{"title":"Maintaining a Secure Global Enterprise: Challenges and Emerging Solutions","authors":"S. Latif","doi":"10.1109/INCC.2008.4562676","DOIUrl":"https://doi.org/10.1109/INCC.2008.4562676","url":null,"abstract":"This talk will focus on analysis of the challenges and risks to maintaining a secure global enterprise network. It will give an overview of emerging solutions and approaches to mitigate such risks.","PeriodicalId":339313,"journal":{"name":"2008 IEEE International Networking and Communications Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133597944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Developing Mobile Code for Resource Constrained Wireless Networks","authors":"M. Sohail","doi":"10.1109/INCC.2008.4562695","DOIUrl":"https://doi.org/10.1109/INCC.2008.4562695","url":null,"abstract":"This work aims to introduce a novel robust paradigm for mobile communication and network management for resource constrained communication networks. The paradigm introduced in this paper is based on the innovative idea of Mobile Code which has been implemented on a test bed at the Adaptive Risk Management (ARM) Laboratory at the University of New Brunswick (UNB) [1]. Networks based on Information and Communication Technology (ICT) are revolutionizing the world and their perpetuation is leading to the dependence of critical infrastructures on the reliability of these networks, the integrity of the information flowing and stored on these networks, and on the availability of these information networks through the Internet [2]. In order to deal with this, the idea of Mobile Code is introduced in this paper as the relatively new concept of real-time in-Network programming that occurs when certain conditions are met. Through the application of the Mobile Code approach networks of networks [3] can achieve an increase in resilience from failure due to attacks and furthermore, attain self- management capabilities which is a much needed characteristic in today's Network Systems and protocols.","PeriodicalId":339313,"journal":{"name":"2008 IEEE International Networking and Communications Conference","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127708141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy-efficient Signaling and Detection Scheme for Transmitted Reference UWB Systems","authors":"M.G. Khan, J. Nordberg, I. Claesson","doi":"10.1109/INCC.2008.4562684","DOIUrl":"https://doi.org/10.1109/INCC.2008.4562684","url":null,"abstract":"The transmitted reference (TR) schemes do not require the complex task of channel estimation and provide a simple receiver structure. However, the low-complexity detection in conventional TR scheme is achieved at the expense of 50% energy/rate loss. In this paper, an energy-efficient TR signaling and detection scheme is presented with the aim to improve the performance of conventional TR impulse radio UWB system. The proposed scheme is a combination of the conventional TR scheme and the differential TR scheme. The simulation results validate that the proposed TR scheme utilizes 1.76 dB less energy per bit and recovers 25% rate loss of conventional TR scheme, while maintaining the same BER performance. Further, the proposed ATR scheme improves the BER performance by about 2 dB using simple averaging of the reference pulses.","PeriodicalId":339313,"journal":{"name":"2008 IEEE International Networking and Communications Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124503561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing Femto Cell Throughput with HSDPA Using Higher Order Modulation","authors":"T. Nihtila","doi":"10.1109/INCC.2008.4562690","DOIUrl":"https://doi.org/10.1109/INCC.2008.4562690","url":null,"abstract":"In femto base station concept homes and small offices can be equipped with very low transmission power base stations to offer users high signal to interference and noise ratios (SINR) due to the close proximity of the base station unit. In the first release of high speed downlink packet access (HSDPA) specification the highest supported modulation scheme, 16 quadrature amplitude modulation (16QAM), might not be efficient enough to fully exploit the superior signal quality offered by the femto base stations making the use of a higher order modulation desirable. This paper presents a performance evaluation of using higher order modulation scheme, namely 64QAM, with HSDPA in a combined single frequency macro and femto cell scenario with advanced receivers used at mobile terminals. The impact of femto cells and 64QAM is also analyzed as a function of indoor user penetration. The analysis is done using dynamic system level simulations.","PeriodicalId":339313,"journal":{"name":"2008 IEEE International Networking and Communications Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120851991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Saleem, A.A. Ikram, B. Bazuin, S.I. Shah, Z. Saleem
{"title":"Design and Implementation of a Software Radio based WiMAX Communication System using LabVIEW","authors":"A. Saleem, A.A. Ikram, B. Bazuin, S.I. Shah, Z. Saleem","doi":"10.1109/INCC.2008.4562688","DOIUrl":"https://doi.org/10.1109/INCC.2008.4562688","url":null,"abstract":"This paper presents the design and implementation of a software defined radio for the physical layer implementation of WiMAX using LabVIEW on NI PCI-5640R card which features a Xilinx Virtex-II FPGA. This work focuses on two important aspects of communications, WiMAX standard and the OFDM technique. The results show successful operation of the software, that uses part of the algorithm on a PC and part on the FPGA board.","PeriodicalId":339313,"journal":{"name":"2008 IEEE International Networking and Communications Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125295339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Processors: Evolution and Recent Trends","authors":"Nazar Zaidi","doi":"10.1109/INCC.2008.4562670","DOIUrl":"https://doi.org/10.1109/INCC.2008.4562670","url":null,"abstract":"Summary form only given. This tutorial present an introduction to network processors and their evolution over the years. Application and benefits of the network processors was discussed. A comparison of the current offerings and trends conclude the presentation.","PeriodicalId":339313,"journal":{"name":"2008 IEEE International Networking and Communications