首页 > 最新文献

Journal of Advances in Computer Networks最新文献

英文 中文
An Improved Group Key Agreement Scheme with Privacy Preserving Based on Chaotic Maps 一种改进的混沌映射保密组密钥协议方案
Pub Date : 2018-01-01 DOI: 10.18178/jacn.2018.6.1.245
Chun-Ta Li, C. Weng
The decentralized group key agreement scheme allows a group of participants to exchange private multicast messages via the protection of a group session key in the group. Recently, Zhu proposed the first group authentication key agreement scheme based on chaotic maps and the structure of a group is organized in an ordered chain. Thus each participant needs to establish two temporary two-party session keys with its predecessor and successor in a parallel algorithm. In order to cope with dynamic groups, the group session keys are frequently updated whenever a new member joins or a member leaves the group. Zhu claimed that the proposed scheme is secure against various attacks such as replay, man-in-the-middle, impersonation and key compromise attacks. Furthermore, Zhu extended the proposed scheme to high level security attributes such as privacy preserving, no clock synchronization problem, mutual and group authentication and perfect forward secrecy etc. However, in this paper, we found that Zhu’s scheme is vulnerable to successor impersonation problem and this weakness leads to a malicious adversary from deriving group session keys after impersonate attack. Moreover, their scheme is vulnerable to known key attack and this problem may lead to an adversary to compromise the previous and future group session keys. To overcome these security flaws, in this paper, we significantly improve the security of Zhu’s group key agreement scheme without increasing the communication overhead and computation complexity.
分布式组密钥协议方案允许一组参与者通过保护组内的组会话密钥交换私有多播消息。最近,Zhu提出了第一个基于混沌映射的组认证密钥协议方案,并将组的结构组织在有序链中。因此,每个参与者需要在并行算法中与其前任和后继者建立两个临时的双方会话密钥。为了处理动态组,每当有新成员加入或成员离开组时,就会频繁更新组会话密钥。Zhu声称,所提出的方案是安全的,可以抵御各种攻击,如重放,中间人,冒充和密钥泄露攻击。此外,Zhu还将该方案扩展到隐私保护、无时钟同步问题、互认证和组认证以及完美前向保密等高级安全属性。然而,在本文中,我们发现Zhu的方案容易受到继任者冒充问题的影响,这一弱点导致恶意攻击者在冒充攻击后获取组会话密钥。此外,他们的方案容易受到已知密钥攻击,这个问题可能导致攻击者泄露以前和将来的组会话密钥。为了克服这些安全缺陷,本文在不增加通信开销和计算复杂度的前提下,显著提高了Zhu组密钥协议方案的安全性。
{"title":"An Improved Group Key Agreement Scheme with Privacy Preserving Based on Chaotic Maps","authors":"Chun-Ta Li, C. Weng","doi":"10.18178/jacn.2018.6.1.245","DOIUrl":"https://doi.org/10.18178/jacn.2018.6.1.245","url":null,"abstract":"The decentralized group key agreement scheme allows a group of participants to exchange private multicast messages via the protection of a group session key in the group. Recently, Zhu proposed the first group authentication key agreement scheme based on chaotic maps and the structure of a group is organized in an ordered chain. Thus each participant needs to establish two temporary two-party session keys with its predecessor and successor in a parallel algorithm. In order to cope with dynamic groups, the group session keys are frequently updated whenever a new member joins or a member leaves the group. Zhu claimed that the proposed scheme is secure against various attacks such as replay, man-in-the-middle, impersonation and key compromise attacks. Furthermore, Zhu extended the proposed scheme to high level security attributes such as privacy preserving, no clock synchronization problem, mutual and group authentication and perfect forward secrecy etc. However, in this paper, we found that Zhu’s scheme is vulnerable to successor impersonation problem and this weakness leads to a malicious adversary from deriving group session keys after impersonate attack. Moreover, their scheme is vulnerable to known key attack and this problem may lead to an adversary to compromise the previous and future group session keys. To overcome these security flaws, in this paper, we significantly improve the security of Zhu’s group key agreement scheme without increasing the communication overhead and computation complexity.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123943949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does the IEEE 802.15.4 MAC Protocol Work Well in Wireless Body Area Networks IEEE 802.15.4 MAC协议在无线体域网络中工作良好吗
Pub Date : 2016-03-01 DOI: 10.18178/JACN.2016.4.1.203
Sabita Nepal, Saurav Dahal, Seokjoo Shin
The IEEE 802.15.4 MAC protocol is the standard for Low-rate wireless personal area networks and is widely used in testbeds and simulation for wireless body area networks. Due to effective handling of some features such as low power communication and low data rates, this protocol is widely used for WBAN applications. However, it is not enough to support high data rates applications (>250 Kbps). In this article, feasibility of IEEE 802.15.4 MAC in the areas of Wireless Body Area Network (WBAN) will be studied. By presenting the challenging issues of WBAN and by giving extensive reasoning, it can be concluded that IEEE 802.15.4 MAC can be used in WBAN to some extent but to guarantee near optimum result, still some modifications are required.
