首页 > 最新文献

2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.最新文献

英文 中文
Characterization, analysis, and visualization of traffic in the Asian Internet Interconnection Initiatives (AI3) satellite-based research network test bed 亚洲互联网互联倡议(AI3)卫星研究网络试验台中流量的表征、分析和可视化
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210124
Edwin D. Vinas, Carla P. Quiblat, Carlo Manuel R. Camus, R. Mendoza, Denis F. Villorente, Tomomitsu Baba
Since it started in 1995, the Asian Internet Interconnection Initiatives (AI3) project has grown into a large satellite-based research network in the Asia Pacific. All partner institutions are connected via the C-band or Ku-band channel of the JCSAT satellite. This paper evaluates the performance of the AI3 testbed in terms of bandwidth consumption, traffic flows, and measurement with the introduction of Open Network Measurements Data Exchange (OpenMDE), a new concept in network measurement systems. OpenMDE will provide a basis for future implementation, and could be applied to specific approaches of certain ABs network operation issues. Furthermore, this paper shows the evaluation of each partner's utilization of the AI3 connection with an analysis of whether the traffic is associated with research or is part of the commercial Internet. Also, it will provide measurement data that will determine weak points of the network, serving as basis for possible upgrades.
自1995年启动以来,亚洲互联网互联倡议(AI3)项目已发展成为亚太地区一个大型的基于卫星的研究网络。所有伙伴机构都通过联合卫星卫星的c波段或ku波段信道连接。本文通过引入开放网络测量数据交换(OpenMDE)这一网络测量系统中的新概念,从带宽消耗、流量流和测量方面评估了AI3试验台的性能。OpenMDE将为未来的实现提供基础,并可应用于某些ABs网络运行问题的具体方法。此外,本文通过分析流量是与研究相关还是属于商业互联网的一部分,展示了对每个合作伙伴对AI3连接的利用的评估。此外,它将提供测量数据,以确定网络的弱点,作为可能升级的基础。
{"title":"Characterization, analysis, and visualization of traffic in the Asian Internet Interconnection Initiatives (AI3) satellite-based research network test bed","authors":"Edwin D. Vinas, Carla P. Quiblat, Carlo Manuel R. Camus, R. Mendoza, Denis F. Villorente, Tomomitsu Baba","doi":"10.1109/SAINTW.2003.1210124","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210124","url":null,"abstract":"Since it started in 1995, the Asian Internet Interconnection Initiatives (AI3) project has grown into a large satellite-based research network in the Asia Pacific. All partner institutions are connected via the C-band or Ku-band channel of the JCSAT satellite. This paper evaluates the performance of the AI3 testbed in terms of bandwidth consumption, traffic flows, and measurement with the introduction of Open Network Measurements Data Exchange (OpenMDE), a new concept in network measurement systems. OpenMDE will provide a basis for future implementation, and could be applied to specific approaches of certain ABs network operation issues. Furthermore, this paper shows the evaluation of each partner's utilization of the AI3 connection with an analysis of whether the traffic is associated with research or is part of the commercial Internet. Also, it will provide measurement data that will determine weak points of the network, serving as basis for possible upgrades.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131999824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The deployment of UDL network on satellite circuit with training workshop UDL网络在卫星电路上的部署及培训工作坊
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210118
Yasuo Tsuchimoto, Shoko Mikawa, K. Okawa
This paper concerns the deployment of the Internet over satellite circuits. A lack of operators is problematic to the spread this technology. In order to overcome this obstacle, this paper addresses training of the network's operators. In Internet operation, not only technical issues, but also issues regarding communication between operators become important when configuring routing setups such as BGP. Therefore, an operator learning workshop intended to provide knowledge and experience regarding the network's operation was held in Japan. Through this workshop operators learned to configure routers by themselves and solve problems when they occur. The workshop was also intended to foster a sense of community among its participants, which will help facilitate the configuring of a routing protocol such as BGP.
