首页 > 最新文献

2008 Third International Conference on Systems and Networks Communications最新文献

英文 中文
A Simple Computer Design with Monitor Interface: Integrating Hardware and Software in Early Research in Computer Science 具有监控界面的简单计算机设计:计算机科学早期研究中的软硬件集成
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.57
H. Farhat
In computer science, the introduction of CAD tools and programmable logic devices makes it feasible to complete the design of a functioning computer during a second course in the hardware track. In earlier we presented a simple instruction set and gave a complete single cycle design as part of grant for early research in computer science. For this we used the Altera CAD package and the UP2 board. The contribution of this paper is to expand on previous work. We adopt a similar instruction set as done in earlier paper. here, however, we interface the design to include a computer monitor. The complete computer design with monitor interface at an early stage in computer science education helps in introducing research early in the curricula.
在计算机科学中,CAD工具和可编程逻辑器件的引入使得在硬件轨道的第二门课程中完成功能计算机的设计成为可能。在早些时候,我们展示了一个简单的指令集,并给出了一个完整的单周期设计,作为计算机科学早期研究的一部分。为此,我们使用了Altera CAD包和UP2板。本文的贡献是对以往工作的扩展。我们采用了与前面文章中类似的指令集。然而,在这里,我们将设计接口包括一个计算机显示器。在计算机科学教育的早期阶段,完整的带有监控界面的计算机设计有助于在课程的早期引入研究。
{"title":"A Simple Computer Design with Monitor Interface: Integrating Hardware and Software in Early Research in Computer Science","authors":"H. Farhat","doi":"10.1109/ICSNC.2008.57","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.57","url":null,"abstract":"In computer science, the introduction of CAD tools and programmable logic devices makes it feasible to complete the design of a functioning computer during a second course in the hardware track. In earlier we presented a simple instruction set and gave a complete single cycle design as part of grant for early research in computer science. For this we used the Altera CAD package and the UP2 board. The contribution of this paper is to expand on previous work. We adopt a similar instruction set as done in earlier paper. here, however, we interface the design to include a computer monitor. The complete computer design with monitor interface at an early stage in computer science education helps in introducing research early in the curricula.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128574682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of User Experience of Access Selection in Multi-operator Environments 多运营商环境下接入选择的用户体验分析
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.54
Petteri Pöyhönen, J. Markendahl, O. Strandberg
In future wireless systems can ambient networks technology enable the users to utilize a multitude of networks. Frequent roaming between networks will be a key characteristic of mobile services and the terms "home" and "visited" networks will be common also at local and national level. In this paper we will investigate cooperation between operators and what benefits the end users can expect. Ambient Networks concepts include new advertising, attachment and composition functionalities providing a set of tools that enable dynamic connectivity establishment. Especially end-user preferences can be taken into account during the evaluation and selection of access networks. The impact of cooperation in the multi-operator environment is analyzed in a scenario with operators that have partially overlapping radio coverage, set of provided services and a large number of moving user terminals. The results indicate substantial gains with cooperation; both for overall network utilization and for the end-user "up-time". In order to describe the end-user perception we use a performance metric called user satisfaction index (USI) proposed in the ambient networks project.