IEEE 802.15.4 MAC协议是低速率无线个人区域网络的标准,广泛应用于无线体域网络的试验台和仿真。由于有效地处理了低功耗通信和低数据速率等特点,该协议被广泛应用于WBAN应用。但是,它不足以支持高数据速率应用程序(>250 Kbps)。本文将研究IEEE 802.15.4 MAC在无线体域网络(WBAN)领域的可行性。通过对WBAN的难点问题的分析和广泛的论证,得出IEEE 802.15.4 MAC在一定程度上是可以应用于WBAN的,但为了保证接近最优的效果,还需要进行一些修改。
{"title":"Does the IEEE 802.15.4 MAC Protocol Work Well in Wireless Body Area Networks","authors":"Sabita Nepal, Saurav Dahal, Seokjoo Shin","doi":"10.18178/JACN.2016.4.1.203","DOIUrl":"https://doi.org/10.18178/JACN.2016.4.1.203","url":null,"abstract":"The IEEE 802.15.4 MAC protocol is the standard for Low-rate wireless personal area networks and is widely used in testbeds and simulation for wireless body area networks. Due to effective handling of some features such as low power communication and low data rates, this protocol is widely used for WBAN applications. However, it is not enough to support high data rates applications (>250 Kbps). In this article, feasibility of IEEE 802.15.4 MAC in the areas of Wireless Body Area Network (WBAN) will be studied. By presenting the challenging issues of WBAN and by giving extensive reasoning, it can be concluded that IEEE 802.15.4 MAC can be used in WBAN to some extent but to guarantee near optimum result, still some modifications are required.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133636296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Clustering and Feature Selection Technique for Improving Internet Traffic Classification Using K-NN 基于K-NN改进互联网流量分类的聚类和特征选择技术
Pub Date : 2016-03-01 DOI: 10.18178/JACN.2016.4.1.198
Trianggoro Wiradinata, A. Paramita
This research will use the algorithm K-Nearest Neighbour (K-NN) to classify internet data traffic, K-NN is suitable for large amounts of data and can produce a more accurate classification, K-NN algorithm has a weakness takes computing high because K-NN algorithm calculating the distance of all existing data. One solution to overcome these weaknesses is to do the clustering process before the classification process, because the clustering process does not require high computing time, clustering algorithm that can be used is Fuzzy C-Mean algorithm, the Fuzzy C-Mean algorithm does not need to be determined in first number of clusters to be formed, clusters that form on this algorithm will be formed naturally based datasets be entered, but the algorithm Fuzzy C-Mean has the disadvantage of clustering results obtained are often not the same even though the same input data, this is because the initial dataset that of the Fuzzy C-Mean is not optimal, to optimize initial datasets in this research using feature selection algorithm, after main feature of dataset selected the output from fuzzy C-Mean become consistent. Selection of the features is a method that is expected to provide an initial dataset that is optimum for the algorithm Fuzzy C-Means. Algorithms for feature selection in this study used are Principal Component Analysis (PCA). PCA reduced non significant attribute to created optimal dataset and can improve performance clustering and classification algorithm. Results in this study is an combining method of classification, clustering and feature extraction of data, these three methods successfully modeled to generate a data classification method of internet bandwidth usage that has high accuracy and have a fast performance.