这篇论文涉及在卫星电路上部署因特网。缺乏操作人员对这项技术的推广是个问题。为了克服这一障碍,本文讨论了网络操作员的培训问题。在互联网运行中,在配置BGP等路由设置时,不仅技术问题很重要,运营商之间的通信问题也很重要。因此,在日本举办了操作员学习讲习班,旨在提供有关网络操作的知识和经验。通过这个研讨会,操作员学会了自己配置路由器,并在出现问题时解决问题。该研讨会还旨在培养参与者之间的社区意识,这将有助于促进BGP等路由协议的配置。
{"title":"The deployment of UDL network on satellite circuit with training workshop","authors":"Yasuo Tsuchimoto, Shoko Mikawa, K. Okawa","doi":"10.1109/SAINTW.2003.1210118","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210118","url":null,"abstract":"This paper concerns the deployment of the Internet over satellite circuits. A lack of operators is problematic to the spread this technology. In order to overcome this obstacle, this paper addresses training of the network's operators. In Internet operation, not only technical issues, but also issues regarding communication between operators become important when configuring routing setups such as BGP. Therefore, an operator learning workshop intended to provide knowledge and experience regarding the network's operation was held in Japan. Through this workshop operators learned to configure routers by themselves and solve problems when they occur. The workshop was also intended to foster a sense of community among its participants, which will help facilitate the configuring of a routing protocol such as BGP.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A mobility protocol framework to support multiple namespaces 支持多个名称空间的移动性协议框架
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210158
M. Ishiyama, M. Kohno, M. Kunishi, F. Teraoka
This paper presents a new mobility protocol that supports multiple namespaces on IPv6 networks. Our proposed protocol framework allows a mobile node to specify a correspondent node by a name that is defined in any namespace as a node identifier. This technique removes certain restrictions on the space of node identifiers and allows mobile nodes to communicate with each other regardless of their location. Mobile nodes negotiate a pseudo node identifier which is unique between the two nodes, with a correspondent node that is identified by the name. We make this pseudo node identifier compatible with the IPv6 address format; we can thus use existing IPv6 applications with our proposed mobility framework. This framework is based on Location Independent Network Architecture (LINA), and provides mobility support in a simple fashion and with low protocol overhead. We also demonstrate how to provide anonymity to our mobility protocol by using a dynamic pseudo node identifier.
本文提出了一种在IPv6网络上支持多个命名空间的移动协议。我们提出的协议框架允许移动节点通过在任何名称空间中定义的名称指定对应节点作为节点标识符。该技术消除了对节点标识符空间的某些限制,并允许移动节点无论其位置如何都可以相互通信。移动节点协商一个伪节点标识符,该标识符在两个节点之间是唯一的,并与一个由名称标识的对应节点进行协商。我们使这个伪节点标识符与IPv6地址格式兼容;因此,我们可以将现有的IPv6应用程序与我们提出的移动性框架一起使用。该框架基于位置独立网络架构(Location Independent Network Architecture, LINA),以简单的方式提供移动性支持,协议开销低。我们还演示了如何通过使用动态伪节点标识符为移动性协议提供匿名性。
{"title":"A mobility protocol framework to support multiple namespaces","authors":"M. Ishiyama, M. Kohno, M. Kunishi, F. Teraoka","doi":"10.1109/SAINTW.2003.1210158","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210158","url":null,"abstract":"This paper presents a new mobility protocol that supports multiple namespaces on IPv6 networks. Our proposed protocol framework allows a mobile node to specify a correspondent node by a name that is defined in any namespace as a node identifier. This technique removes certain restrictions on the space of node identifiers and allows mobile nodes to communicate with each other regardless of their location. Mobile nodes negotiate a pseudo node identifier which is unique between the two nodes, with a correspondent node that is identified by the name. We make this pseudo node identifier compatible with the IPv6 address format; we can thus use existing IPv6 applications with our proposed mobility framework. This framework is based on Location Independent Network Architecture (LINA), and provides mobility support in a simple fashion and with low protocol overhead. We also demonstrate how to provide anonymity to our mobility protocol by using a dynamic pseudo node identifier.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SIP and IPv6: why and how? SIP和IPv6:为什么和如何?
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210161
D. Sisalem, J. Fiedler, R. Ruppelt
The session initiation protocol (SIP) is constantly gaining in popularity and acceptance as the signaling protocol for next generation multimedia communication. While current networks are still mostly based on IPv4, IPv6 is being proposed for next generation networks. This paper describes the benefits of using IPv6 for SIP and presents approaches for establishing SIP based communication in heterogeneous environments.
