2016 26th International Telecommunication Networks and Applications Conference (ITNAC)最新文献

筛选
英文 中文
FastSplit: Fast and Dynamic IP Mobility Management in SDN FastSplit:快速动态的SDN IP移动管理
Pragati Shrivastava, Kotaro Kataoka
{"title":"FastSplit: Fast and Dynamic IP Mobility Management in SDN","authors":"Pragati Shrivastava, Kotaro Kataoka","doi":"10.1109/ATNAC.2016.7878803","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878803","url":null,"abstract":"IP Mobility has many unresolved issues including triangle routing, session survivability, long delay and packet loss during hand-off. SDN-based IP Mobility promises to mitigate them by taking the advantage of network-wide visibility and centralized control. However, SDN-based approach still has some problems namely 1) large signaling overhead of controller and 2) high hand-off latency as the number of nodes and size of the network become large. This paper proposes a simple approach to efficiently handle IP mobility in SDN called “FastSplit”. FastSplit reduces the signaling overhead to reestablish the new path after movement by reusing the existing path between correspondent node (CN) and mobile node (MN). Our solution is two fold: 1) it finds out the redirection/split point in polynomial time by restricting the search area along the previous path between MN and CN, and 2)using Sub-Optimality Factor (SOF) for determining the cost-effective split point in order to manage the trade-off between the optimality of reestablished path and the reduction of signaling overhead for handling host mobility. We present an algorithm to find out a split point between MN and CN so that the existing path configuration can be reused. The evaluation results showed that FastSplit contributes to achieving significantly less signaling cost by reducing the number of SDN switches to reconfigure, by up to 50% as well as shortening the hand-off duration by 17% in comparison to OpenFlow based Mobile IP. FastSplit is also proven that such performance can be achieved without compromising the overall end-to-end throughput between CN and MN at the new location.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An efficient and robust method for solving multi-objective constraint-satisfaction problems in Cognitive Radio systems 一种求解认知无线电系统中多目标约束满足问题的高效鲁棒方法
Ken-Shin Huang, Yi-Luen Chang, Pao-Ann Hsiung
{"title":"An efficient and robust method for solving multi-objective constraint-satisfaction problems in Cognitive Radio systems","authors":"Ken-Shin Huang, Yi-Luen Chang, Pao-Ann Hsiung","doi":"10.1109/ATNAC.2016.7878787","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878787","url":null,"abstract":"Cognitive radio (CR) adapts to wireless environment changes and tries to satisfy the demand of users by tuning radio parameters. However, the process of tuning the radio parameters is quite time-consuming. In order to allow a CR system to make accurate decisions, the wireless environment must be precisely modelled by reliable methods. A CR system also needs a method for tuning the radio parameters in a robust way so as to decrease the probability of doing system reconfiguration with each and every time of environment change. This work uses artificial neural network to dynamically model the environment, and proposes a method called Robust Light-weight Reasoning for Cognitive Radio that can provide robust solutions to the multi-objective problem of satisfying user given constraints.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IPv6 campus network deployment guidelines for DNS, Web server, Proxy server and Wi-Fi IPv6校园网DNS、Web服务器、代理服务器和Wi-Fi部署指南
A. Baig
{"title":"IPv6 campus network deployment guidelines for DNS, Web server, Proxy server and Wi-Fi","authors":"A. Baig","doi":"10.1109/ATNAC.2016.7878815","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878815","url":null,"abstract":"The deployment of IPv6 is becoming increasingly imperative world over because of the address-space limitations of its predecessor, IPv4, and the surge in internet services over the past decade. However, despite the solutions promised by IPv6, there is still significant reluctance to its large-scale adoption owing to different reasons such as the need for a better understanding of inherent deployment challenges and compatibility concerns with the existing IPv4 architecture. In this regard, the campus network deployment guidelines presented at length in this report hope to build upon similar previous undertakings and substantially contribute to the cause of IPv6 adoption in developing countries such as Pakistan in terms of the definition and implementation of DNS, Web server, Wi-Fi and Proxy server functionalities. In addition, the expected technical benefits and a comment on the technology and policy aspects of IPv6 adoption are also explicated.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114884361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of PCC OFDM on a software defined radio platform PCC OFDM在软件无线电平台上的实现
Gayathri Kongara, J. Armstrong
{"title":"Implementation of PCC OFDM on a software defined radio platform","authors":"Gayathri Kongara, J. Armstrong","doi":"10.1109/ATNAC.2016.7878825","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878825","url":null,"abstract":"This paper describes a software defined radio implementation of polynomial cancellation coded orthogonal frequency division multiplexing (PCC-OFDM) on an FPGA based universal software radio peripheral (USRP) reconfigurable input/output (RIO) hardware platform. Previous theoretical and simulation studies of PCC-OFDM have demonstrated that it is robust in the presence of many impairments including carrier frequency offset, multipath distortion and phase noise. The current work extends previous theoretical and simulation studies, by measuring real time performance on a USRP based prototyping testbed operating in an indoor radio environment. PCC-OFDM is compared with conventional cyclic prefix based OFDM implementation on the hardware, and it is shown that its robustness in the presence of frequency errors results in a significantly better error performance.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114494733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Packet Storage Time attack - a novel routing attack in Mobile Ad hoc Networks 分组存储时间攻击——移动自组织网络中一种新的路由攻击
L. Jim, M. Gregory
{"title":"Packet Storage Time attack - a novel routing attack in Mobile Ad hoc Networks","authors":"L. Jim, M. Gregory","doi":"10.1109/ATNAC.2016.7878795","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878795","url":null,"abstract":"The dynamic distributed topology of a Mobile Ad Hoc Network (MANET) provides a number of challenges associated with decentralized infrastructure where each node can act as the source, destination and relay for traffic. MANET's are a suitable solution for distributed regional, military and emergency networks. MANETs do not utilize fixed infrastructure except where connectivity to carrier networks is required and MANET nodes provide the transmission capability to receive, transmit and route traffic from a sender node to the destination node. In this paper we present a Packet Storage Time (PST) routing attack where an attacking node modifies its storage time and thereby does not forward packets to the intended recipient nodes. In the Human Immune System, cells are able to distinguish between a range of issues including foreign body attacks as well as cellular senescence. This paper presents an approach using an Artificial Immune System that mimics the strategy of the Human Immune System to identify the source of a PST routing attack.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of hierarchical caching systems with bandwidth constraints 带带宽约束的分层缓存系统性能分析