本研究将使用k -最近邻(K-NN)算法对互联网数据流量进行分类,K-NN适用于大量数据,可以产生更准确的分类,K-NN算法有一个缺点,因为K-NN算法计算所有现有数据的距离,计算量很高。克服这些缺点的一种解决方法是在分类过程之前做聚类过程,因为聚类过程不需要很高的计算时间,可以使用的聚类算法是模糊c -均值算法,模糊c -均值算法不需要在首先确定要形成的聚类数量,在此算法上形成的聚类自然会形成基于数据集的输入。但模糊C-Mean算法的缺点是即使输入相同的数据,得到的聚类结果往往也不相同,这是因为模糊C-Mean的初始数据集不是最优的,本研究使用特征选择算法来优化初始数据集,在数据集的主要特征选择后,从模糊C-Mean中输出的结果趋于一致。特征的选择是一种期望为模糊c均值算法提供最优初始数据集的方法。本研究中使用的特征选择算法是主成分分析(PCA)。PCA通过减少非显著属性来创建最优数据集,可以提高聚类和分类算法的性能。本研究的结果是将数据的分类、聚类和特征提取相结合,成功地对这三种方法进行建模,生成了一种准确率高、性能快的互联网带宽使用数据分类方法。
{"title":"Clustering and Feature Selection Technique for Improving Internet Traffic Classification Using K-NN","authors":"Trianggoro Wiradinata, A. Paramita","doi":"10.18178/JACN.2016.4.1.198","DOIUrl":"https://doi.org/10.18178/JACN.2016.4.1.198","url":null,"abstract":"This research will use the algorithm K-Nearest Neighbour (K-NN) to classify internet data traffic, K-NN is suitable for large amounts of data and can produce a more accurate classification, K-NN algorithm has a weakness takes computing high because K-NN algorithm calculating the distance of all existing data. One solution to overcome these weaknesses is to do the clustering process before the classification process, because the clustering process does not require high computing time, clustering algorithm that can be used is Fuzzy C-Mean algorithm, the Fuzzy C-Mean algorithm does not need to be determined in first number of clusters to be formed, clusters that form on this algorithm will be formed naturally based datasets be entered, but the algorithm Fuzzy C-Mean has the disadvantage of clustering results obtained are often not the same even though the same input data, this is because the initial dataset that of the Fuzzy C-Mean is not optimal, to optimize initial datasets in this research using feature selection algorithm, after main feature of dataset selected the output from fuzzy C-Mean become consistent. Selection of the features is a method that is expected to provide an initial dataset that is optimum for the algorithm Fuzzy C-Means. Algorithms for feature selection in this study used are Principal Component Analysis (PCA). PCA reduced non significant attribute to created optimal dataset and can improve performance clustering and classification algorithm. Results in this study is an combining method of classification, clustering and feature extraction of data, these three methods successfully modeled to generate a data classification method of internet bandwidth usage that has high accuracy and have a fast performance.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125213107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TXOP Combinatorial Problem in IEEE 802.11e HCCA Networks IEEE 802.11e HCCA网络中的TXOP组合问题
Pub Date : 2015-12-01 DOI: 10.18178/JACN.2015.3.4.185
Ming-Hua Cheng, Cheng-Han Lin, W. Hwang, Feng-Cheng Yu
The Hybrid Coordination Function (HCF) was proposed in IEEE 802.11e, including the competition-based Enhanced Distributed Channel Access (EDCA) and polling-based HCF Controlled Channel Access (HCCA). This paper mainly carries on the research in the HCCA mechanism. In the HCCA mechanism, the Sample Scheduler offers a way to determine the time duration of the Transmission Opportunity (TXOP). The determination of TXOP is calculated by the equation according to two parameters of transmission, including the Mean Data Rate and Packet Size. Next, Sample Scheduler distributes the result of the TXOP to the QSTA. However, QSTAs are not able to completely utilize the allocated TXOP, which causes the waste of remaining TXOPs. The remaining TXOPs of each QSTA are wasted. Therefore, this paper focuses on allocating the remaining TXOP to QSTAs that can transmits more data packets and reduces the packet dropped rate. The simulation results show that the proposed scheme increases the system throughput and decreases the packet loss rate by utilizing the remaining TXOP.