作为下一代多媒体通信的信令协议,会话发起协议(SIP)正在得到越来越多的应用和认可。虽然目前的网络仍然主要基于IPv4,但下一代网络正在提出IPv6。本文描述了在SIP中使用IPv6的好处,并提出了在异构环境中建立基于SIP的通信的方法。
{"title":"SIP and IPv6: why and how?","authors":"D. Sisalem, J. Fiedler, R. Ruppelt","doi":"10.1109/SAINTW.2003.1210161","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210161","url":null,"abstract":"The session initiation protocol (SIP) is constantly gaining in popularity and acceptance as the signaling protocol for next generation multimedia communication. While current networks are still mostly based on IPv4, IPv6 is being proposed for next generation networks. This paper describes the benefits of using IPv6 for SIP and presents approaches for establishing SIP based communication in heterogeneous environments.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"123 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129641182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Challenges affecting a defense-in-depth security architected network by allowing operations of wireless access points (WAPs) 通过允许无线接入点(wap)的操作来影响纵深防御安全体系结构网络的挑战
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210187
G. Suarez
Many corporations and government organizations spend millions of dollars in the protection of their company or organizational data. These protection mechanisms often follow a secured layered approach, called defense in depth (DiD), which allow these organizations to have a more secured network based on security mechanisms at different areas of their network design. Defense in depth is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack. Because there are so many potential attackers with such a wide variety of attack methods available, there is no single method for successfully protecting a computer network. Utilizing the strategy of defense in depth will reduce the risk of having a successful-and likely very costly-attack on a network. In today's environment there is more of a need than ever for increased security in enterprise level networks. Companies are finding themselves with offices around the world and needing a way to provide an affordable high speed secure communications between them as well as provide ways to implement wireless technologies in a secured environment. This paper describes an example of how this can be done and the special issues and challenges associated with securing these types of networks.
许多公司和政府机构花费数百万美元来保护他们的公司或组织数据。这些保护机制通常遵循一种安全的分层方法,称为深度防御(DiD),它允许这些组织在其网络设计的不同区域基于安全机制拥有更安全的网络。纵深防御是用一系列防御机制保护计算机网络的概念,如果一种机制失效,另一种机制已经到位,可以阻止攻击。由于潜在的攻击者如此之多,使用的攻击方法种类繁多,因此没有一种方法可以成功地保护计算机网络。利用纵深防御策略将降低对网络进行成功攻击的风险,并且可能代价高昂。在当今的环境中,对企业级网络的安全性的需求比以往任何时候都要高。公司发现自己在世界各地都有办事处,需要一种方法来提供负担得起的高速安全通信,并提供在安全环境中实现无线技术的方法。本文描述了如何做到这一点的一个例子,以及与保护这些类型的网络相关的特殊问题和挑战。
{"title":"Challenges affecting a defense-in-depth security architected network by allowing operations of wireless access points (WAPs)","authors":"G. Suarez","doi":"10.1109/SAINTW.2003.1210187","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210187","url":null,"abstract":"Many corporations and government organizations spend millions of dollars in the protection of their company or organizational data. These protection mechanisms often follow a secured layered approach, called defense in depth (DiD), which allow these organizations to have a more secured network based on security mechanisms at different areas of their network design. Defense in depth is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack. Because there are so many potential attackers with such a wide variety of attack methods available, there is no single method for successfully protecting a computer network. Utilizing the strategy of defense in depth will reduce the risk of having a successful-and likely very costly-attack on a network. In today's environment there is more of a need than ever for increased security in enterprise level networks. Companies are finding themselves with offices around the world and needing a way to provide an affordable high speed secure communications between them as well as provide ways to implement wireless technologies in a secured environment. This paper describes an example of how this can be done and the special issues and challenges associated with securing these types of networks.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121669912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementing IPv6: experiences at KAME project 实现IPv6:在KAME项目中的经验
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210160
Jun-ichiro itojun Hagino
KAME project was started in 1998 to provide BSD-licensed reference implementation for IPv6, IPsec and other recent Internet technologies. This paper tries to describe our motivation, where are we right now, technical hurdles we have faced and solutions against them. All of our source code is, and will be distributed under a BSD-like license.