在未来的无线系统中,环境网络技术可以使用户能够利用多个网络。网络之间的频繁漫游将是移动服务的一个关键特征,“家庭”和“访问”网络这两个术语在地方和国家层面也将是常见的。在本文中,我们将研究运营商之间的合作以及最终用户可以期望的利益。Ambient Networks的概念包括新的广告、附件和组合功能,提供了一套能够建立动态连接的工具。特别是在评估和选择接入网时,可以考虑终端用户的偏好。在运营商无线电覆盖部分重叠、提供的业务集合和大量移动用户终端的场景下,分析了多运营商环境下合作的影响。结果表明,合作取得了实质性成果;对于整体网络利用率和最终用户的“正常运行时间”都是如此。为了描述终端用户的感知,我们使用了环境网络项目中提出的一种称为用户满意度指数(USI)的性能指标。
{"title":"Analysis of User Experience of Access Selection in Multi-operator Environments","authors":"Petteri Pöyhönen, J. Markendahl, O. Strandberg","doi":"10.1109/ICSNC.2008.54","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.54","url":null,"abstract":"In future wireless systems can ambient networks technology enable the users to utilize a multitude of networks. Frequent roaming between networks will be a key characteristic of mobile services and the terms \"home\" and \"visited\" networks will be common also at local and national level. In this paper we will investigate cooperation between operators and what benefits the end users can expect. Ambient Networks concepts include new advertising, attachment and composition functionalities providing a set of tools that enable dynamic connectivity establishment. Especially end-user preferences can be taken into account during the evaluation and selection of access networks. The impact of cooperation in the multi-operator environment is analyzed in a scenario with operators that have partially overlapping radio coverage, set of provided services and a large number of moving user terminals. The results indicate substantial gains with cooperation; both for overall network utilization and for the end-user \"up-time\". In order to describe the end-user perception we use a performance metric called user satisfaction index (USI) proposed in the ambient networks project.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129800578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
GEMOM - Significant and Measurable Progress beyond the State of the Art GEMOM -超越技术水平的重大和可衡量的进展
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.33
H. Abie, I. Dattani, M. Novkovic, J. Bigham, Shaun Topham, R. Savola
GEMOM (Genetic Message Oriented Secure Middleware) is an EU FP7 ICT project that focuses on the significant and measurable increase in the end-to-end intelligence, security and resilience of complex, distributed information systems. Complex, distributed software systems are virtually impossible to implement without heavy use of messaging infrastructure. While the existing state of the art achieves arbitrary resilience by a brute-force approach, self-healing is either rudimentary or non-existent. GEMOM, with its fluid, resilient, self-healing and adaptive messaging allows for flexible messaging solutions and offers monitoring, management and maintenance incrementally. Its adaptive security solution will learn and adapt to changing environments during run-time in the face of changing threats without sacrificing the efficiency, flexibility, reliability and security of the system. This paper describes the significant and measurable progress beyond state of the art envisioned by the GEMOM project.
GEMOM(遗传信息导向安全中间件)是欧盟FP7 ICT项目,重点关注复杂分布式信息系统的端到端智能、安全性和弹性的显著和可衡量的增长。如果不大量使用消息传递基础设施,复杂的分布式软件系统实际上是不可能实现的。虽然现有的技术水平通过暴力手段实现了任意的弹性,但自我修复要么是初级的,要么是不存在的。GEMOM具有流畅、弹性、自我修复和自适应的消息传递功能,可以实现灵活的消息传递解决方案,并提供增量式的监控、管理和维护。其自适应安全解决方案将在运行时面对不断变化的威胁时学习和适应不断变化的环境,而不会牺牲系统的效率、灵活性、可靠性和安全性。本文描述了超越GEMOM项目所设想的艺术状态的重要和可衡量的进展。
{"title":"GEMOM - Significant and Measurable Progress beyond the State of the Art","authors":"H. Abie, I. Dattani, M. Novkovic, J. Bigham, Shaun Topham, R. Savola","doi":"10.1109/ICSNC.2008.33","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.33","url":null,"abstract":"GEMOM (Genetic Message Oriented Secure Middleware) is an EU FP7 ICT project that focuses on the significant and measurable increase in the end-to-end intelligence, security and resilience of complex, distributed information systems. Complex, distributed software systems are virtually impossible to implement without heavy use of messaging infrastructure. While the existing state of the art achieves arbitrary resilience by a brute-force approach, self-healing is either rudimentary or non-existent. GEMOM, with its fluid, resilient, self-healing and adaptive messaging allows for flexible messaging solutions and offers monitoring, management and maintenance incrementally. Its adaptive security solution will learn and adapt to changing environments during run-time in the face of changing threats without sacrificing the efficiency, flexibility, reliability and security of the system. This paper describes the significant and measurable progress beyond state of the art envisioned by the GEMOM project.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129802856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A Mechanism for Federated Identification Services for Public Access Portals Using Access-Cards 使用访问卡的公共访问门户的联邦识别服务机制
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.12
S. Encheva, S. Tumin
This paper discusses an access control mechanism for public Web portals by sharing users' data from identity providers across organizations boundaries among federated organizations using a lightweight Web-based application framework. Each user can subscribe to a portal and be given an access-card which will be used to identify the subscriber at this particular portal or other portals in collaboration. The framework will also implement single-sign-on for member applications of a federation of portals.