IEEE 802.11e中提出了混合协调功能(HCF),包括基于竞争的增强型分布式信道接入(EDCA)和基于轮询的HCF控制信道接入(HCCA)。本文主要对HCCA机制进行研究。在HCCA机制中,样本调度程序提供了一种确定传输机会(TXOP)持续时间的方法。根据平均数据速率和数据包大小这两个传输参数,通过方程计算出TXOP的确定。接下来,Sample Scheduler将TXOP的结果分发给QSTA。然而,qsta不能完全利用分配的TXOP,这导致了剩余TXOP的浪费。每个QSTA的剩余TXOPs都被浪费了。因此,本文的重点是将剩余的TXOP分配给能够传输更多数据包并降低丢包率的qsta。仿真结果表明,该方案利用剩余的TXOP,提高了系统吞吐量,降低了丢包率。
{"title":"TXOP Combinatorial Problem in IEEE 802.11e HCCA Networks","authors":"Ming-Hua Cheng, Cheng-Han Lin, W. Hwang, Feng-Cheng Yu","doi":"10.18178/JACN.2015.3.4.185","DOIUrl":"https://doi.org/10.18178/JACN.2015.3.4.185","url":null,"abstract":"The Hybrid Coordination Function (HCF) was proposed in IEEE 802.11e, including the competition-based Enhanced Distributed Channel Access (EDCA) and polling-based HCF Controlled Channel Access (HCCA). This paper mainly carries on the research in the HCCA mechanism. In the HCCA mechanism, the Sample Scheduler offers a way to determine the time duration of the Transmission Opportunity (TXOP). The determination of TXOP is calculated by the equation according to two parameters of transmission, including the Mean Data Rate and Packet Size. Next, Sample Scheduler distributes the result of the TXOP to the QSTA. However, QSTAs are not able to completely utilize the allocated TXOP, which causes the waste of remaining TXOPs. The remaining TXOPs of each QSTA are wasted. Therefore, this paper focuses on allocating the remaining TXOP to QSTAs that can transmits more data packets and reduces the packet dropped rate. The simulation results show that the proposed scheme increases the system throughput and decreases the packet loss rate by utilizing the remaining TXOP.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125992067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Threats of URL Shortening: A User's Perspective URL缩短的安全威胁:一个用户的视角
Pub Date : 2015-07-07 DOI: 10.7763/JACN.2015.V3.169
Nhien-An Le-Khac, Mohand Tahar Kechadi
2015 International Conference on Knowledge and Education Technology, Bangkok, Thailand, 6-7 July 2015
2015年知识与教育技术国际会议,泰国曼谷,2015年7月6-7日
{"title":"Security Threats of URL Shortening: A User's Perspective","authors":"Nhien-An Le-Khac, Mohand Tahar Kechadi","doi":"10.7763/JACN.2015.V3.169","DOIUrl":"https://doi.org/10.7763/JACN.2015.V3.169","url":null,"abstract":"2015 International Conference on Knowledge and Education Technology, Bangkok, Thailand, 6-7 July 2015","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117309472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forecasting network activities using ARIMA method 使用ARIMA方法预测网络活动
Pub Date : 2014-09-03 DOI: 10.7763/JACN.2014.V2.106
H. Haviluddin, R. Alfred
This paper presents an approach for a network traffic characterization by using an ARIMA (Autoregressive Integrated Moving Average) technique. The dataset used in this study is obtained from the internet network traffic activities of the Mulawarman University for a period of a week. The results are obtained using the Box-Jenkins Methodology. The Box-Jenkins methodology consists of five ARIMA models which include ARIMA (2, 1, 1) (1, 1, 1) ¹², ARIMA (1, 1, 1) (1, 1, 1) ¹², ARIMA (2, 1, 0) (1, 1, 1) ¹², ARIMA (0, 1, 0) (1, 1, 1) ¹², and ARIMA (0, 1, 0) (1, 2, 1) ¹². In this paper, ARIMA (0, 1, 0) (1, 2, 1) ¹² was selected as the best model that can be used to model the internet network traffic.
