{"title":"A SIP Message Overload Transfer Scheme","authors":"Fuquan Geng, Jun Wang, L. Zhao, Guang-xing Wang","doi":"10.1109/CHINACOM.2006.344656","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344656","url":null,"abstract":"As SIP is more and more used in IMS network as a session signaling protocol, certain nodes on the signaling layer have to process a large number of SIP messages. Chances are that disruptions may be caused in them by extremely high volume of messages. This paper introduces a concept for efficient SIP message routing and user assignment. The SIP message overload transfer scheme is defined that has two major advantages over existing persistent hash routing. The content or user location in the scheme is arbitrary and it provides overload and backup routing capabilities.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114284775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified Ant Colony Algorithm for Multi-constraint Multicast Routing","authors":"Hua Wang, Zhao Shi, Jun Ma","doi":"10.1109/CHINACOM.2006.344753","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344753","url":null,"abstract":"This paper proposes a modified ant colony algorithm and applies it to multi-constraint multicast routing problem. This modified algorithm adds the orientation factor to the basic ant colony algorithm, which enables the ant to get rid of the initial blindness when searching paths. This makes use of the search results and reduces the misguiding function of pheromone on irrelevant paths, thus overcoming the drawbacks of slow convergence existing in the basic ant colony algorithm. The simulation results show that the accuracy and convergence speed of the modified algorithm are better than those of the basic ant colony algorithm.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126332420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Moussakhani, S. M. Safavi, H. Ebrahimzad, A. Ghazisaeidi
{"title":"A Probabilistic Signature Scheme to Provide Authentication Through a Hash Chain","authors":"B. Moussakhani, S. M. Safavi, H. Ebrahimzad, A. Ghazisaeidi","doi":"10.1109/CHINACOM.2006.344716","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344716","url":null,"abstract":"In this paper, we propose and analyze a two dimensional scheme of hash sequence. The proposed structure can be applied to every protocol using hashed value for providing authentication in a route. For example, this work can be considered as an extension to SEAD (secure efficient ad hoc distance vector routing) to prevent same distance fraud problem in this kind of secure routing. Two dimensional hash chains in this scenario serve as a kind of signature for authentication and defending against attacks on the integrity of routing data. Since our proposed scheme employs a probabilistic signature assignment, it is sensitive to sign-forging. Our main concern is to obtain sign-forging probability. To provide a general view, we have considered the problem in a mobility condition.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126551057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Web Services-Based Dynamically Cooperative Network Management Architecture","authors":"Zhang Yue, Qiu Xue-song, Meng Luo-ming","doi":"10.1109/CHINACOM.2006.344782","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344782","url":null,"abstract":"Heterogeneous network devices and management technologies bring many different kinds of network management systems. In traditional layered network management architecture, cooperation mechanism is not efficient enough for different network management systems to interact and cooperate with each other flexibly. Comprehensive network management tasks cannot be timely accomplished to meet with constantly evolving business requirements. Web services, widely deployed in system integration, are recently introduced to network management field. Based on Web services, we provide management functions of network management systems as network management services and propose a Web services-based dynamically cooperative network management architecture. Key technologies may be used in our proposed architecture such as description methods for manageable resources and management services, and service composition technologies are discussed in detail. With our proposed architecture, legacy systems can be integrated in an evolving way and more flexible management can be achieved.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126758122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Attacking Track in Wireless Sensor Network","authors":"N. Qin, Baoguo Xu","doi":"10.1109/CHINACOM.2006.344887","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344887","url":null,"abstract":"This paper studies the coverage from the reverse standpoint, and addresses the issue how to design an \"attacking track\" to ensure that attacker drills through the region in security and speed (shortened form SS capability), where a number of sensors are deployed to detect illegal intruder. Not only does this track offers the attacker a right path, it also contributes to the user for future deployment. A joint security and speed heuristic algorithm (SS algorithm) is proposed, which enjoys lower computational load than traditional algorithms. Furthermore, we give a practical definition of the parry probability (or un-detected probability) based on an interesting discerning process, and also introduce the novel metrics, called as integrated gain, to measure the SS capability.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chunying Tian, Shanzhi Chen, Yuhong Li, Yaning Liu
