首页 > 最新文献

Fourth International Conference on Networking and Services (icns 2008)最新文献

英文 中文
Reliable Evidence of Data Integrity from an Untrusted Storage Service 来自不受信任存储服务的数据完整性的可靠证据
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.28
Claudius Stern, Philipp Adelt, Volker Krummel, Marcel R. Ackermann
Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of business communications. In this paper we consider the problem of getting reliable evidence of the integrity and existence of some data from a storage service even if the data is not available for reference anymore and even if the partner may be untrustworthy or malicious. Several solutions are presented, among them the first cryptographically secure approach providing evidence of the integrity of remotely stored data, without owning or transferring the complete original data.
随着从媒体文件到商业文档的数字工件的使用越来越多,数字存储需求也在不断增长。监管框架要求对业务通信进行不变的、持久的存储。在本文中,我们考虑了从存储服务中获得某些数据完整性和存在性的可靠证据的问题,即使这些数据不再可供参考,即使合作伙伴可能不可信或恶意。提出了几种解决方案,其中第一种加密安全方法提供了远程存储数据完整性的证据,而无需拥有或传输完整的原始数据。
{"title":"Reliable Evidence of Data Integrity from an Untrusted Storage Service","authors":"Claudius Stern, Philipp Adelt, Volker Krummel, Marcel R. Ackermann","doi":"10.1109/ICNS.2008.28","DOIUrl":"https://doi.org/10.1109/ICNS.2008.28","url":null,"abstract":"Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of business communications. In this paper we consider the problem of getting reliable evidence of the integrity and existence of some data from a storage service even if the data is not available for reference anymore and even if the partner may be untrustworthy or malicious. Several solutions are presented, among them the first cryptographically secure approach providing evidence of the integrity of remotely stored data, without owning or transferring the complete original data.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129985274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shared Sub-Path Protection Algorithm with Recovery Time Constraint in WDM Networks WDM网络中具有恢复时间约束的共享子路径保护算法
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.12
Lei Guo, Xingwei Wang, Jin Cao, Le Min Li, Ting Yang, Fei Yang
This paper proposes a new heuristic algorithm called Traffic recovery time Constrained Shared Sub-Path Protection (TC_SSPP) to provide survivability in WDM networks with Shared-Risk-Link-Group (SRLG). By properly setting the delay parameter of each link and running the Delay Constrained Shortest Path Algorithm (DCSPA) to compute the backup sub-paths, TC_SSPP can effectively guarantee the traffic recovery time for connection requests. Simulation results show that TC_SSPP outperforms the traditional algorithms.
本文提出了一种新的启发式算法,称为流量恢复时间约束共享子路径保护(TC_SSPP),以提供共享风险-链路-组(SRLG) WDM网络的生存性。TC_SSPP通过合理设置各链路的时延参数,并使用延迟约束最短路径算法(DCSPA)计算备份子路径,可以有效保证连接请求的流量恢复时间。仿真结果表明,TC_SSPP算法优于传统算法。
{"title":"Shared Sub-Path Protection Algorithm with Recovery Time Constraint in WDM Networks","authors":"Lei Guo, Xingwei Wang, Jin Cao, Le Min Li, Ting Yang, Fei Yang","doi":"10.1109/ICNS.2008.12","DOIUrl":"https://doi.org/10.1109/ICNS.2008.12","url":null,"abstract":"This paper proposes a new heuristic algorithm called Traffic recovery time Constrained Shared Sub-Path Protection (TC_SSPP) to provide survivability in WDM networks with Shared-Risk-Link-Group (SRLG). By properly setting the delay parameter of each link and running the Delay Constrained Shortest Path Algorithm (DCSPA) to compute the backup sub-paths, TC_SSPP can effectively guarantee the traffic recovery time for connection requests. Simulation results show that TC_SSPP outperforms the traditional algorithms.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116679353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Characterization Framework and Design Patterns for the Disadvantaged User 弱势用户的特征框架和设计模式
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.11
F. Dandashi, A. Griggs, J. Higginson, J. Hughes, Wilson Narvaez, M. Sabbouh, S. Semy, B. Yost
Many service oriented architecture (SOA) approaches in use today presume the consistent availability of reliable networks and limitless resources. For some department of defense (DoD) and other government users, operating at the tactical edge, who may be disadvantaged in terms of network and resource availability, the current methods of development may not provide them with reliable capability. In this paper, we propose a method for capturing design patterns for the disadvantaged user using the common vocabulary of a characterization framework. We also provide a set of design patterns that minimize technical constraints, and derive the infrastructure requirements needed to implement a selected design pattern.
