Proceedings of the 6th Asian Internet Engineering Conference最新文献

筛选
英文 中文
Independent DTNs message deletion mechanism for multi-copy routing scheme 多副本路由方案的独立dns消息删除机制
Proceedings of the 6th Asian Internet Engineering Conference Pub Date : 2010-11-15 DOI: 10.1145/1930286.1930293
Kaveevivitchai Sathita, H. Esaki
{"title":"Independent DTNs message deletion mechanism for multi-copy routing scheme","authors":"Kaveevivitchai Sathita, H. Esaki","doi":"10.1145/1930286.1930293","DOIUrl":"https://doi.org/10.1145/1930286.1930293","url":null,"abstract":"In this paper we discuss the independent message deletion mechanism for Delay Tolerant Networks (DTNs) multi-copy routing schemes, and the enhancement of this method with the knowledge of human mobility patterns. This mechanism can optimize the resource utilization and improve message delivery performance. In DTNs, communication is achieved by the movement of mobile devices and the ability to store-carry-and-forward the messages. Since contacts in this network occur opportunistically, multi-copy routing scheme suggests messages to be replicated, carried and forwarded by several devices to enhance the delivery ratio though it consumes greater resources compared to single-copy routing scheme. We propose the method to optimize the resource utilization in multi-copy routing scheme by efficiently deleting the copy of delivered message. This method reduces storage consumption, and avoids devices from wasting their bandwidth, and energy, hence, improves the performance of DTNs message delivery in multi-copy routing scheme. We have taken the intrinsic characteristic of human movements, known as, \"Human Gathering Points\" to enhance our proposed method. We evaluate the proposed method in the simulations with real human movement data trace on three major DTNs multi-copy routing schemes, Epidemic, Spray and Wait, and ProPHET. The result shows significant improvement in message delivery (10--50%) while reduces the resource consumption (overhead) by 30--70%. Its independent characteristic makes it possible to be applied with any multicopy routing protocol though the degree of impact is varied based on the underlying routing scheme.","PeriodicalId":321730,"journal":{"name":"Proceedings of the 6th Asian Internet Engineering Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114115926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Scalable network controlled handover with aggregated binding scheme in IP-based cellular networks 基于ip的蜂窝网络中基于聚合绑定的可扩展网络控制切换
Proceedings of the 6th Asian Internet Engineering Conference Pub Date : 2010-11-15 DOI: 10.1145/1930286.1930296
Alireza Taghizadeh, T. Wan, R. Budiarto
{"title":"Scalable network controlled handover with aggregated binding scheme in IP-based cellular networks","authors":"Alireza Taghizadeh, T. Wan, R. Budiarto","doi":"10.1145/1930286.1930296","DOIUrl":"https://doi.org/10.1145/1930286.1930296","url":null,"abstract":"Modern cellular wireless networks depend on IP-based technologies to accomplish their functions including IP-level Handover. IETF Proxy Mobile IPv6 (PMIPv6) has been chosen by wireless telecommunication industry to handle IP-level handover. PMIPv6 uses binding update between mobility agents to keep Mobile Node (MN) reachability during mobility session. Considering distance between these mobility agents, individual binding update could result excessive signal. To reduce this cost and increase scalability of IP-level handover procedures, here in this paper we extend PMIPv6 protocol with an Aggregated Proxy Binding Update (A-PBU) scheme. We also propose an algorithm to group MNs with imminent handover, based on link layer intelligence provided by IEEE 802.21 Media Independent Handover (MIH). A movement equation derived from Fluid-flow model has been used to estimate signaling cost of proposed A-PBU scheme. Quantitative results show a significant reduction in handover signaling cost comparing similar function in base protocol.","PeriodicalId":321730,"journal":{"name":"Proceedings of the 6th Asian Internet Engineering Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121851766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization of information diffusion model in future internet 未来互联网中信息扩散模型的可视化
Proceedings of the 6th Asian Internet Engineering Conference Pub Date : 2010-11-15 DOI: 10.1145/1930286.1930300
P. Limsaiprom, P. Tantatsanawong
{"title":"Visualization of information diffusion model in future internet","authors":"P. Limsaiprom, P. Tantatsanawong","doi":"10.1145/1930286.1930300","DOIUrl":"https://doi.org/10.1145/1930286.1930300","url":null,"abstract":"The Internet is radically changing the way from web 1.0, web 2.0 to web 3.0 in recent years and a new type of communications is on the rise, its call social network such as Facebook, Myspace, Skype and so on. There are many threats to an open Internet today. While the technical development of the Internet today has concentrated the awareness of several critical shortcomings in terms of performance, reliability, scalability, security and many other categories including societal, economical and business aspects. The rise of the Future Internet accelerates the creation of various large-scale social networks and considerable attention has been brought to social networks as an important medium for the information diffusion model, which could be used to describe the relationships and activities between human beings. The visualization of information diffusion model for Social Network in Future Internet is focused in this research. This research uses social network analysis (SNA) to analyze the key factors influencing information diffusion model about density, centrality and the cohesive subgroup, reveals useful insights which are the relationships and activities between human. The preprocessing with partitioning large-scale social networks is a clustering of the vertices in the network such that each vertex is assigned to exactly one cluster. The partitions store discrete characteristics of vertices. This research also presents each partitioning social network with visualization to show the information diffusion patterns of social network. They are applied as a guide to further investigation of social network behaviors to improve the security model and monitoring the risk for social networking in Future Internet.","PeriodicalId":321730,"journal":{"name":"Proceedings of the 6th Asian Internet Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126495792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TelescopeVisualizer: a real-time internet information visualizer with a flexible user interface visualizer:一个实时互联网信息可视化工具,具有灵活的用户界面
