2009 Eighth International Conference on Networks最新文献

筛选
英文 中文
Proposal of Distribution Scheme for Vehicle Information in ITS Networks ITS网络中车辆信息分配方案的建议
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.30
K. Naito, Koushiro Sato, K. Mori, Hideo Kobayashi
{"title":"Proposal of Distribution Scheme for Vehicle Information in ITS Networks","authors":"K. Naito, Koushiro Sato, K. Mori, Hideo Kobayashi","doi":"10.1109/ICN.2009.30","DOIUrl":"https://doi.org/10.1109/ICN.2009.30","url":null,"abstract":"Communication of vehicle information to neighbor vehicles is an important factor for safe driving systems in Intelligent Transport System. Additionally, big-size vehicles on the real road environments may interrupt communication between vehicles. Therefore, an adequate vehicle should forward the vehicle information in the delivery of the vehicle information to neighbor vehicles. This paper proposes a new routing protocol for the delivery of the vehicle information to neighbor vehicles in the specific area. The proposed protocol can deliver new vehicle information with short delay by performing temporal limited flooding before a route construction. Moreover, it can deliver the vehicle information effectively with the forwarding by adequate vehicles. Mixed environment of standard-sized and big-size vehicles is assumed in computer simulations. Numerical results show that the proposed protocol can achieve a high delivery ratio with short delay even if the big-size vehicle influences the communication between standard-sized vehicles.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117106216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks 多跳自组织网络中拓扑感知超立方体设计的新算法
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.52
M. Striki, K. Manousakis, J. Baras
{"title":"New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks","authors":"M. Striki, K. Manousakis, J. Baras","doi":"10.1109/ICN.2009.52","DOIUrl":"https://doi.org/10.1109/ICN.2009.52","url":null,"abstract":"Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research directions in the areas of wireless network security. MANETs are emerging as the desired environment for an increasing number of commercial and military applications, addressing also an increasing number of users. Security on the other hand, is an indispensable requirement of modern life for such applications. The inherent limitations of MANETs impose major difficulties in establishing a suitable secure group communications framework. This is even more so for the operation of Key Agreement (KA), under which all parties contribute equally to the group key. The logical design of efficient KA protocols has been the main focus of the related research. Such a consideration however, gives only a partial account on the actual performance of a KA protocol in a multi-hop network as protocols have been evaluated only in terms of the key related messaging in isolation from network functions that interact with the logical scheme (i.e. routing). In recent work, we contributed towards the latter by efficiently extending a number of Diffie-Hellman group KA protocols in wireless multi hop ad hoc networks. In this work, we are extending a scheme that was left out in our previous work: Hypercube. Through analysis and simulations we demonstrate the superiority of the new, enriched H-Cube that takes into account the underlying routing by the use of a topologically aware communications schedule.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124077796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FSA – A Flooding Based Survivable RWA Mechanism for Dynamic Traffic Demands in WDM Optical Networks 面向WDM光网络动态业务需求的基于泛洪的可存活RWA机制
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.62
Chen-Shie Ho, Kuo-Cheng Chiang
{"title":"FSA – A Flooding Based Survivable RWA Mechanism for Dynamic Traffic Demands in WDM Optical Networks","authors":"Chen-Shie Ho, Kuo-Cheng Chiang","doi":"10.1109/ICN.2009.62","DOIUrl":"https://doi.org/10.1109/ICN.2009.62","url":null,"abstract":"Many existing literatures investigated the survivable routing and wavelength assignment strategies on WDM networks from the perspective of source routing which implies that the size of the network will heavily limit the scalability and the tractability of the problem. In this paper, we will probe into the same problem by means of the distributed processing within each node in the network. The proposed flooding based approach just uses the simple broadcast operation to the output ports by looking up the tables and can be easily integrated into the regular routing protocols implemented in each node. The simulations are made to verify the performance of this framework with comparison to the centralized version of the solution.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122894255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Program Suite for Distributed Simulation of Networks in Multi-core Environments 多核环境下网络分布式仿真程序套件