目前使用的许多面向服务的体系结构(SOA)方法都假定可靠网络和无限资源具有一致的可用性。对于一些处于战术边缘的国防部和其他政府用户来说,他们在网络和资源可用性方面可能处于不利地位,目前的开发方法可能无法为他们提供可靠的能力。在本文中,我们提出了一种使用表征框架的通用词汇表为弱势用户捕获设计模式的方法。我们还提供了一组最小化技术约束的设计模式,并派生了实现所选设计模式所需的基础设施需求。
{"title":"Characterization Framework and Design Patterns for the Disadvantaged User","authors":"F. Dandashi, A. Griggs, J. Higginson, J. Hughes, Wilson Narvaez, M. Sabbouh, S. Semy, B. Yost","doi":"10.1109/ICNS.2008.11","DOIUrl":"https://doi.org/10.1109/ICNS.2008.11","url":null,"abstract":"Many service oriented architecture (SOA) approaches in use today presume the consistent availability of reliable networks and limitless resources. For some department of defense (DoD) and other government users, operating at the tactical edge, who may be disadvantaged in terms of network and resource availability, the current methods of development may not provide them with reliable capability. In this paper, we propose a method for capturing design patterns for the disadvantaged user using the common vocabulary of a characterization framework. We also provide a set of design patterns that minimize technical constraints, and derive the infrastructure requirements needed to implement a selected design pattern.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IMS Control and Access Layer PR-SCTP Based Network 一种基于IMS控制和访问层PR-SCTP的网络
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.33
Edmo Lopes Filho, Gilberto Tadayoshi Hashimoto, P. F. Rosa
The recent growth of peer-to-peer traffic and the popularity of streaming video is a cause for possible instability of the networks because most of these services run over UDP, without any mechanism for congestion control. Moreover, the adaptive features of peer-to-peer traffic may lead a misuse of the classical QoS rules legitimately applied to end-user applications. This paper proposes the usage of the partial reliability extension of the stream control transmission protocol (PR-SCTP) as the unique transport entity in an IP multimedia subsystem (IMS) network control and access layer, to mitigate situations of traffic congestion. The IMS is a 3GPP standardized approach that enables convergence of data, voice, video and mobile network technology over an IP-based network. Session initiation protocol (SIP) and session description protocol (SDP) are the groundwork to support the convergence proposed by IMS. PR-SCTP provides several features to improve the transport of SIP between the IMS entities and after introducing the motivation to this proposal, we discuss and compare the benefits and drawbacks of using PR-SCTP instead of TCP or UDP to transport SIP.
最近点对点流量的增长和流媒体视频的流行是网络可能不稳定的原因,因为大多数这些服务都在UDP上运行,没有任何拥塞控制机制。此外,点对点流量的自适应特性可能导致误用合法应用于最终用户应用程序的经典QoS规则。本文提出了在IP多媒体子系统(IMS)网络控制和访问层中使用部分可靠性扩展的流控制传输协议(PR-SCTP)作为唯一的传输实体,以缓解流量拥塞的情况。IMS是一种3GPP标准化方法,能够在基于ip的网络上融合数据、语音、视频和移动网络技术。会话发起协议(SIP)和会话描述协议(SDP)是支持IMS提出的融合的基础。PR-SCTP提供了几个特性来改进IMS实体之间的SIP传输,在介绍了该提议的动机之后,我们讨论并比较了使用PR-SCTP代替TCP或UDP传输SIP的优点和缺点。
{"title":"An IMS Control and Access Layer PR-SCTP Based Network","authors":"Edmo Lopes Filho, Gilberto Tadayoshi Hashimoto, P. F. Rosa","doi":"10.1109/ICNS.2008.33","DOIUrl":"https://doi.org/10.1109/ICNS.2008.33","url":null,"abstract":"The recent growth of peer-to-peer traffic and the popularity of streaming video is a cause for possible instability of the networks because most of these services run over UDP, without any mechanism for congestion control. Moreover, the adaptive features of peer-to-peer traffic may lead a misuse of the classical QoS rules legitimately applied to end-user applications. This paper proposes the usage of the partial reliability extension of the stream control transmission protocol (PR-SCTP) as the unique transport entity in an IP multimedia subsystem (IMS) network control and access layer, to mitigate situations of traffic congestion. The IMS is a 3GPP standardized approach that enables convergence of data, voice, video and mobile network technology over an IP-based network. Session initiation protocol (SIP) and session description protocol (SDP) are the groundwork to support the convergence proposed by IMS. PR-SCTP provides several features to improve the transport of SIP between the IMS entities and after introducing the motivation to this proposal, we discuss and compare the benefits and drawbacks of using PR-SCTP instead of TCP or UDP to transport SIP.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121428248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance Study of PANA Pre-authentication for Interdomain Handover 域间切换PANA预认证性能研究