本文通过使用轻量级的基于Web的应用程序框架在联合组织之间跨组织边界共享来自身份提供者的用户数据,讨论了公共Web门户的访问控制机制。每个用户都可以订阅一个门户,并获得一个访问卡,该访问卡将用于在此特定门户或协作中的其他门户中识别订阅者。该框架还将为门户联盟的成员应用程序实现单点登录。
{"title":"A Mechanism for Federated Identification Services for Public Access Portals Using Access-Cards","authors":"S. Encheva, S. Tumin","doi":"10.1109/ICSNC.2008.12","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.12","url":null,"abstract":"This paper discusses an access control mechanism for public Web portals by sharing users' data from identity providers across organizations boundaries among federated organizations using a lightweight Web-based application framework. Each user can subscribe to a portal and be given an access-card which will be used to identify the subscriber at this particular portal or other portals in collaboration. The framework will also implement single-sign-on for member applications of a federation of portals.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126668456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Analysis Methodology for New Critical Information Infrastructure 新型关键信息基础设施的风险分析方法
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.72
Jun Heo, Jong-Whoi Shin, Wansuk Lee, Yoojae Won
In Korea, hacking, computer viruses, such as infringement on electronic systems for protecting Critical Information Infrastructure from the law was enacted. Every year, Specified facilities that Critical Information Infrastructure are analysed system risks and will be submitted to Central Government. This research intends to provide IT service attributes to take into account the methodology that predicts the security of Critical Information Infrastructure. The service provider who wants to offer the new Critical Information Infrastructure service needs to secure appropriate security measures based on threat and vulnerability analysis from IT service attributes and the service planning stage. However, it is difficult to use existing risk methodologies that perform threat analysis as the one that allows Service attributes This paper propose the information security framework that figures out security threats at the new IT Critical Information Infrastructure service planning stage, and easily identifies relevancy between security technologies and IT service attributes.
在韩国,为了保护关键信息基础设施(ict),制定了黑客攻击、电脑病毒侵害等电子系统的法律。每年,政府都会对关键资讯基建的指定设施进行系统风险分析,并提交给中央政府。本研究旨在提供IT服务属性,以考虑预测关键信息基础设施安全性的方法。希望提供新的关键信息基础设施服务的服务提供者需要根据来自IT服务属性和服务规划阶段的威胁和漏洞分析,确保适当的安全措施。本文提出了在新的it关键信息基础设施服务规划阶段识别安全威胁的信息安全框架,并能轻松识别安全技术与it服务属性之间的相关性。
{"title":"Risk Analysis Methodology for New Critical Information Infrastructure","authors":"Jun Heo, Jong-Whoi Shin, Wansuk Lee, Yoojae Won","doi":"10.1109/ICSNC.2008.72","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.72","url":null,"abstract":"In Korea, hacking, computer viruses, such as infringement on electronic systems for protecting Critical Information Infrastructure from the law was enacted. Every year, Specified facilities that Critical Information Infrastructure are analysed system risks and will be submitted to Central Government. This research intends to provide IT service attributes to take into account the methodology that predicts the security of Critical Information Infrastructure. The service provider who wants to offer the new Critical Information Infrastructure service needs to secure appropriate security measures based on threat and vulnerability analysis from IT service attributes and the service planning stage. However, it is difficult to use existing risk methodologies that perform threat analysis as the one that allows Service attributes This paper propose the information security framework that figures out security threats at the new IT Critical Information Infrastructure service planning stage, and easily identifies relevancy between security technologies and IT service attributes.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134323236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Routing and Performance Analysis of Double-Buffered Omega Networks Supporting Multi-class Priority Traffic 支持多优先级流量的双缓冲Omega网络的路由和性能分析
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.10
D. C. Vasiliadis, G. Rizos, C. Vassilakis, E. Glavas
In this paper the modeling of Omega Networks supporting multi-class routing traffic is presented and their performance is analyzed. We compare the performance of multi-class priority mechanism against the single priority one, by gathering metrics for the two most important network performance factors, namely packet throughput and delay under uniform traffic conditions and various offered loads, using simulations. Moreover, two different test-bed setups were used in order to investigate and analyze the performance of all priority-class traffic, under different quality of service (QoS) configurations. In the considered environment, switching elements (SEs) that natively support multi-class priority routing traffic are used for constructing the MIN, while we also consider double-buffered SEs, two configuration parameters that have not been addressed insofar. The rationale behind introducing a multiple-priority scheme is to provide different QoS guarantees to traffic from different applications, which is a highly desired feature for many IP network operators, and particularly for enterprise networks.