Proceedings of the 6th Asian Internet Engineering Conference Pub Date : 2010-11-15 DOI: 10.1145/1930286.1930289
Miyuru Dayarathna, Yasuhito Tsukahara, Kazunori Sugiura
{"title":"TelescopeVisualizer: a real-time internet information visualizer with a flexible user interface","authors":"Miyuru Dayarathna, Yasuhito Tsukahara, Kazunori Sugiura","doi":"10.1145/1930286.1930289","DOIUrl":"https://doi.org/10.1145/1930286.1930289","url":null,"abstract":"Visualizing the Internet activities has been an interesting and challenging research issue. Many successful efforts were concentrated around visualizing a single aspect of the Internet. However such fixed application user interfaces cannot cope with visualizing the diversity of network information and ever changing nature of the Internet. We present TelescopeVisualizer, a scalable real-time Internet information visualizer that allows for querying and visualizing multiple aspects of the Internet interactions. TelescopeVisualizer's XAML based flexible user interface avoids tight coupling of visualization application with the rest of the system making it possible to visualize Internet information in realtime. It allows users to upload custom query layouts, post queries and change the visualizations as they require. Using a query traffic generator application, we demonstrate scalability of TelescopeVisualizer system in different hardware platforms.","PeriodicalId":321730,"journal":{"name":"Proceedings of the 6th Asian Internet Engineering Conference","volume":"398 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131680174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DTN overlay on OLSR network OLSR网络上的DTN覆盖
Proceedings of the 6th Asian Internet Engineering Conference Pub Date : 2010-11-15 DOI: 10.1145/1930286.1930294
R. Pant, Apinun Tunpan, Preechai Mekbungwan, Rujipol Virochpoka, K. Kanchanasut
{"title":"DTN overlay on OLSR network","authors":"R. Pant, Apinun Tunpan, Preechai Mekbungwan, Rujipol Virochpoka, K. Kanchanasut","doi":"10.1145/1930286.1930294","DOIUrl":"https://doi.org/10.1145/1930286.1930294","url":null,"abstract":"Wireless Mobile Ad-hoc Networks (MANETs) are characterized by frequent and unpredictable disconnections, due to mobility, interference, power management or any other issues. Such disconnections result in the failure of MANET routing protocols that are designed to establish end-to-end paths between the communicating nodes. This work focuses on enhancing the performance of MANETs by integrating MANET routing using Optimized Link State Routing (OLSR) and Delay Tolerant Networking (DTN) based store and forwarding. Further, we provide support for device heterogeneity by not requiring all the nodes in the network to be DTN capable. The non-DTN capable nodes can use the store and forward functionality of other DTN nodes in the network to combat the effect of network partitioning. We define a DTN-based OLSR, DTS-OLSR, with a new routing and discovery mechanism based on Structured Mesh Overlay Network (SMON) to fulfill the objectives. As a proof of concept, we implement DTS-OLSR where it is demonstrated that our scheme is successful in dealing with the problem of network partitioning. Our architecture mainly targets networks that can tolerate delay but require high reliability such as an ad hoc network constructed in an emergency scenario.","PeriodicalId":321730,"journal":{"name":"Proceedings of the 6th Asian Internet Engineering Conference","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134403202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Providing a high-speed train with a broadband NEMO environment: a report of a field test using a train in service 提供具有宽带NEMO环境的高速列车:使用在役列车的现场测试报告
Proceedings of the 6th Asian Internet Engineering Conference Pub Date : 2010-11-15 DOI: 10.1145/1930286.1930295
T. Arita, F. Teraoka
{"title":"Providing a high-speed train with a broadband NEMO environment: a report of a field test using a train in service","authors":"T. Arita, F. Teraoka","doi":"10.1145/1930286.1930295","DOIUrl":"https://doi.org/10.1145/1930286.1930295","url":null,"abstract":"The goal of this research is to provide the mobile network installed in trains faster than 300 km/h with faster than 1 Gbps IPv6 connectivity and to achieve fast handover. For faster than 1 Gbps connectivity, infrared communication devices are employed. As the network mobility protocol in IPv6, NEMO Basic Support Protocol is adopted. This paper focuses on a fast handover mechanism in the network layer. For fast handover, a cross-layer architecture called CEAL is employed. The proposed fast handover mechanism was installed on Linux. As the first step of the goal, we had a field test using a train in service of JR-West (West Japan Railway Company). The speed of the train is 120--130 km/h. The total handover time is 124.0 msec in the best case. Bi-directional video streaming was also succeeded.","PeriodicalId":321730,"journal":{"name":"Proceedings of the 6th Asian Internet Engineering Conference","volume":"67 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132834787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cooperative multiple input multiple output communication in wireless sensor network: an error correcting code approach using LDPC code 无线传感器网络中协同多输入多输出通信:一种基于LDPC码的纠错码方法
