{"title":"Proposal of Distribution Scheme for Vehicle Information in ITS Networks","authors":"K. Naito, Koushiro Sato, K. Mori, Hideo Kobayashi","doi":"10.1109/ICN.2009.30","DOIUrl":"https://doi.org/10.1109/ICN.2009.30","url":null,"abstract":"Communication of vehicle information to neighbor vehicles is an important factor for safe driving systems in Intelligent Transport System. Additionally, big-size vehicles on the real road environments may interrupt communication between vehicles. Therefore, an adequate vehicle should forward the vehicle information in the delivery of the vehicle information to neighbor vehicles. This paper proposes a new routing protocol for the delivery of the vehicle information to neighbor vehicles in the specific area. The proposed protocol can deliver new vehicle information with short delay by performing temporal limited flooding before a route construction. Moreover, it can deliver the vehicle information effectively with the forwarding by adequate vehicles. Mixed environment of standard-sized and big-size vehicles is assumed in computer simulations. Numerical results show that the proposed protocol can achieve a high delivery ratio with short delay even if the big-size vehicle influences the communication between standard-sized vehicles.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117106216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks","authors":"M. Striki, K. Manousakis, J. Baras","doi":"10.1109/ICN.2009.52","DOIUrl":"https://doi.org/10.1109/ICN.2009.52","url":null,"abstract":"Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research directions in the areas of wireless network security. MANETs are emerging as the desired environment for an increasing number of commercial and military applications, addressing also an increasing number of users. Security on the other hand, is an indispensable requirement of modern life for such applications. The inherent limitations of MANETs impose major difficulties in establishing a suitable secure group communications framework. This is even more so for the operation of Key Agreement (KA), under which all parties contribute equally to the group key. The logical design of efficient KA protocols has been the main focus of the related research. Such a consideration however, gives only a partial account on the actual performance of a KA protocol in a multi-hop network as protocols have been evaluated only in terms of the key related messaging in isolation from network functions that interact with the logical scheme (i.e. routing). In recent work, we contributed towards the latter by efficiently extending a number of Diffie-Hellman group KA protocols in wireless multi hop ad hoc networks. In this work, we are extending a scheme that was left out in our previous work: Hypercube. Through analysis and simulations we demonstrate the superiority of the new, enriched H-Cube that takes into account the underlying routing by the use of a topologically aware communications schedule.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124077796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FSA – A Flooding Based Survivable RWA Mechanism for Dynamic Traffic Demands in WDM Optical Networks","authors":"Chen-Shie Ho, Kuo-Cheng Chiang","doi":"10.1109/ICN.2009.62","DOIUrl":"https://doi.org/10.1109/ICN.2009.62","url":null,"abstract":"Many existing literatures investigated the survivable routing and wavelength assignment strategies on WDM networks from the perspective of source routing which implies that the size of the network will heavily limit the scalability and the tractability of the problem. In this paper, we will probe into the same problem by means of the distributed processing within each node in the network. The proposed flooding based approach just uses the simple broadcast operation to the output ports by looking up the tables and can be easily integrated into the regular routing protocols implemented in each node. The simulations are made to verify the performance of this framework with comparison to the centralized version of the solution.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122894255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Program Suite for Distributed Simulation of Networks in Multi-core Environments","authors":"Lukasz Chrost, A. Brachman, A. Chydzinski","doi":"10.1109/ICN.2009.44","DOIUrl":"https://doi.org/10.1109/ICN.2009.44","url":null,"abstract":"The ns-2 simulator is one of the most popular and widely used discrete event network simulators. Its usage of the general purpose Tcl scripting language accompanied with a wide range of networking technologies allows users to easily create complex and differentiated simulation scenarios. The main limitation of ns-2 is its lack of support for multiprocessing, especially considering that the multi-core environments have recently become tools of everyday use. In this paper we (a) propose a programming approach that allows running single-model simulations simultaneously on a multi-core systems using ns-2 and (b) present a set of software tools developed following the proposed convention. In addition, we describe a lightweight software scheduler extending the use of ns-2 on ad-hoc grid systems.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123064931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Danger to Critical Telecom Infrastructure: A Risky Business","authors":"A. Snow, J. Hoag, G. Weckman","doi":"10.1109/ICN.2009.70","DOIUrl":"https://doi.org/10.1109/ICN.2009.70","url":null,"abstract":"Malicious acts aimed directly against humans, or indirectly at their critical infrastructures is a real and present danger. However, how does society quantify danger levels? And is danger different from risk? Classic risk assessments require probability assessments, a highly speculative task for rare events. A “Danger Index”, proposed by Randall Larsen in a recent book, is investigated here. In this exploratory research paper, this metric is examined in the context of current views of risk, and investigates its potential application to telecommunication settings. The danger index is deemed to have potential for assessing critical telecommunication infrastructure protection, avoiding difficult, and often impractical, probability assessments.