本文提出了支持多类路由流量的Omega网络的建模方法,并对其性能进行了分析。我们通过收集两个最重要的网络性能因素的指标,即在统一的流量条件和各种提供的负载下的数据包吞吐量和延迟,使用模拟来比较多优先级机制和单优先级机制的性能。此外,为了调查和分析所有优先级流量在不同服务质量(QoS)配置下的性能,使用了两种不同的测试平台设置。在考虑的环境中,本机支持多类优先级路由流量的交换元素(se)用于构建MIN,同时我们还考虑双缓冲se,这两个配置参数到目前为止还没有解决。引入多优先级方案的基本原理是为来自不同应用程序的流量提供不同的QoS保证,这是许多IP网络运营商(尤其是企业网络)非常期望的特性。
{"title":"Routing and Performance Analysis of Double-Buffered Omega Networks Supporting Multi-class Priority Traffic","authors":"D. C. Vasiliadis, G. Rizos, C. Vassilakis, E. Glavas","doi":"10.1109/ICSNC.2008.10","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.10","url":null,"abstract":"In this paper the modeling of Omega Networks supporting multi-class routing traffic is presented and their performance is analyzed. We compare the performance of multi-class priority mechanism against the single priority one, by gathering metrics for the two most important network performance factors, namely packet throughput and delay under uniform traffic conditions and various offered loads, using simulations. Moreover, two different test-bed setups were used in order to investigate and analyze the performance of all priority-class traffic, under different quality of service (QoS) configurations. In the considered environment, switching elements (SEs) that natively support multi-class priority routing traffic are used for constructing the MIN, while we also consider double-buffered SEs, two configuration parameters that have not been addressed insofar. The rationale behind introducing a multiple-priority scheme is to provide different QoS guarantees to traffic from different applications, which is a highly desired feature for many IP network operators, and particularly for enterprise networks.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132789681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Integration of WiMAX Access Management and Control in a Multi-domain System for Multimedia Distribution 多媒体分发多域系统中WiMAX接入管理与控制的集成
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.51
E. Borcoci, R. Lupu, S. Obreja
This paper further refines the architecture and design, introduced in a previous work on the management and control, of the IEEE 802.16/WiMAX access in a multi-domain chain of IP core networks. The high level objective is to manage end-to-end connectivity services in an integrated way, at overlay level, assuring guaranteed QoS for multimedia delivery over networks with heterogeneous access. Flexible solutions are proposed for integration of the WiMAX service flows management and control within an integrated management system (EIMS) developed in the ENTHRONE FP6 project.