Proceedings of the 6th Asian Internet Engineering Conference Pub Date : 2010-11-15 DOI: 10.1145/1930286.1930297
M. Islam
{"title":"Cooperative multiple input multiple output communication in wireless sensor network: an error correcting code approach using LDPC code","authors":"M. Islam","doi":"10.1145/1930286.1930297","DOIUrl":"https://doi.org/10.1145/1930286.1930297","url":null,"abstract":"Energy efficient data transmission is one of the key factors for energy constrained wireless sensor network (WSN). Cooperative communication explores the energy efficient wireless communication schemes between multiple sensors and data gathering node (DGN). In this paper, an energy efficient cooperative MIMO technique is proposed considering low density parity check (LDPC) codes. The result shows that the proposed cooperative communication outperforms SISO transmission considering the error correction code. Bit error rate (BER) analysis is also performed. In this work, it is shown that the lower encoding rate offers better error characteristics for same signal to noise ratio (SNR)","PeriodicalId":321730,"journal":{"name":"Proceedings of the 6th Asian Internet Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130945419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of bulk traffic mitigation practices in campus network 校园网中大流量缓解措施的评估
Proceedings of the 6th Asian Internet Engineering Conference Pub Date : 2010-11-15 DOI: 10.1145/1930286.1930288
Qianli Zhang, Jilong Wang, Xing Li
{"title":"Evaluation of bulk traffic mitigation practices in campus network","authors":"Qianli Zhang, Jilong Wang, Xing Li","doi":"10.1145/1930286.1930288","DOIUrl":"https://doi.org/10.1145/1930286.1930288","url":null,"abstract":"With the fast growing of internet, ISPs are faced with added challenges from unwanted bulk traffic. To deal with this problem, Tsinghua university implements bulk traffic mitigation practices to contain excessive use of bandwidth. Result indicates that current strategy can effectively decrease heavy use of bandwidth from aggressive applications. The strategy selection, effectiveness of the different practice and the selection of the quota limit are studied aided by the traffic statistics with and without these practices. Challenges to current bulk traffic mitigation practices are also discussed.","PeriodicalId":321730,"journal":{"name":"Proceedings of the 6th Asian Internet Engineering Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131759813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A service composition model for dynamic service creation and update in IMS/Web 2.0 converged environment 用于在IMS/Web 2.0融合环境中动态创建和更新服务的服务组合模型
Proceedings of the 6th Asian Internet Engineering Conference Pub Date : 2010-11-15 DOI: 10.1145/1930286.1930299
Cuiting Huang, N. Crespi
{"title":"A service composition model for dynamic service creation and update in IMS/Web 2.0 converged environment","authors":"Cuiting Huang, N. Crespi","doi":"10.1145/1930286.1930299","DOIUrl":"https://doi.org/10.1145/1930286.1930299","url":null,"abstract":"Relying on an IMS/Web 2.0 converged environment, this paper proposes an extensible service composition model which uses the concept of policy for encapsulating the service composition information. Then based on this model, the policy concept is enhanced by being divided into two types (abstract service policy and concrete service policy) for realizing the automatic service composition which mainly relates to the service update and service creation processes. Moreover, an active approach, a passive approach, and a hybrid approach are proposed for balancing the latency and real-time characteristic. With these enhancements, both user's experience and involvement are greatly improved, the service lifecycle is optimized, and the costs for service creation and maintenance are decreased.","PeriodicalId":321730,"journal":{"name":"Proceedings of the 6th Asian Internet Engineering Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115964003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards revealing JavaScript program intents using abstract interpretation 朝着使用抽象解释揭示JavaScript程序意图的方向发展
Proceedings of the 6th Asian Internet Engineering Conference Pub Date : 2010-11-15 DOI: 10.1145/1930286.1930298
Grégory Blanc, Y. Kadobayashi
{"title":"Towards revealing JavaScript program intents using abstract interpretation","authors":"Grégory Blanc, Y. Kadobayashi","doi":"10.1145/1930286.1930298","DOIUrl":"https://doi.org/10.1145/1930286.1930298","url":null,"abstract":"Everyday, millions of Internet users access AJAX-powered web applications. However, such richness is prone to security issues. In particular, Web 2.0 attacks are difficult to detect and block since it is similar to legitimate traffic. As a ground for our research, we review past related works and explain what might be missing to tackle Web 2.0 security issues. Especially, we show that tackling AJAX-based attacks often lacks a context that can only be conveyed during real-time analysis. In our research, we advocate the usage of abstract interpretation of JavaScript code to provide maximum coverage and to ensure completeness. Besides, we introduce a proxy-based proposal to provide analysis of JavaScript malware.","PeriodicalId":321730,"journal":{"name":"Proceedings of the 6th Asian Internet Engineering Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132268355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信