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.23
Patryk Chamuczynski, O. Alfandi, Constantin Werner, Henrik Brosenne, D. Hogrefe
To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuous connectivity, one prerequisite is the incorporation of seamless handover. The make-before-break approach facilitates seamless handover by means of executing an authentication to a new domain simultaneously while maintaining connection to current domain. The connection is only terminated after the handover to the new domain is successfully completed. However, the duration of the authentication is critical for the handover process because if the mobile nodes move very fast the remaining amount of time of connection to the current domain can become very limited. Therefore, it is a vital issue for seamless mobility to study the authentication performance of a pre-authentication framework. In this paper we model an authentication infrastructure and consider a scenario in which a high number of nodes handover to a new administration domain. The simulation of the authentication process shows the relation between authentication performance and traffic intensity. Furthermore we identify some critical points and potential bottlenecks of this pre-authentication approach.
为了向无线用户提供无缝移动性,在从一个管理域移动到另一个管理域时需要连续连接到Internet。要实现持续连接,一个先决条件是集成无缝切换。先完成后中断的方法通过在保持与当前域的连接的同时执行对新域的身份验证来促进无缝切换。只有在向新域的移交成功完成后,连接才会终止。然而,身份验证的持续时间对于切换过程至关重要,因为如果移动节点移动得非常快,那么连接到当前域的剩余时间就会变得非常有限。因此,研究预认证框架的认证性能是实现无缝移动的关键问题。在本文中,我们建立了一个身份验证基础结构模型,并考虑了一个场景,其中大量节点切换到一个新的管理域。通过对认证过程的仿真,可以看出认证性能与流量强度之间的关系。此外,我们还确定了这种预认证方法的一些关键点和潜在瓶颈。
{"title":"Performance Study of PANA Pre-authentication for Interdomain Handover","authors":"Patryk Chamuczynski, O. Alfandi, Constantin Werner, Henrik Brosenne, D. Hogrefe","doi":"10.1109/ICNS.2008.23","DOIUrl":"https://doi.org/10.1109/ICNS.2008.23","url":null,"abstract":"To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuous connectivity, one prerequisite is the incorporation of seamless handover. The make-before-break approach facilitates seamless handover by means of executing an authentication to a new domain simultaneously while maintaining connection to current domain. The connection is only terminated after the handover to the new domain is successfully completed. However, the duration of the authentication is critical for the handover process because if the mobile nodes move very fast the remaining amount of time of connection to the current domain can become very limited. Therefore, it is a vital issue for seamless mobility to study the authentication performance of a pre-authentication framework. In this paper we model an authentication infrastructure and consider a scenario in which a high number of nodes handover to a new administration domain. The simulation of the authentication process shows the relation between authentication performance and traffic intensity. Furthermore we identify some critical points and potential bottlenecks of this pre-authentication approach.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116977731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Monte Carlo Method for Estimating the Extended All-Terminal Reliability 一种估计扩展全端可靠性的蒙特卡罗方法
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.29
Shiang-Ming Huang, Quincy Wu, Shi-Chun Tsai
Designing a network with optimal deployment cost and maximum reliability considerations is a hard problem, especially when the all-terminal reliability is required. For efficiently finding out an acceptable solution, Genetic Algorithms (GAs) have been widely applied to solve this problem. In these GAs, the reliability values could be calculated in their objective functions. In year 2002, an extended network reliability model was proposed which considers the connection important level between each pair of nodes. This paper proposes an approximation algorithm based on Monte Carlo simulation for the new network reliability model. This approximation algorithm can be integrated into GAs to solve the optimal cost reliable network design problem under the extended model.