本文进一步完善了之前在IP核心网多域链中的IEEE 802.16/WiMAX接入管理和控制工作中介绍的架构和设计。高层目标是在覆盖层以集成的方式管理端到端连接服务,确保在异构访问的网络上为多媒体交付提供有保障的QoS。提出了在ENTHRONE FP6项目中开发的集成管理系统(EIMS)中集成WiMAX业务流管理和控制的灵活解决方案。
{"title":"Integration of WiMAX Access Management and Control in a Multi-domain System for Multimedia Distribution","authors":"E. Borcoci, R. Lupu, S. Obreja","doi":"10.1109/ICSNC.2008.51","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.51","url":null,"abstract":"This paper further refines the architecture and design, introduced in a previous work on the management and control, of the IEEE 802.16/WiMAX access in a multi-domain chain of IP core networks. The high level objective is to manage end-to-end connectivity services in an integrated way, at overlay level, assuring guaranteed QoS for multimedia delivery over networks with heterogeneous access. Flexible solutions are proposed for integration of the WiMAX service flows management and control within an integrated management system (EIMS) developed in the ENTHRONE FP6 project.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133475226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survivability Quantification of Real-Sized Networks Including End-to-End Delay Distributions 包含端到端时延分布的实规模网络的生存性量化
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.14
P. Heegaard, Kishor S. Trivedi
In a telecommunication network it is essential to provide virtual connections between peering nodes with performance guarantees such as minimum throughput, maximum delay or loss. Critical services in telecommunication network should be continuously provided even when undesirable events like sabotage, natural disasters, or network failures happen. The design, construction and management of network infrastructure and service platforms aim at meeting such requirements. In this paper we consider the network's ability to survive major and minor failures in network infrastructure and service platforms that are caused by undesired events that might be external or internal. Survive means that the services provided comply with the requirements even in the presence of failures. The network survivability is quantified as defined by the ANSI T1A1.2 committee defined as the transient performance from the instant an undesirable event occurs until steady state is reached.In this paper we assess the survivability of a network with virtual connections (VCs) exposed to link or node failures. The performance measure of interest here is not just the mean delay but packet delay distributions for each virtual connection. The analytic approach that we use is verified against simulations of a real network topology and the results show very good correspondence between the two.
在电信网络中,必须在对等节点之间提供具有性能保证的虚拟连接,例如最小吞吐量、最大延迟或丢失。在电信网络中,即使发生破坏、自然灾害或网络故障等不良事件,也应持续提供关键业务。网络基础设施和服务平台的设计、建设和管理就是为了满足这种需求。在本文中,我们考虑了网络在网络基础设施和服务平台中生存的能力,这些故障可能是由外部或内部的不期望事件引起的。存活意味着所提供的服务即使在出现故障的情况下也符合需求。网络生存能力是由ANSI T1A1.2委员会定义的,定义为从不良事件发生的瞬间到达到稳定状态的瞬态性能。在本文中,我们评估了虚拟连接(VCs)暴露于链路或节点故障的网络的生存能力。这里感兴趣的性能度量不仅是平均延迟,而且是每个虚拟连接的数据包延迟分布。通过对实际网络拓扑结构的仿真验证了所采用的分析方法,结果表明两者之间具有良好的对应关系。
{"title":"Survivability Quantification of Real-Sized Networks Including End-to-End Delay Distributions","authors":"P. Heegaard, Kishor S. Trivedi","doi":"10.1109/ICSNC.2008.14","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.14","url":null,"abstract":"In a telecommunication network it is essential to provide virtual connections between peering nodes with performance guarantees such as minimum throughput, maximum delay or loss. Critical services in telecommunication network should be continuously provided even when undesirable events like sabotage, natural disasters, or network failures happen. The design, construction and management of network infrastructure and service platforms aim at meeting such requirements. In this paper we consider the network's ability to survive major and minor failures in network infrastructure and service platforms that are caused by undesired events that might be external or internal. Survive means that the services provided comply with the requirements even in the presence of failures. The network survivability is quantified as defined by the ANSI T1A1.2 committee defined as the transient performance from the instant an undesirable event occurs until steady state is reached.In this paper we assess the survivability of a network with virtual connections (VCs) exposed to link or node failures. The performance measure of interest here is not just the mean delay but packet delay distributions for each virtual connection. The analytic approach that we use is verified against simulations of a real network topology and the results show very good correspondence between the two.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133731243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Traffic Engineering in NGNs Using Hybrid Genetic Algorithms 基于混合遗传算法的NGNs流量工程实现
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.49
A. Vallejo, A. Zaballos, D. Vernet, David Cutiller, J. Dalmau
Traffic engineering, particularly routing optimization, is one of the most important aspects to take into account when providing QoS in next generation networks (NGN). The problem of weight setting with conventional link state routing protocols for routing optimization has been object of study by a few authors. To solve this problem for big networks artificial intelligence heuristics have been used, in concrete genetic algorithms (GA). Some of the proposals incorporate local search procedures in order to optimize the GA results, in the so-called hybrid genetic algorithm (HGA) or memetic algorithm. This paper presents an inedited comparative analysis of the main hybrid genetic algorithms (HGA) proposals, as well as comparing them with other algorithms for the same problem by means of simulations. One of the HGA algorithms was chosen from the results analysis and was implemented over a real testbed with commercial routers with successful OSPFv3 routing optimization.