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.44
Lukasz Chrost, A. Brachman, A. Chydzinski
{"title":"A Program Suite for Distributed Simulation of Networks in Multi-core Environments","authors":"Lukasz Chrost, A. Brachman, A. Chydzinski","doi":"10.1109/ICN.2009.44","DOIUrl":"https://doi.org/10.1109/ICN.2009.44","url":null,"abstract":"The ns-2 simulator is one of the most popular and widely used discrete event network simulators. Its usage of the general purpose Tcl scripting language accompanied with a wide range of networking technologies allows users to easily create complex and differentiated simulation scenarios. The main limitation of ns-2 is its lack of support for multiprocessing, especially considering that the multi-core environments have recently become tools of everyday use. In this paper we (a) propose a programming approach that allows running single-model simulations simultaneously on a multi-core systems using ns-2 and (b) present a set of software tools developed following the proposed convention. In addition, we describe a lightweight software scheduler extending the use of ns-2 on ad-hoc grid systems.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123064931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding Danger to Critical Telecom Infrastructure: A Risky Business 了解关键电信基础设施的危险:一项有风险的业务
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.70
A. Snow, J. Hoag, G. Weckman
{"title":"Understanding Danger to Critical Telecom Infrastructure: A Risky Business","authors":"A. Snow, J. Hoag, G. Weckman","doi":"10.1109/ICN.2009.70","DOIUrl":"https://doi.org/10.1109/ICN.2009.70","url":null,"abstract":"Malicious acts aimed directly against humans, or indirectly at their critical infrastructures is a real and present danger. However, how does society quantify danger levels? And is danger different from risk? Classic risk assessments require probability assessments, a highly speculative task for rare events. A “Danger Index”, proposed by Randall Larsen in a recent book, is investigated here. In this exploratory research paper, this metric is examined in the context of current views of risk, and investigates its potential application to telecommunication settings. The danger index is deemed to have potential for assessing critical telecommunication infrastructure protection, avoiding difficult, and often impractical, probability assessments.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130227986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CESNET Fiber Optics Transport Network CESNET光纤传输网络
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.80
K. Slávicek, V. Novák, J. Ledvinka
{"title":"CESNET Fiber Optics Transport Network","authors":"K. Slávicek, V. Novák, J. Ledvinka","doi":"10.1109/ICN.2009.80","DOIUrl":"https://doi.org/10.1109/ICN.2009.80","url":null,"abstract":"This paper describes design and implementation of the optical transport network backbone of CESNET NREN. Both single-channel and DWDM technology are discussed. Uncommon technology solutions and the process of its implementation in CESNET backbone network is described. Paper is enclosed by description of the current CESNET DWDM topology and prospective development. The last part deals with analysis of optical channel protection capabilities of the core DWDM network.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132147274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Group Key Agreement Scheme for Single Link Failure in Ad-Hoc Network Ad-Hoc网络中单链路故障组密钥协议方案
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.78
Jin-Ok Hwang, Young-Il Choi, Joosang Youn, YoungJun Lee, Sung-Gi Min
{"title":"Group Key Agreement Scheme for Single Link Failure in Ad-Hoc Network","authors":"Jin-Ok Hwang, Young-Il Choi, Joosang Youn, YoungJun Lee, Sung-Gi Min","doi":"10.1109/ICN.2009.78","DOIUrl":"https://doi.org/10.1109/ICN.2009.78","url":null,"abstract":"In ad-hoc networks, mobile nodes cannot be supported the group authentication by Internet infrastructure. To resolve the group authentication in ad-hoc networks, several protocols for group key agreement have been proposed. These protocols assumes the reliable communication links between MNs. However, wireless links in ad-hoc network are inherently unreliable. We propose a group key agreement algorithm based on hyper-cube key agreement scheme to cope with failed links during group key agreement. When a link failure occurs in hyper-cube key agreement scheme, the key agreement keeps up the process no longer. The algorithm deals with any single link failures on any one plane of a hyper-cube.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123404186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective and Resource-Efficient Multimedia Communication Using the NIProxy 通过NIProxy实现高效、资源高效的多媒体通信