本文提出了一种利用ARIMA(自回归综合移动平均)技术表征网络流量的方法。本研究使用的数据集来自Mulawarman大学为期一周的互联网网络流量活动。使用Box-Jenkins方法获得结果。Box-Jenkins方法包括五个ARIMA模型包括ARIMA(2, 1, 1)(1, 1, 1)¹²,ARIMA(1, 1, 1)(1, 1, 1)¹²,ARIMA(2 1 0)(1, 1, 1)¹²,ARIMA(0,1,0)(1, 1, 1)¹²,,ARIMA(0,1,0)(1、2、1)¹²。本文选择ARIMA (0,1,0) (1,2,1) ¹²作为可用于互联网网络流量建模的最佳模型。
{"title":"Forecasting network activities using ARIMA method","authors":"H. Haviluddin, R. Alfred","doi":"10.7763/JACN.2014.V2.106","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.106","url":null,"abstract":"This paper presents an approach for a network traffic characterization by using an ARIMA (Autoregressive Integrated Moving Average) technique. The dataset used in this study is obtained from the internet network traffic activities of the Mulawarman University for a period of a week. The results are obtained using the Box-Jenkins Methodology. The Box-Jenkins methodology consists of five ARIMA models which include ARIMA (2, 1, 1) (1, 1, 1) ¹², ARIMA (1, 1, 1) (1, 1, 1) ¹², ARIMA (2, 1, 0) (1, 1, 1) ¹², ARIMA (0, 1, 0) (1, 1, 1) ¹², and ARIMA (0, 1, 0) (1, 2, 1) ¹². In this paper, ARIMA (0, 1, 0) (1, 2, 1) ¹² was selected as the best model that can be used to model the internet network traffic.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Design of application layer services for security automation via a web service approach 通过web服务方法设计用于安全自动化的应用层服务
Pub Date : 2014-03-01 DOI: 10.7763/JACN.2014.V2.86
K. Hee, C. Ho
N-tier application design has become very common in the IT industry. Each individual layer, such as the application and data layer has its own main functionality. This design is very helpful in securing the application from unauthorized access and in protecting it from attacks to the data layer. The data layer is the core of a company's business, as all the important information of the company will be stored in the data layer and normally will be located in a secured off- line server with limited local network access. The application layer acts as the medium to exchange data between the client layer and the data layer over a network. As such, the application layer has been increasingly targeted for intrusion and attacks. This paper will introduce a method to minimize the security risks in the n-tier application design. The method introduced in this paper will mainly focus on how to secure the application layer from various attacks such as Denial of Services (DoS) attack and spoofing attacks. This is achieved through data protection such as random encryption key generation, data encryption etc. and so forth at both the client application and the application layer. 