{"title":"Experimental Study of MPLS and MIPv6 Integration Technology","authors":"Chunying Tian, Shanzhi Chen, Yuhong Li, Yaning Liu","doi":"10.1109/CHINACOM.2006.344758","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344758","url":null,"abstract":"In this paper, the prototype system of the integration of MPLS and MIPv6 (mobile IPv6), and a test network supporting both MIPv6 and MPLS are presented; and the performance of the applications running on the test network is evaluated. The testing results indicate that the integrated network can achieve better RTT, jitter, loss rate, data transmission rate and handover delay than a non-integrated network. Nevertheless, with the variation of the background payloads, the improvements on the performance of the integrated network are not obvious and in some cases even worse than non-integrated network.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Urban Macrocellular Model for MIMO Wireless Systems","authors":"G. Zhang, X. Gu, X.-H. Peng","doi":"10.1109/CHINACOM.2006.344714","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344714","url":null,"abstract":"We present an improved model for outdoor MIMO wireless channels and its spatial fading correlation and capacity performances. The proposed model is more representative than the traditional independently and identically distributed (i.i.d) model by considering the remote scatterers on top of the \"one-ring\" model. We consider both local and remote scatterers with respect to the receiver for modeling the urban macrocellular wireless environment. The channel capacity for a given structure of scatterers and a set of physical parameters including the antenna pattern and propagation loss has been investigated. As a result, the fading correlation is expressed as a function of the scattering characteristics as well as the propagation parameters of the MIMO channels. We provide detailed analysis on the effect of correlation due to the increased number of scatterers and the capacity results obtained via extensive simulations. Using the proposed model we show the combined correlation and scattering effect on the capacity of MIMO systems and the difference on the capacity performance between the proposed macrocellular model and the \"one-ring\" model.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123888069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Semantic Representation of WSPL in OWL-DL","authors":"Bai Dong-wei, Peng Yong, Yao Zhao, Chen Jun-liang","doi":"10.1109/CHINACOM.2006.344896","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344896","url":null,"abstract":"With the wide application of Web services, people now pay more attention to the non-functional properties of Web services such as quality of service (QoS), security, etc. in discovery and selection. As a Web services policy language, Web Services Policy Language (WSPL) is widely used for expressing non-functional properties of Web services. However, this proposed language is based on XML schema, which is relatively inexpressive and suffers from a lack of formal semantics. In this paper, we provide a semantic representation of WSPL in the description logic fragment species of the Web Ontology Language (OWL-DL). OWL-DL will provide the semantic support for the policy description of WSPL, and enhance the expressivity and computability of the policy language. By representing WSPL policies as OWL-DL complex classes that are built up through OWL-DL class expressions, the most standard OWL-DL reasoners can be used to check policy conformance and perform an array of policy analysis tasks through TBox reasoning.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127873859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Downlink MMSE Transceiver Optimization with Layer-MSE Requirements","authors":"Shuying Shi, M. Schubert, H. Boche","doi":"10.1109/CHINACOM.2006.344646","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344646","url":null,"abstract":"This paper develops new algorithms for linear transceiver design for multiuser MIMO systems. Based on MSE duality, we derive new algorithms for the problem of min-max relative layer-MSE (the ratio of the layer-MSE to the given requirement) and the problem of layer-MSB constrained power minimization. The proposed algorithms differ from the previous work in the way that the layer-MSE is handled directly, therefore different requirements for different data streams (layers) are possible for the min-max problem. Furthermore, the algorithms have very low complexity and are proved to be convergent. The proposed schemes do not impose any restrictions on the number of antennas.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121182341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity Analysis of Enhanced MAC in IEEE 802.11n","authors":"L. Cai, Xinhua Ling, X. Shen, J. Mark, Hua Long","doi":"10.1109/CHINACOM.2006.344780","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344780","url":null,"abstract":"An analytical model for studying the access point (AP)-bottleneck effect of infrastructure wireless local area networks (WLANs) is developed. We extend the analytical model to investigate the performance of some enhanced MAC mechanisms in IEEE 802.11n. Two new aggregation schemes are also proposed and compared with previous schemes. We show that these MAC enhancements can effectively improve the network capacity by not only reducing the protocol overheads, but also smoothing the AP-bottleneck effect. Voice capacity of an IEEE 802.11n WLAN using different MAC mechanisms are presented as well.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121267615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}