Conference","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low correlation interleaved QAM sequences","authors":"G. Garg, P. V. Kumar, C. Madhavan","doi":"10.1109/ISIT.2008.4595326","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4595326","url":null,"abstract":"A low correlation interleaved QAM sequence family is presented here. In a CDMA setting, these sequences have the ability to transport a large amount of data as well as enable variable-rate signaling on the reverse link. The new interleaved selected family INQ has period N, normalized maximum correlation parameter thetasmacrmax bounded above by lsim a radicN, where a ranges from 1.17 in the 16-QAM case to 1.99 for large M2-QAM, where M = 2m, m ges 2. Each user is enabled to transfer m + 1 bits of data per period of the spreading sequence. These constructions have the lowest known value of maximum correlation of any sequence family with the same alphabet.","PeriodicalId":339313,"journal":{"name":"2008 IEEE International Networking and Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130561268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convergence Evaluation of a Variable Step-Size LMSE Adaptive Switching Algorithm","authors":"S. Jimaa, T. Shimamura, H. Takekawa","doi":"10.1109/INCC.2008.4562685","DOIUrl":"https://doi.org/10.1109/INCC.2008.4562685","url":null,"abstract":"A simple and robust variable step-size normalized switching adaptive algorithm is proposed here. The use of variable step-size in the adaptation process of least mean switched error (LMSE) algorithm (VSS-LMSE) is investigated. The switching algorithm consists of applying the least mean fourth (LMF) algorithm and switching to the least mean square (LMS) algorithm when the absolute value of error is greater than 1. The LMSE algorithm with a fixed step-size usually results in a trade-off between the residual error and the convergence speed of the algorithm. The VSS-LMSE algorithm presented here will eliminate much of this trade-off. In this paper the MSE of using the VSS-LMSF algorithm in the adaptation process of system identification over a dispersive channel is investigated. The step-size variation makes it possible for the VSS-LMSE algorithm to converge faster and to a lower steady state error than in the fixed step-size case. Moreover the proposed VSS-LMSE algorithm has a much lower steady state error than that in the case of VSS-NLMS algorithm.","PeriodicalId":339313,"journal":{"name":"2008 IEEE International Networking and Communications Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134070533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sohail, Aasia Khanum, M. Sarfraz, Javeria Sana, Umber Iqbal
{"title":"Fuzzy Bandwidth Broker: Machine Learning Based Approach to Resolve Architectural Issues","authors":"S. Sohail, Aasia Khanum, M. Sarfraz, Javeria Sana, Umber Iqbal","doi":"10.1109/INCC.2008.4562689","DOIUrl":"https://doi.org/10.1109/INCC.2008.4562689","url":null,"abstract":"His paper proposes a novel idea of using fuzzy logic for architectural and resource management aspects of the bandwidth broker. The scalability problem of bandwidth broker, being a centralised resource manager in a domain, can be solved by employing a distributed architecture. The decisions regarding the distributed architecture, namely, number and location of distributed entities can be best solved using computational intelligence. This paper focuses on the fuzzy logic based approach for resolving architectural issues of bandwidth broker. In addition, we also propose two phase resource allocation algorithm for bandwidth broker. In first phase, when large amount of resources are available, fuzzy logic is used for decision making to reduce processing overhead. In case of low resource availability, the resource allocation algorithm transitions to second phase, where crisp values are used for decision purpose.his paper proposes a novel idea of using fuzzy logic for architectural and resource management aspects of the bandwidth broker. The scalability problem of bandwidth broker, being a centralised resource manager in a domain, can be solved by employing a distributed architecture. The decisions regarding the distributed architecture, namely, number and location of distributed entities can be best solved using computational intelligence. This paper focuses on the fuzzy logic based approach for resolving architectural issues of bandwidth broker. In addition, we also propose two phase resource allocation algorithm for bandwidth broker. In first phase, when large amount of resources are available, fuzzy logic is used for decision making to reduce processing overhead. In case of low resource availability, the resource allocating algorithm transitions to second phase, where crisp values are used for decision purpose.","PeriodicalId":339313,"journal":{"name":"2008 IEEE International Networking and Communications Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133182071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On End-to-End Mobility Management in 4G Heterogeneous Wireless Networks","authors":"M. Yousaf, Amir Qayyum","doi":"10.1109/INCC.2008.4562703","DOIUrl":"https://doi.org/10.1109/INCC.2008.4562703","url":null,"abstract":"With the advent of modern technology, mobile devices with multi homed capabilities are proliferating. Existence of different network interfaces in multi homed devices enables them to seamlessly roam across heterogeneous networks. These vertical handovers however, causes to affect the TCP connections. Many solutions exist that handle this problem caused by mobility of the nodes. However, current mobility management solutions either require support of additional entities in the network or require changes in current implementation of TCP. This paper argues that mobility management service can effectively be provided without requiring the support of additional entities in the network and without changing the current implementation of TCP. On the basis of this principle, we present an end-to-end mobility management framework (EMF) that overcomes the limitations of current mobility management solutions and provides a richer set of mobility services such as location updates, soft handover, willful handover, etc.","PeriodicalId":339313,"journal":{"name":"2008 IEEE International Networking and Communications Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}