KAME项目始于1998年,为IPv6、IPsec和其他最新的互联网技术提供bsd许可的参考实现。本文试图描述我们的动机,我们现在所处的位置,我们所面临的技术障碍以及针对它们的解决方案。我们所有的源代码都将在类似bsd的许可证下发布。
{"title":"Implementing IPv6: experiences at KAME project","authors":"Jun-ichiro itojun Hagino","doi":"10.1109/SAINTW.2003.1210160","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210160","url":null,"abstract":"KAME project was started in 1998 to provide BSD-licensed reference implementation for IPv6, IPsec and other recent Internet technologies. This paper tries to describe our motivation, where are we right now, technical hurdles we have faced and solutions against them. All of our source code is, and will be distributed under a BSD-like license.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource friendly platform requirements for portable computers using broadband applications 使用宽带应用程序的便携式计算机的资源友好型平台要求
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210154
Kazunori Sugiura, A. Ogawa, Osamu Nakamura, J. Murai
This research discloses the practical resource consumption of portable computers using broadband applications using IPv4 and IPv6. We tested with major broadband applications in a variety of operating system and network connections to verify the resource consumption. Resource consumption can be power consumption, bus utilization, device utilization, and processor utilization. Past application ignores its resource management which affects the efficiency of the usage. With collaboration and management of devices and its resource availability, effective use of resources can be performed resulting in the extension of battery time, lowering the heat, and economizing the bus utilization. Furthermore, this research introduces the sample application with the transport method for lazy resource adaptive streams using DVTS in IPv6, which effectively reduces the resource consumption. Implementation of resource management feature into a typical computer infrastructure may decrease the power consumption, and power conservation.
本研究揭示了使用IPv4和IPv6宽带应用的便携式计算机的实际资源消耗。我们在各种操作系统和网络连接下对主要宽带应用程序进行了测试,以验证资源消耗。资源消耗可以是功耗、总线利用率、设备利用率和处理器利用率。过去的应用忽视了资源的管理,影响了资源的使用效率。通过对设备及其资源可用性的协作和管理,可以有效地利用资源,从而延长电池使用时间、降低热量并节省总线利用率。此外,本文还介绍了在IPv6中使用DVTS传输延迟资源自适应流的示例应用程序,有效地降低了资源消耗。在典型的计算机基础设施中实现资源管理功能可以降低功耗,节约能源。
{"title":"Resource friendly platform requirements for portable computers using broadband applications","authors":"Kazunori Sugiura, A. Ogawa, Osamu Nakamura, J. Murai","doi":"10.1109/SAINTW.2003.1210154","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210154","url":null,"abstract":"This research discloses the practical resource consumption of portable computers using broadband applications using IPv4 and IPv6. We tested with major broadband applications in a variety of operating system and network connections to verify the resource consumption. Resource consumption can be power consumption, bus utilization, device utilization, and processor utilization. Past application ignores its resource management which affects the efficiency of the usage. With collaboration and management of devices and its resource availability, effective use of resources can be performed resulting in the extension of battery time, lowering the heat, and economizing the bus utilization. Furthermore, this research introduces the sample application with the transport method for lazy resource adaptive streams using DVTS in IPv6, which effectively reduces the resource consumption. Implementation of resource management feature into a typical computer infrastructure may decrease the power consumption, and power conservation.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure aggregation for wireless networks 无线网络的安全聚合
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210191
Lingxuan Hu, David Evans
An emerging class of important applications uses ad hoc wireless networks of low-power sensor devices to monitor and send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power, intermediate network nodes should aggregate results from individual sensors. However, this opens the risk that a single compromised sensor device can render the network useless, or worse, mislead the operator into trusting a false reading. We present a protocol that provides a secure aggregation mechanism for wireless networks that is resilient to both intruder devices and single device key compromises. Our protocol is designed to work within the computation, memory and power consumption limits of inexpensive sensor devices, but takes advantage of the properties of wireless networking, as well as the power asymmetry between the devices and the base station.
