Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium最新文献

筛选
英文 中文
IPv6 tutorial
Janos Mohacsi
{"title":"IPv6 tutorial","authors":"Janos Mohacsi","doi":"10.1109/eit.2010.5612092","DOIUrl":"https://doi.org/10.1109/eit.2010.5612092","url":null,"abstract":"","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Carrier Ethernet transport in metro and core networks 城域网和核心网中的载波以太网传输
C. Gruber, A. Autenrieth
{"title":"Carrier Ethernet transport in metro and core networks","authors":"C. Gruber, A. Autenrieth","doi":"10.1109/NETWKS.2008.4763766","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763766","url":null,"abstract":"Presents a 130-slide tutorial on Carrier Ethernet Transport (CET). CET is not a single technology but a multilayer network architecture. It enables predictable packet transport networks and combines flexible electronic packet layer with cost-efficient optical layer. CET provides efficient multilayer traffic engineering (IP, Ethernet, NG-SDH/SONET, OTH/WDM)along with eEfficient end-to-end Quality of Service (QoS) and resilience and native transport of layer 2 services. CET's main forwarding technologies are: MPLS-TP, PBB-TE, ELS. The tutorial covers: Operator Requirements for Transport Networks; Ethernet Basics; Carrier Ethernet Evolution; Carrier Ethernet Transport Technologies; Carrier Ethernet Transport Network Architecture & Solutions; and Outlook Towards Future Internet Architectures.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125977695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling and simulation techniques to optimize costs of migrating to NGNs 建模和仿真技术优化迁移到ngn的成本
D. Mongeau, J. W. McKnight, J. Schaefer, P. P. Wu
{"title":"Modeling and simulation techniques to optimize costs of migrating to NGNs","authors":"D. Mongeau, J. W. McKnight, J. Schaefer, P. P. Wu","doi":"10.1109/NETWKS.2008.6231319","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.6231319","url":null,"abstract":"Migrating to next-generation networks (NGNs) presents challenges that are quite distinct from those to designing and deploying the networks. The challenges are distinguished first and foremost by touching subscribers and second by being highly resource-intensive. The first attribute drives a need for precise, reliable migration planning, so that the actual subscriber moves will be executed flawlessly. The second attribute drives a need for a detailed understanding of cost-bearing activities in the scope of migration. Together they create a high level of execution complexity. Just think of the large number of complex interdependencies related to migrating thousands of switch centers, night after night, moving millions of subscribers over a period of two to three years. This paper addresses the problems of how to understand and manage these complexities and to optimize the associated costs, when migrating to NGN and mobile broadband. It promotes the use of advanced process engineering, modeling and simulation techniques as sources of solutions to these problems. Four modeling and simulation techniques are presented. Each is the result of a decision or trade-off a network operator has faced in undertaking a migration program. These techniques have helped to accelerate decision-making and reduce risks to operators' businesses and customers.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Engineering in case of interconnected and integrated layers 层互联、层集成情况下的流量工程
P. Hegyi, T. Cinkler, N. Sengezer, Ezhan Karasan
{"title":"Traffic Engineering in case of interconnected and integrated layers","authors":"P. Hegyi, T. Cinkler, N. Sengezer, Ezhan Karasan","doi":"10.1109/NETWKS.2008.4763708","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763708","url":null,"abstract":"In this paper, we compare two routing scenarios for grooming-capable optical-beared two-layer networks that are capable of meeting the Traffic Engineering (TE) objectives. The first one applies completely dynamic WDM layer that adapts instantly to all traffic changes. The second one is based on fixed WDM topology (“lower layer”). To achieve the best performance, the fixed lightpath system is optimized in advance according to the characteristics of the expected traffic. In both cases, the upper layer is assumed to be dynamic. We perform extensive simulations to compare these two multi-layer Routing and Traffic Engineering approaches that are currently both of particular practical interest with their inherent advantages and drawbacks.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121684210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis and improvement of transport protocol fairness 传输协议公平性的分析与改进
D. Tegze, C. Horváth, G. Hosszú, F. Kovács
{"title":"Analysis and improvement of transport protocol fairness","authors":"D. Tegze, C. Horváth, G. Hosszú, F. Kovács","doi":"10.1109/NETWKS.2008.4763739","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763739","url":null,"abstract":"Fundamental congestion control methods of Internet are based on reactive methods. The principle of these algorithms is the closed loop control of control theory, namely they measure parameters of the network and feed some information back to the sender. This feedback determinates the sending rate of competing flows. Currently most methods make use of per-flow feedback. This type of feedback cannot give strict guarantees on fair allocation of network resources inherently. One of the most important design and operational objective of transport protocols is the fair and efficient utilization of network resources. This is the main motivation for performance analysis of transport protocols. This paper presents the newly developed control method called Balancer that is designed to provide fair bandwidth allocation for transport layer data flows. The mechanism is implemented in the SimCast simulation environment. The method is based on the global knowledge of outgoing sending rate of controlled flows. The paper demonstrates the basics of this endpoint based congestion control. We prove the efficiency of the developed method through simulation results.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126463360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and simulation of the performance of distributed video services 分布式视频业务性能的建模与仿真
P. Kárpáti, Tibor Szkaliczki, Laszlo Boszirmenyi