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130227986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CESNET Fiber Optics Transport Network","authors":"K. Slávicek, V. Novák, J. Ledvinka","doi":"10.1109/ICN.2009.80","DOIUrl":"https://doi.org/10.1109/ICN.2009.80","url":null,"abstract":"This paper describes design and implementation of the optical transport network backbone of CESNET NREN. Both single-channel and DWDM technology are discussed. Uncommon technology solutions and the process of its implementation in CESNET backbone network is described. Paper is enclosed by description of the current CESNET DWDM topology and prospective development. The last part deals with analysis of optical channel protection capabilities of the core DWDM network.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132147274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jin-Ok Hwang, Young-Il Choi, Joosang Youn, YoungJun Lee, Sung-Gi Min
{"title":"Group Key Agreement Scheme for Single Link Failure in Ad-Hoc Network","authors":"Jin-Ok Hwang, Young-Il Choi, Joosang Youn, YoungJun Lee, Sung-Gi Min","doi":"10.1109/ICN.2009.78","DOIUrl":"https://doi.org/10.1109/ICN.2009.78","url":null,"abstract":"In ad-hoc networks, mobile nodes cannot be supported the group authentication by Internet infrastructure. To resolve the group authentication in ad-hoc networks, several protocols for group key agreement have been proposed. These protocols assumes the reliable communication links between MNs. However, wireless links in ad-hoc network are inherently unreliable. We propose a group key agreement algorithm based on hyper-cube key agreement scheme to cope with failed links during group key agreement. When a link failure occurs in hyper-cube key agreement scheme, the key agreement keeps up the process no longer. The algorithm deals with any single link failures on any one plane of a hyper-cube.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123404186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective and Resource-Efficient Multimedia Communication Using the NIProxy","authors":"Maarten Wijnants, W. Lamotte","doi":"10.1109/ICN.2009.24","DOIUrl":"https://doi.org/10.1109/ICN.2009.24","url":null,"abstract":"Adequate and resource-efficient support for multimedia communication in transportation networks is rapidly gaining importance. At the same time, computer networks are being faced with increasing degrees of diversity, for instance in terms of client terminal specifications. We are therefore convinced that any next-generation network should be able to successfully address both these issues. This paper reports on our continued development of the NIProxy, a network intermediary which strives to improve the features and performance of IP-based networks with regard to multimedia communication in an attempt to optimize the experience provided to users of distributed applications. In particular, we describe how the NIProxy system was extended with support for upstream network traffic shaping as well as outbound multimedia service provision. The implications of these enhancements are discussed and we demonstrate and validate, through experimental evaluation, the new possibilities they entail and their added value in terms of user experience optimization.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acquisition of Channel State Information for Routing Purposes in Relay-Based WiMAX Networks","authors":"P. Mach, Zdenek Becvar, R. Bestak","doi":"10.1109/ICN.2009.41","DOIUrl":"https://doi.org/10.1109/ICN.2009.41","url":null,"abstract":"The paper focuses on multi-hop routing mechanism used in relay based WiMAX networks. The proposal how to acquire channel state information (CSI) on relay and access path for de-centrally and centrally controlled relays is presented. Furthermore, on the access path the proposal distinguishes whether the user’s terminals are active or inactive in order to save system resources. Based on simulation, the protocol overhead of proposed mechanism for various system configuration and parameters such as nominal channel bandwidth, number of users in the system or reporting period is evaluated. Additionally, an optimum reporting period for the system capacity maximization is determined.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123728629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Context Ontologies for Addressing and Routing in Mobile Ad Hoc Networks","authors":"R. Eigner, Christoph Mair","doi":"10.1109/ICN.2009.72","DOIUrl":"https://doi.org/10.1109/ICN.2009.72","url":null,"abstract":"This paper presents a new way of addressing and routing for mobile ad hoc networks on the basis of contextual information such as air pressure, brightness, wind direction and strength, or GPS position. The most common use case of context-based addressing is group communication: A participant sends a message to an a priori unspecified set of recipients, but indicates the context in which the message could be useful for a potential receiver. In contrast to infrastructure networks the sender no longer designates the receiver of its message with a distinct identifier. Instead, each recipient using his local context decides by himself, whether the message is useful for him and whether it should be sent out again. The modeling of the necessary application knowledge is done as ontologies in OWL (Web Ontology Language). As an example scenario, a wind gust warning on highways using a vehicular ad hoc network (VANET) is described: the warning message should be sent to all vehicles on the same route containing the place where the wind was detected. The models are applied in a prototypical example scenario in order to show the performance of the approach through a simulation, using the JiST/SWANS simulator for mobile ad hoc networks. The results show that the number of messages that are necessary to warn all vehicles in a given environment of the wind danger can be reduced by half – as opposed to a simple flooding of the network.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129455996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}