流量工程,特别是路由优化,是在下一代网络(NGN)中提供QoS时需要考虑的最重要的方面之一。传统链路状态路由协议的权值设置问题一直是一些作者研究的对象。为了解决大型网络的这一问题,人工智能启发式算法被应用到具体的遗传算法(GA)中。有些建议在所谓的混合遗传算法(HGA)或模因算法中加入局部搜索过程以优化遗传算法结果。本文对混合遗传算法(HGA)的主要方案进行了比较分析,并通过仿真的方法将其与其他算法进行了比较。从结果分析中选择了一种HGA算法,并在商用路由器的实际测试平台上实现了成功的OSPFv3路由优化。
{"title":"Implementation of Traffic Engineering in NGNs Using Hybrid Genetic Algorithms","authors":"A. Vallejo, A. Zaballos, D. Vernet, David Cutiller, J. Dalmau","doi":"10.1109/ICSNC.2008.49","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.49","url":null,"abstract":"Traffic engineering, particularly routing optimization, is one of the most important aspects to take into account when providing QoS in next generation networks (NGN). The problem of weight setting with conventional link state routing protocols for routing optimization has been object of study by a few authors. To solve this problem for big networks artificial intelligence heuristics have been used, in concrete genetic algorithms (GA). Some of the proposals incorporate local search procedures in order to optimize the GA results, in the so-called hybrid genetic algorithm (HGA) or memetic algorithm. This paper presents an inedited comparative analysis of the main hybrid genetic algorithms (HGA) proposals, as well as comparing them with other algorithms for the same problem by means of simulations. One of the HGA algorithms was chosen from the results analysis and was implemented over a real testbed with commercial routers with successful OSPFv3 routing optimization.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gateways and Capacity in Ad Hoc Networks Ad Hoc网络中的网关和容量
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.40
Erlend Larsen, Vinh Pham, P. Engelstad, Ø. Kure
Connectivity with external networks is an essential feature of many ad hoc networks, and such connectivity is enabled by gateway nodes. This paper investigates how the gateways affect the throughput in the ad hoc network. The throughputpsilas dependency on gateway positions, number of gateways and handover properties is sought uncovered by simulations. The results show that the relative positions of gateways in ad hoc networks may have defining impact on the performance of the network. The average path length and the gatewayspsila shared interference coverage are parameters that affect the performance.
与外部网络的连接是许多自组织网络的基本特性,这种连接是由网关节点启用的。本文研究了网关对自组网吞吐量的影响。对网关位置、网关数量和切换属性的吞吐量依赖是通过模拟发现的。结果表明,自组织网络中网关的相对位置可能对网络性能产生决定性影响。平均路径长度和网关共享干扰覆盖是影响性能的参数。
{"title":"Gateways and Capacity in Ad Hoc Networks","authors":"Erlend Larsen, Vinh Pham, P. Engelstad, Ø. Kure","doi":"10.1109/ICSNC.2008.40","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.40","url":null,"abstract":"Connectivity with external networks is an essential feature of many ad hoc networks, and such connectivity is enabled by gateway nodes. This paper investigates how the gateways affect the throughput in the ad hoc network. The throughputpsilas dependency on gateway positions, number of gateways and handover properties is sought uncovered by simulations. The results show that the relative positions of gateways in ad hoc networks may have defining impact on the performance of the network. The average path length and the gatewayspsila shared interference coverage are parameters that affect the performance.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127025430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 Third International Conference on Systems and Networks Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1