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.24
Maarten Wijnants, W. Lamotte
{"title":"Effective and Resource-Efficient Multimedia Communication Using the NIProxy","authors":"Maarten Wijnants, W. Lamotte","doi":"10.1109/ICN.2009.24","DOIUrl":"https://doi.org/10.1109/ICN.2009.24","url":null,"abstract":"Adequate and resource-efficient support for multimedia communication in transportation networks is rapidly gaining importance. At the same time, computer networks are being faced with increasing degrees of diversity, for instance in terms of client terminal specifications. We are therefore convinced that any next-generation network should be able to successfully address both these issues. This paper reports on our continued development of the NIProxy, a network intermediary which strives to improve the features and performance of IP-based networks with regard to multimedia communication in an attempt to optimize the experience provided to users of distributed applications. In particular, we describe how the NIProxy system was extended with support for upstream network traffic shaping as well as outbound multimedia service provision. The implications of these enhancements are discussed and we demonstrate and validate, through experimental evaluation, the new possibilities they entail and their added value in terms of user experience optimization.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Acquisition of Channel State Information for Routing Purposes in Relay-Based WiMAX Networks 基于中继的WiMAX网络中用于路由目的的信道状态信息的获取
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.41
P. Mach, Zdenek Becvar, R. Bestak
{"title":"Acquisition of Channel State Information for Routing Purposes in Relay-Based WiMAX Networks","authors":"P. Mach, Zdenek Becvar, R. Bestak","doi":"10.1109/ICN.2009.41","DOIUrl":"https://doi.org/10.1109/ICN.2009.41","url":null,"abstract":"The paper focuses on multi-hop routing mechanism used in relay based WiMAX networks. The proposal how to acquire channel state information (CSI) on relay and access path for de-centrally and centrally controlled relays is presented. Furthermore, on the access path the proposal distinguishes whether the user’s terminals are active or inactive in order to save system resources. Based on simulation, the protocol overhead of proposed mechanism for various system configuration and parameters such as nominal channel bandwidth, number of users in the system or reporting period is evaluated. Additionally, an optimum reporting period for the system capacity maximization is determined.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123728629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using Context Ontologies for Addressing and Routing in Mobile Ad Hoc Networks 在移动自组织网络中使用上下文本体进行寻址和路由
2009 Eighth International Conference on Networks Pub Date : 2009-03-01 DOI: 10.1109/ICN.2009.72
R. Eigner, Christoph Mair
{"title":"Using Context Ontologies for Addressing and Routing in Mobile Ad Hoc Networks","authors":"R. Eigner, Christoph Mair","doi":"10.1109/ICN.2009.72","DOIUrl":"https://doi.org/10.1109/ICN.2009.72","url":null,"abstract":"This paper presents a new way of addressing and routing for mobile ad hoc networks on the basis of contextual information such as air pressure, brightness, wind direction and strength, or GPS position. The most common use case of context-based addressing is group communication: A participant sends a message to an a priori unspecified set of recipients, but indicates the context in which the message could be useful for a potential receiver. In contrast to infrastructure networks the sender no longer designates the receiver of its message with a distinct identifier. Instead, each recipient using his local context decides by himself, whether the message is useful for him and whether it should be sent out again. The modeling of the necessary application knowledge is done as ontologies in OWL (Web Ontology Language). As an example scenario, a wind gust warning on highways using a vehicular ad hoc network (VANET) is described: the warning message should be sent to all vehicles on the same route containing the place where the wind was detected. The models are applied in a prototypical example scenario in order to show the performance of the approach through a simulation, using the JiST/SWANS simulator for mobile ad hoc networks. The results show that the number of messages that are necessary to warn all vehicles in a given environment of the wind danger can be reduced by half – as opposed to a simple flooding of the network.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129455996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信