设计一个部署成本最优、可靠性考虑最大的网络是一个难题,特别是在要求全终端可靠性的情况下。为了有效地找到可接受的解,遗传算法被广泛应用于求解这一问题。在这些遗传算法中,可靠性值可以在其目标函数中计算。2002年提出了一种考虑节点间连接重要级别的扩展网络可靠性模型。本文提出了一种基于蒙特卡罗仿真的网络可靠性近似算法。该近似算法可以集成到GAs中,解决扩展模型下的最优成本可靠网络设计问题。
{"title":"A Monte Carlo Method for Estimating the Extended All-Terminal Reliability","authors":"Shiang-Ming Huang, Quincy Wu, Shi-Chun Tsai","doi":"10.1109/ICNS.2008.29","DOIUrl":"https://doi.org/10.1109/ICNS.2008.29","url":null,"abstract":"Designing a network with optimal deployment cost and maximum reliability considerations is a hard problem, especially when the all-terminal reliability is required. For efficiently finding out an acceptable solution, Genetic Algorithms (GAs) have been widely applied to solve this problem. In these GAs, the reliability values could be calculated in their objective functions. In year 2002, an extended network reliability model was proposed which considers the connection important level between each pair of nodes. This paper proposes an approximation algorithm based on Monte Carlo simulation for the new network reliability model. This approximation algorithm can be integrated into GAs to solve the optimal cost reliable network design problem under the extended model.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116701911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing User-Service Interaction through a Global User-Centric Approach to SOA 通过以全局用户为中心的SOA方法增强用户服务交互
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.37
J. Soriano, D. Lizcano, J. Hierro, M. Reyes, C. Schroth, T. Janner
Considered as enablers of seamless application-to- application integration both within company boundaries and on a global scale, Web Services-based SOAs have traditionally focused on automating service-to-service collaboration. However, they have never featured a "face " to human users. This gap between human users and services still prevents enterprises from realizing how innovations at the SOA front-end help to make people more productive. And, ultimately, it hinders the emergence of a real Web of Services driven by a global, user-centric SOA. In this paper, we revisit the notion of SOA and analyze its major shortcomings with regard to the emergence of a Web of Services enhancing user-service interaction and increased service usability. We then elaborate on novel, currently emerging technologies that facilitate the establishment of the global mesh of interoperable user-centric services. A novel platform architecture is presented that builds on all the key technical enablers.
作为在公司边界和全球范围内实现应用程序到应用程序无缝集成的推动者,基于Web服务的soa传统上专注于自动化服务到服务协作。然而,它们从未向人类用户展示过一张“脸”。人类用户和服务之间的这种差距仍然阻碍企业认识到SOA前端的创新如何帮助人们提高工作效率。而且,最终,它阻碍了由全局的、以用户为中心的SOA驱动的真正的服务Web的出现。在本文中,我们将重新审视SOA的概念,并分析其主要缺点,因为Web of Services的出现增强了用户-服务交互并提高了服务可用性。然后,我们详细介绍了当前新兴的新技术,这些技术有助于建立可互操作的以用户为中心的服务的全球网格。提出了一种基于所有关键技术支持因素的新型平台体系结构。
{"title":"Enhancing User-Service Interaction through a Global User-Centric Approach to SOA","authors":"J. Soriano, D. Lizcano, J. Hierro, M. Reyes, C. Schroth, T. Janner","doi":"10.1109/ICNS.2008.37","DOIUrl":"https://doi.org/10.1109/ICNS.2008.37","url":null,"abstract":"Considered as enablers of seamless application-to- application integration both within company boundaries and on a global scale, Web Services-based SOAs have traditionally focused on automating service-to-service collaboration. However, they have never featured a \"face \" to human users. This gap between human users and services still prevents enterprises from realizing how innovations at the SOA front-end help to make people more productive. And, ultimately, it hinders the emergence of a real Web of Services driven by a global, user-centric SOA. In this paper, we revisit the notion of SOA and analyze its major shortcomings with regard to the emergence of a Web of Services enhancing user-service interaction and increased service usability. We then elaborate on novel, currently emerging technologies that facilitate the establishment of the global mesh of interoperable user-centric services. A novel platform architecture is presented that builds on all the key technical enablers.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114362613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Security and Performance of Mobile XML Web Services 移动XML Web服务的安全性和性能
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.41
Thao Nguyen, I. Jørstad, D. Thanh
The development of new mobile services can benefit from adopting XML Web services technologies, because this can dramatically reduce the time to market for many types of mobile services. However, it is often believed that XML Web services will become too large a bottleneck in service performance, rendering the service unusable, as well as it can compromise service usage due to lack of security features. This paper provides a thorough study of these topics, i.e., a study of the typical performance of mobile services built on top of XML Web services, how security features can be introduced for these services and how these security features influence on the performance of services. The results of this paper should apply to any mobile services implementation based on XML Web services technologies.