{"title":"Modeling and simulation of the performance of distributed video services","authors":"P. Kárpáti, Tibor Szkaliczki, Laszlo Boszirmenyi","doi":"10.1109/NETWKS.2008.5496392","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.5496392","url":null,"abstract":"To characterize the potential performance of servers regarding their services (e.g. for comparison issues) we need to extract the essential features of the underlying networks. Two network models are presented which serve as base for performance evaluation of VoD servers. The first one is a formal model focusing on LANs which contains mathematical functions characterizing the infrastructure and possible throughput of a server. The second one is part of a simulation environment which enables the comparison of video servers. At the end of the paper, a short summary of a performance study is presented as a demonstration which introduces some network related metrics as well.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"Supplement 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Precise location prediction algorithms using improved random walk-based and generalized Markovian mobility models 基于改进随机行走和广义马尔可夫移动模型的精确位置预测算法
Károly Lendvai, P. Fulop, S. Szabó, T. Szálka
{"title":"Precise location prediction algorithms using improved random walk-based and generalized Markovian mobility models","authors":"Károly Lendvai, P. Fulop, S. Szabó, T. Szálka","doi":"10.1109/NETWKS.2008.4763675","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763675","url":null,"abstract":"As in recent 3G UMTS networks the number of users is increasing dynamically and the packet-switched data transfer become dominant, the network providers and operators face the increasing complexity of the network management and operation tasks.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129878741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A practical approach to network planning using both operational and optimization tools 使用操作和优化工具进行网络规划的实用方法
N. Perrot, V. Chandrakumar, L. Burity, S. Nicaisse
{"title":"A practical approach to network planning using both operational and optimization tools","authors":"N. Perrot, V. Chandrakumar, L. Burity, S. Nicaisse","doi":"10.1109/NETWKS.2008.4763734","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763734","url":null,"abstract":"This paper proposes to use operational tool in addition to optimization tools in network planning. Thus, the proposed approach takes into account not only network planning objectives but also operational constraints and company policies during the network planning process. As a result, network evolution can globally be optimized by including additional network cost, migration cost, operational cost, etc.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134145687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An advanced timing attack scheme on RSA 一种针对RSA的高级定时攻击方案
Rudolf Tóth, Z. Faigl, M. Szalay, S. Imre
{"title":"An advanced timing attack scheme on RSA","authors":"Rudolf Tóth, Z. Faigl, M. Szalay, S. Imre","doi":"10.1109/NETWKS.2008.4763727","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763727","url":null,"abstract":"This paper describes an advanced timing attack scheme on cryptographic algorithms. An attacker can use our method to break a cryptographic algorithm by reconstructing the secret key. The paper contains a detailed explanation of our novel algorithm, furthermore, a practical example for its use. As a proof-of-concept, the method is shown on a specific implementation of the RSA algorithm revealing a 128-bit secret key. Timing attacks assume that the attacker has partial or full knowledge of the internal structure of the attacked algorithm and have gathered time-specific information on a number of known messages, that were encrypted or decrypted with the specific key. In our simplified proof-of-concept example, the attacker knows the total number of extra-reduction steps of the Montgomery multiplication in the RSA for a number of known messages. We demonstrate in practice how this information can be used to achieve complete and fast key recovery with statistical tools, i.e. analysis of variance (ANOVA) and t-test. Similar timing attacks have already been presented by others, however to our knowledge, none of them applied these statistical tools in their methods with such efficiency, and showed the complete recovery in practice by attacking the Montgomery multiplication. However, this is not the main contribution of the paper. The main contribution is, that we have introduced the new concept of key trees and goodness values, which lets the recovery algorithm examine only a very small key space, even if the decision criteria for guessing the key bits are highly biased. This concept can be extended to any other timing attack.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133314594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Understanding the impacts of short-term dynamics on long-term fairness of competing high speed TCP flows: A root-cause analysis 理解短期动态对竞争的高速TCP流的长期公平性的影响:根本原因分析
Balázs Sonkoly, T. Trinh, S. Molnár
{"title":"Understanding the impacts of short-term dynamics on long-term fairness of competing high speed TCP flows: A root-cause analysis","authors":"Balázs Sonkoly, T. Trinh, S. Molnár","doi":"10.1109/NETWKS.2008.4763740","DOIUrl":"https://doi.org/10.1109/NETWKS.2008.4763740","url":null,"abstract":"The short-term dynamics of competing high speed TCP flows can have strong impacts on their long-term fairness. This leads to severe problems for both the co-existence and the deployment feasibility of different proposals for the next generation networks. However, to our best knowledge, no root-cause analysis of the observation is available. In this paper, we try to fill this gap by providing an in-depth root-cause analysis of this phenomenon. We demonstrate that the widely used Jain's index as a fairness metric can not provide sufficient characterization of the phenomena. More precisely, Jain's index does not reflect the dynamic flow behaviors, e.g., starting time of the flows. We provide an analytical and simulation study to show the importance of the flow dynamics on fairness. We also propose a new metric called saturation time for fairness characterization. Both AIMD-based (HighSpeed TCP, BIC TCP) and MIMD-based (Scalable TCP) TCP versions are investigated in different topologies, namely dumb-bell and parking-lot topologies. In extreme cases, we also analyze and explain the “starving” effect of competing high speed TCP flows, when a flow forces other flows to deviate from their proper operation.","PeriodicalId":442274,"journal":{"name":"Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133376325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信