Valentin Burger, T. Zinner
{"title":"Performance analysis of hierarchical caching systems with bandwidth constraints","authors":"Valentin Burger, T. Zinner","doi":"10.1109/ATNAC.2016.7878818","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878818","url":null,"abstract":"The vast majority of Internet traffic is carried by content delivery networks. A high potential to bring content even closer to consumers and to reduce energy cost is achieved by the nano data center (NaDa) concept that has been proposed in recent work. In this approach the capacity available on small devices such as home gateways is used to support content delivery in an hierarchical caching system. In this work, we present a method to determine the efficiency of hierarchical content delivery networks with limited bandwidth, such as in the NaDa approach, analytically. We analyze the Internet Census Dataset to assess the number of available devices on autonomous system level. We evaluate the potential of hierarchical cache networks with bandwidth constraints to assist content delivery and determine its limits.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124944907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Should my toaster be polled? Towards an energy-efficient Internet of Things 我的烤面包机应该投票吗?迈向高能效的物联网
C. Gray, L. Campbell
{"title":"Should my toaster be polled? Towards an energy-efficient Internet of Things","authors":"C. Gray, L. Campbell","doi":"10.1109/ATNAC.2016.7878777","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878777","url":null,"abstract":"In the future Internet of Things, many common household devices will have communications interfaces added. We investigate energy-efficient design options for such communications interfaces in the Internet of Things through the example of a simple stock control application that may be commercially implemented. We have measured the power consumption of several popular wireless interfaces - 433 MHz module (RF433), Bluetooth, Wi-Fi and ZigBee - and we show how an energy-efficient communications paradigm can be designed in each case. This is a contribution to design guidelines for energy-efficient communication in the Internet of Things as it expands to encompass all consumer devices.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122324938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An enhanced implementation of a novel IoT joining protocol 一种新型物联网加入协议的增强实现
T. Steane, P. Radcliffe
{"title":"An enhanced implementation of a novel IoT joining protocol","authors":"T. Steane, P. Radcliffe","doi":"10.1109/ATNAC.2016.7878776","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878776","url":null,"abstract":"The ability to securely join IoT Devices to Wi-Fi networks is an on-going area of research. This paper describes how Nasrin & Radcliffe's theoretical “novel minimalist IoT network joining protocol” has been mapped to real world hardware and implemented using the Android operating system. For the first time the theory is proven to be practically viable but it is also shown that the user interface is not sufficiently simple for the everyday user. This paper proposes and implements a new user interface paradigm that dramatically simplifies the process and makes the joining process accessible to a much larger range of users. For intensely cost sensitive applications an alternative process is proposed that has the possibility of even further simplifying the user experience.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Application Performance Monitoring in Software Defined Networks 软件定义网络中的应用性能监控
Subramanyeswara Rao Dasari, G. Sasirekha
{"title":"Application Performance Monitoring in Software Defined Networks","authors":"Subramanyeswara Rao Dasari, G. Sasirekha","doi":"10.1109/ATNAC.2016.7878789","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878789","url":null,"abstract":"Application Performance Monitoring (APM) is crucial to any enterprise to ensure that the performance of its application or service is meeting the service level agreements. There is an inherent need for the APM of traditional networks to evolve, with the advances in the internet technologies. In this paper, we present a novel approach and framework for realizing a futuristic APM for Software Defined Networks (SDN). The approach is based on analyzing the Gartner's dimensions of APM, in the SDN scenario. The five distinct dimensions of APM as per Gartner's matrix are i) End User Experience monitoring. ii) Runtime application architecture discovery, modeling, and display. iii) User defined transaction profiling. iv) Component deep-dive monitoring in an application context. v) Reporting & application data analytics. The contributions of the paper are a) Mapping of APM dimensions to SDN measurements. b) An emulation framework development involving the identification of APIs for the measurements and capturing the measurements. c) Results depicting the feasibility of this approach.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116957675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distilling command and control network intrusions from network flow metadata using temporal PageRank 使用时态PageRank从网络流元数据中提取命令和控制网络入侵
Latchman Singh, A. Cheng
{"title":"Distilling command and control network intrusions from network flow metadata using temporal PageRank","authors":"Latchman Singh, A. Cheng","doi":"10.1109/ATNAC.2016.7878792","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878792","url":null,"abstract":"Malicious network intrusions which exfiltrate data from computer networks are extremely damaging for organisations and governments worldwide. Combating these network intrusions and large-scale cyber-attacks requires mining and analysis of large volumes of computer network data. We present a statistical filtering and temporal PageRank technique that improves the probability of discovering network intrusions. The technique filters out benign network data such that the data remaining is more pertinent and likely to contain malicious command and control (C2) traffic. We then propose a novel application of Google's PageRank algorithm by incorporating temporal analysis and evaluating a time-series of page rankings for identifying C2 like traffic. Two case studies using data collected at the gateway of an enterprise network and at the Internet backbone are presented to support our technique.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123693361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信