新的移动服务的开发可以从采用XML Web服务技术中获益,因为这可以大大缩短许多类型的移动服务的上市时间。然而,人们通常认为XML Web服务将成为服务性能的巨大瓶颈,使服务无法使用,并且由于缺乏安全特性而影响服务的使用。本文对这些主题进行了深入的研究,即研究了基于XML Web服务构建的移动服务的典型性能,如何为这些服务引入安全特性,以及这些安全特性如何影响服务的性能。本文的结果应该适用于任何基于XML Web服务技术的移动服务实现。
{"title":"Security and Performance of Mobile XML Web Services","authors":"Thao Nguyen, I. Jørstad, D. Thanh","doi":"10.1109/ICNS.2008.41","DOIUrl":"https://doi.org/10.1109/ICNS.2008.41","url":null,"abstract":"The development of new mobile services can benefit from adopting XML Web services technologies, because this can dramatically reduce the time to market for many types of mobile services. However, it is often believed that XML Web services will become too large a bottleneck in service performance, rendering the service unusable, as well as it can compromise service usage due to lack of security features. This paper provides a thorough study of these topics, i.e., a study of the typical performance of mobile services built on top of XML Web services, how security features can be introduced for these services and how these security features influence on the performance of services. The results of this paper should apply to any mobile services implementation based on XML Web services technologies.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Generic Approach to Access Network Modeling for Next Generation Network Applications 下一代网络应用接入网络建模的通用方法
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.47
J. Fabini, P. Reichl, A. Poropatich
Quality of Service impairments in wireless and wired access networks for IP-based next generation networks (NGNs) differ fundamentally from the ones which we typically encounter in core networks. Examples include but are not limited to high delay, low bandwidth, and high jitter. Even though most NGN architectures claim to be access-agnostic, applications deployed on NGNs have requirements which may not be met by specific access technologies. This raises the need to test NGN application prototypes on user acceptance for a huge number of possible access technology combinations. Unfortunately, tests relying on real access network implementations are expensive and time-consuming while simulation at physical or logical link layer are subject to complex parameter configuration. In this paper we present a distinct approach which bases on the sound theoretical background of the IETF IP Performance Metric (IPPM) framework. We argue that careful analysis of performance metrics in existing public access networks can capture access network properties which are sufficiently accurate to model "typical" access links at IP-layer level using either emulation or simulation. We propose a three-step model which starts with metric and methodology selection, continues with parameter acquisition by means of measurements in existing access networks, and ends with emulation or simulation of this access network. The goal of our process is to provide NGN application developers with means to automatically test their applications from the very beginning on the compatibility with various access network technologies, covering both, signaling and data streaming aspects of access networks. We illustrate the procedure using performance measurement results of a public UMTS Release 5 network and UMTS access network emulation by an extended open-source delay emulator.
