematical analysis in a simplified model with two stations, which were not in collision within the preceding contention.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130348239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CoUniverse: Framework for Building Self-Organizing Collaborative Environments Using Extreme-Bandwidth Media Applications","authors":"M. Liska, P. Holub","doi":"10.1007/978-3-642-00955-6_39","DOIUrl":"https://doi.org/10.1007/978-3-642-00955-6_39","url":null,"abstract":"","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129987749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Handover on VoIP Speech Quality in WiMAX Networks","authors":"Zdenek Becvar, P. Mach, R. Bestak","doi":"10.1109/ICN.2009.11","DOIUrl":"https://doi.org/10.1109/ICN.2009.11","url":null,"abstract":"VoIP is one of the most emerging technologies in the area of speech communications. VoIP is widely deployed in fixed line access networks. However, user’s requirements on the mobility within communication and on the quality of the speech communications are increasing. Therefore, VoIP technology is more and more integrated into broadband wireless networks with QoS support such as WiMAX. The latest version of WiMAX standard, based on IEEE 802.16e, has implemented a full mobility support. The mobility is allowed due to a handover procedure. IEEE 802.16e specifies only one mandatory handover procedure: hard handover. This handover type is easy to implement, but it increases end-to-end packet delay that is critical for delay sensitive services such as VoIP. This paper evaluates an impact of the handover on the speech quality in VoIP networks.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"42 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128217958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Puttonen, G. Fekete, T. Väärämäki, T. Hämäläinen
{"title":"Multiple Interface Management of Multihomed Mobile Hosts in Heterogeneous Wireless Environments","authors":"J. Puttonen, G. Fekete, T. Väärämäki, T. Hämäläinen","doi":"10.1109/ICN.2009.82","DOIUrl":"https://doi.org/10.1109/ICN.2009.82","url":null,"abstract":"In this paper we present our solution for intelligent network interface selection and (vertical) handover control for heterogeneous multi-access environments. The 4th generation mobile communication system is seen as a combination of several access technologies optimized for different purposes. A combination of these access technologies can constitute, with intelligent control, a 4G access with capabilities to support various application and user requirements and preferences. A policy based vertical handover controller system, called VERHO, utilizes input from several cross-layer sources, the Mobile IPv6 protocol and network interface selection to achieve both proactive and intelligent vertical handovers between a variety of access interfaces. Real-time link status information, access point scanning support, user profiles, policies and Multiple Attribute Decision Making algorithms provide flexibility in interface selection and result in an Always-Best-Connected access for the user. We present the VERHO architecture along with discussing and showing the possible benefits of such system in the future.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134624403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Hidekuma, G. Hasegawa, Masahiro Sasabe, H. Nakano
{"title":"Degree-Based Power Control Method for Increasing Spatial Reuse in TDMA-Based Wireless Mesh Networks","authors":"T. Hidekuma, G. Hasegawa, Masahiro Sasabe, H. Nakano","doi":"10.1109/ICN.2009.22","DOIUrl":"https://doi.org/10.1109/ICN.2009.22","url":null,"abstract":"Wireless Mesh Networks (WMNs) have attracted significant interest as a cost-effective wireless network infrastructure. However, the efficiency of wireless resource utilization decreases by radio interference when multiple transmissions in an interference region occur simultaneously. So decreasing radio interference is one of the major problems in wireless network.In the present paper, we propose a degree-based power control method of wireless mesh nodes to enhance spatial reuse in WMNs with TDMA MAC protocol. The proposed method is an attempt to reduce the radio interference and improve the spatial reuse of the WMN by decreasing the transmission power of mesh nodes, while maintaining the network connectivity at a certain level. Numerical evaluation results reveal that the proposed method decreases the frame length by up to 22%.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114075435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation Based Performance Analysis of Ethernet MPI Cluster","authors":"Boleslaw Tokarski, L. Koszalka","doi":"10.1109/ICN.2009.55","DOIUrl":"https://doi.org/10.1109/ICN.2009.55","url":null,"abstract":"This paper shows the influence of network aspects and MPI implementation on the performance of an Ethernet based computer cluster. Following factors are considered: message size, number of nodes, node heterogeneity, network speed,switching technology and MPI implementation. The basic index of performance is throughput measured with Intel MPI Benchmark.This paper shows that there is a specific message size that is optimal for each cluster configuration. Most important factor is the network speed, the second is MPI implementation. One can also find that using a faster master node can give a speed bonus.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Channel Allocation Scheme with Triangle Communication","authors":"Sungbum Hong, Q. Malluhi, Tom Jacob","doi":"10.1109/ICN.2009.64","DOIUrl":"https://doi.org/10.1109/ICN.2009.64","url":null,"abstract":"Radio is a valuable resource for wireless/mobile communication systems. In this paper, we present an ef-ficient algorithm using a novel triangle communication model to synchronize processes effectively by searching for free channels for wireless mobile communication systems. A geographical area controlled by a Mobile Switching Center (MSC) is divided into many small hexagonal regions called cells. Each cell in a sub-cluster can effectively collect channel information from the first tier of co-channel cells through the triangle communication model. The performance of the communication model is characterized in terms of message complexity, response time and failure locality. For fair evaluation, we introduce a novel metric, which is called Accumulated Failure Locality (AFL). The triangle communication model improves message complexity,response time and AFL of the algorithm. With AFL, we examine our algorithm, and produce an AFL vectr. We discuss the algorithm and prove its correctness. We also show that the algorithm requires at most O(Nsc) messages,where Nsc is the number of cells in a sub-cluster.This is compared to the algorithms [3] which requires O((Ng)2), where Ng is the number of channel groups in the large bandwidth allocated to the system.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filter Design for Image Preprocessing in Image Communication","authors":"P. Zahradnik, B. Simák, M. Vlcek","doi":"10.1109/ICN.2009.20","DOIUrl":"https://doi.org/10.1109/ICN.2009.20","url":null,"abstract":"An effective approach in the design of two-dimensional notch FIR filters for image preprocessing useful in image communication is presented. The completely analytical design method is based on Zolotarev polynomials. Closed form formulas for the filter design are presented. One example demonstrates the design procedure. An application of the 2-D notch FIR filter for image preprocessing is presented.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130589636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LS2RP: Link-State RAID Routing Protocol","authors":"N. Tabbane","doi":"10.1109/ICN.2009.76","DOIUrl":"https://doi.org/10.1109/ICN.2009.76","url":null,"abstract":"We introduce here a novel routing protocol for a class of reconfigurable wireless ad hoc networks. The main features of these ad hoc networks are increased nodes mobility, a larger number of nodes, and a large network span. We argue that current routing protocols do not provide a satisfactory solution for routing in this type of environment. We propose a scheme, called the Link-State RAID Routing Protocol: LS2RP, which dynamically adjusts itself to operational conditions by sizing a cluster. More specifically, LS2RP reduces the cost of frequent updates to the constantly changing network topology by limiting the scope of the updates to the immediate neighbourhood of the change. We study the performance of the scheme, evaluating the average number of control messages required to discover a route within the network. Furthermore, we compare the scheme's performance with reactive flood search and LS2RP protocols.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126978463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}