一类新兴的重要应用使用低功耗传感器设备的自组织无线网络来监视和发送有关可能的恶劣环境的信息到连接到有线网络的强大基站。为了节省电力,中间网络节点应该聚合来自各个传感器的结果。然而,这就带来了一个风险,即单个受损的传感器设备可能会使网络失效,或者更糟的是,误导操作员相信错误的读数。我们提出了一种协议,该协议为无线网络提供了一种安全的聚合机制,该机制对入侵设备和单个设备密钥妥协都具有弹性。我们的协议被设计为在廉价传感器设备的计算、内存和功耗限制内工作,但利用了无线网络的特性,以及设备和基站之间的功率不对称。
{"title":"Secure aggregation for wireless networks","authors":"Lingxuan Hu, David Evans","doi":"10.1109/SAINTW.2003.1210191","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210191","url":null,"abstract":"An emerging class of important applications uses ad hoc wireless networks of low-power sensor devices to monitor and send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power, intermediate network nodes should aggregate results from individual sensors. However, this opens the risk that a single compromised sensor device can render the network useless, or worse, mislead the operator into trusting a false reading. We present a protocol that provides a secure aggregation mechanism for wireless networks that is resilient to both intruder devices and single device key compromises. Our protocol is designed to work within the computation, memory and power consumption limits of inexpensive sensor devices, but takes advantage of the properties of wireless networking, as well as the power asymmetry between the devices and the base station.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 513
Results and plans of the IPv6 test-bed initiatives within the European Commission IST Programme 欧盟委员会IST计划中IPv6测试平台计划的结果和计划
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210144
T. Chown, J. Palet
We present an overview of the IPv6 projects being undertaken within the European Commission's Fifth Framework Information Society Technologies (IST) Programme. The Programme's coverage reaches to a broad range of topics across the computing and networking spectrum. It includes GEANT the network connecting the European National Research and Education Networks (NRENs). It also covers projects focusing on IPv6, and those focusing elsewhere but seeking to embrace IPv6 in their scope. The major projects are GEANT, which is now planning introduction of IPv6 services to the existing IPv4 backbone, 6NET which has deployed a pan-European IPv6-only academic network, and Euro6IX, which is building a network of IPv6 exchange points.
我们概述了欧盟委员会第五框架信息社会技术(IST)计划中正在进行的IPv6项目。该计划涵盖了计算机和网络领域的广泛主题。它包括连接欧洲国家研究和教育网络(NRENs)的GEANT网络。它还涵盖了专注于IPv6的项目,以及那些专注于其他地方但寻求在其范围内拥抱IPv6的项目。主要的项目是GEANT,它现在计划在现有的IPv4骨干网中引入IPv6服务,6NET已经部署了一个泛欧洲的纯IPv6学术网络,Euro6IX正在建设一个IPv6交换点网络。
{"title":"Results and plans of the IPv6 test-bed initiatives within the European Commission IST Programme","authors":"T. Chown, J. Palet","doi":"10.1109/SAINTW.2003.1210144","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210144","url":null,"abstract":"We present an overview of the IPv6 projects being undertaken within the European Commission's Fifth Framework Information Society Technologies (IST) Programme. The Programme's coverage reaches to a broad range of topics across the computing and networking spectrum. It includes GEANT the network connecting the European National Research and Education Networks (NRENs). It also covers projects focusing on IPv6, and those focusing elsewhere but seeking to embrace IPv6 in their scope. The major projects are GEANT, which is now planning introduction of IPv6 services to the existing IPv4 backbone, 6NET which has deployed a pan-European IPv6-only academic network, and Euro6IX, which is building a network of IPv6 exchange points.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133770262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formalizing governance in virtual districts 使虚拟地区的治理正规化
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210131
E. Colombo, C. Francalanci
This paper presents a model that helps to specify patterns of control and coordination among different actors within a cooperative workflow. The paper explains how the model can be applied according to a methodological approach structured in three steps from requirements analysis to detailed design. A set of patterns is provided at each step to support specification activities. Patterns are designed by analyzing and modeling different mechanisms of governance among organizations.
本文提出了一个模型,该模型有助于指定协作工作流中不同参与者之间的控制和协调模式。本文解释了如何根据从需求分析到详细设计的三个步骤组成的方法论方法来应用该模型。每个步骤都提供了一组模式来支持规范活动。模式是通过分析和建模组织间不同的治理机制来设计的。
{"title":"Formalizing governance in virtual districts","authors":"E. Colombo, C. Francalanci","doi":"10.1109/SAINTW.2003.1210131","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210131","url":null,"abstract":"This paper presents a model that helps to specify patterns of control and coordination among different actors within a cooperative workflow. The paper explains how the model can be applied according to a methodological approach structured in three steps from requirements analysis to detailed design. A set of patterns is provided at each step to support specification activities. Patterns are designed by analyzing and modeling different mechanisms of governance among organizations.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134358101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1