基于ip的下一代网络(ngn)无线和有线接入网中的服务质量损害与我们在核心网络中通常遇到的服务质量损害有着根本的不同。例子包括但不限于高延迟、低带宽和高抖动。尽管大多数NGN架构都声称与访问无关,但部署在NGN上的应用程序可能有特定访问技术无法满足的需求。这就需要针对大量可能的接入技术组合,在用户接受度上测试NGN应用原型。遗憾的是,依赖于真实接入网络实现的测试既昂贵又耗时,而物理或逻辑链路层的模拟受制于复杂的参数配置。在本文中,我们提出了一种独特的方法,它基于IETF IP性能度量(IPPM)框架的良好理论背景。我们认为,对现有公共接入网性能指标的仔细分析可以捕获接入网属性,这些属性足够准确,可以使用仿真或模拟在ip层级别对“典型”接入链路进行建模。我们提出了一个三步模型,从度量和方法选择开始,继续通过现有接入网中的测量来获取参数,最后对该接入网进行仿真或仿真。我们的目标是为NGN应用开发人员提供从一开始就自动测试其应用与各种接入网技术的兼容性的方法,涵盖接入网的信令和数据流方面。我们使用公共UMTS Release 5网络的性能测量结果和扩展的开源延迟模拟器的UMTS接入网仿真来说明该过程。
{"title":"A Generic Approach to Access Network Modeling for Next Generation Network Applications","authors":"J. Fabini, P. Reichl, A. Poropatich","doi":"10.1109/ICNS.2008.47","DOIUrl":"https://doi.org/10.1109/ICNS.2008.47","url":null,"abstract":"Quality of Service impairments in wireless and wired access networks for IP-based next generation networks (NGNs) differ fundamentally from the ones which we typically encounter in core networks. Examples include but are not limited to high delay, low bandwidth, and high jitter. Even though most NGN architectures claim to be access-agnostic, applications deployed on NGNs have requirements which may not be met by specific access technologies. This raises the need to test NGN application prototypes on user acceptance for a huge number of possible access technology combinations. Unfortunately, tests relying on real access network implementations are expensive and time-consuming while simulation at physical or logical link layer are subject to complex parameter configuration. In this paper we present a distinct approach which bases on the sound theoretical background of the IETF IP Performance Metric (IPPM) framework. We argue that careful analysis of performance metrics in existing public access networks can capture access network properties which are sufficiently accurate to model \"typical\" access links at IP-layer level using either emulation or simulation. We propose a three-step model which starts with metric and methodology selection, continues with parameter acquisition by means of measurements in existing access networks, and ends with emulation or simulation of this access network. The goal of our process is to provide NGN application developers with means to automatically test their applications from the very beginning on the compatibility with various access network technologies, covering both, signaling and data streaming aspects of access networks. We illustrate the procedure using performance measurement results of a public UMTS Release 5 network and UMTS access network emulation by an extended open-source delay emulator.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134224931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Handling of Interference Using Power Penalty Analysis and Frequency Assignment Problem Approach in Communication 利用功率惩罚分析和频率分配问题方法处理通信中的干扰
Pub Date : 2008-03-16 DOI: 10.1109/ICNS.2008.40
A. Kulkarni, B. Ambudkar
As communication is making the whole world a global village, there seems to be tremendous pressure on the service providers in this field. The greatest demand is for Quality Of Service (QoS) wherein the most important role is played by Interference. There are numerous parameters leading to interference in both wired and wireless communication. In this paper an attempt is made to minimize interference in wired and wireless communication. In wired, an analysis of All Optical Network is carried out whereas in wireless networks, overall interference is reduced using fundamental approach.
随着通信使整个世界成为一个地球村,这一领域的服务提供商似乎面临着巨大的压力。最大的需求是服务质量(QoS),其中干扰起着最重要的作用。在有线和无线通信中,有许多参数会导致干扰。本文试图在有线和无线通信中尽量减少干扰。在有线网络中,对全光网络进行分析,而在无线网络中,使用基本方法减少总体干扰。
{"title":"Handling of Interference Using Power Penalty Analysis and Frequency Assignment Problem Approach in Communication","authors":"A. Kulkarni, B. Ambudkar","doi":"10.1109/ICNS.2008.40","DOIUrl":"https://doi.org/10.1109/ICNS.2008.40","url":null,"abstract":"As communication is making the whole world a global village, there seems to be tremendous pressure on the service providers in this field. The greatest demand is for Quality Of Service (QoS) wherein the most important role is played by Interference. There are numerous parameters leading to interference in both wired and wireless communication. In this paper an attempt is made to minimize interference in wired and wireless communication. In wired, an analysis of All Optical Network is carried out whereas in wireless networks, overall interference is reduced using fundamental approach.","PeriodicalId":180899,"journal":{"name":"Fourth International Conference on Networking and Services (icns 2008)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Fourth International Conference on Networking and Services (icns 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1