n层应用程序设计在IT行业中已经变得非常普遍。每个单独的层,比如应用程序层和数据层,都有自己的主要功能。这种设计在保护应用程序免受未经授权的访问和保护它免受数据层的攻击方面非常有用。数据层是公司业务的核心,因为公司的所有重要信息都会存储在数据层中,通常会位于一个安全的离线服务器上,限制本地网络访问。应用层充当媒介,通过网络在客户端层和数据层之间交换数据。因此,应用层越来越多地成为入侵和攻击的目标。本文将介绍一种在n层应用程序设计中最小化安全风险的方法。本文介绍的方法主要关注如何保护应用层免受各种攻击,如拒绝服务(DoS)攻击和欺骗攻击。这是通过客户端应用程序和应用层的随机加密密钥生成、数据加密等数据保护来实现的。
{"title":"Design of application layer services for security automation via a web service approach","authors":"K. Hee, C. Ho","doi":"10.7763/JACN.2014.V2.86","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.86","url":null,"abstract":"N-tier application design has become very common in the IT industry. Each individual layer, such as the application and data layer has its own main functionality. This design is very helpful in securing the application from unauthorized access and in protecting it from attacks to the data layer. The data layer is the core of a company's business, as all the important information of the company will be stored in the data layer and normally will be located in a secured off- line server with limited local network access. The application layer acts as the medium to exchange data between the client layer and the data layer over a network. As such, the application layer has been increasingly targeted for intrusion and attacks. This paper will introduce a method to minimize the security risks in the n-tier application design. The method introduced in this paper will mainly focus on how to secure the application layer from various attacks such as Denial of Services (DoS) attack and spoofing attacks. This is achieved through data protection such as random encryption key generation, data encryption etc. and so forth at both the client application and the application layer. ","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117198024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting Access and Aggregation Network Architecture 重新审视接入和聚合网络架构
Pub Date : 2014-01-10 DOI: 10.7763/JACN.2014.V2.104
M. Feknous, B. L. Guyader, A. Gravey
Optical technologies allow the end-user to take advantage of a very high bitrate access. This in turn modifies traffic patterns to be supported by access and aggregation (metro) networks. The present paper first proposes tentative traffic scenarios to assess future capacity requirements for these networks. It is shown that the current aggregation architecture based on primary and secondary aggregation rings should be reconsidered to limit potential bottlenecks and to take account of both infrastructure costs and potential energy savings. The paper then presents alternative architectures to revise and move the boundaries existing today between access and aggregation networks. A first alternative architecture is fully centralized and performs traffic aggregation in a central location. The second alternative architecture proposes to locate the first aggregation points (called "Next Generation Points of Presence") on the primary aggregation ring and to centralize control functions.
光学技术允许终端用户利用非常高的比特率访问。这反过来又修改了访问和聚合(城域)网络所支持的流量模式。本文首先提出了初步的流量设想,以评估这些网络未来的容量需求。研究表明,当前基于主环和次环的聚合体系结构应该重新考虑,以限制潜在的瓶颈,并考虑基础设施成本和潜在的节能。然后,本文提出了替代架构,以修改和移动目前在接入和聚合网络之间存在的边界。第一种可选架构是完全集中的,并在中心位置执行流量聚合。第二种备选架构建议在主聚合环上定位第一个聚合点(称为“下一代存在点”),并集中控制功能。
{"title":"Revisiting Access and Aggregation Network Architecture","authors":"M. Feknous, B. L. Guyader, A. Gravey","doi":"10.7763/JACN.2014.V2.104","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.104","url":null,"abstract":"Optical technologies allow the end-user to take advantage of a very high bitrate access. This in turn modifies traffic patterns to be supported by access and aggregation (metro) networks. The present paper first proposes tentative traffic scenarios to assess future capacity requirements for these networks. It is shown that the current aggregation architecture based on primary and secondary aggregation rings should be reconsidered to limit potential bottlenecks and to take account of both infrastructure costs and potential energy savings. The paper then presents alternative architectures to revise and move the boundaries existing today between access and aggregation networks. A first alternative architecture is fully centralized and performs traffic aggregation in a central location. The second alternative architecture proposes to locate the first aggregation points (called \"Next Generation Points of Presence\") on the primary aggregation ring and to centralize control functions.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122341139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Real-Time Offset Error Compensation of 6D IMU Mounted on Ground Vehicles Using Disturbance Observer 利用扰动观测器实时补偿地面车辆6D IMU的偏移误差
Pub Date : 2013-02-03 DOI: 10.7763/JACN.2013.V1.18
J. Oh, Y. Noh, Seibum B. Choi
This paper mainly deals with the offset error compensation algorithm related with the 6D IMU (inertial measurement unit) that measures the linear accelerations and angular velocities about the longitudinal, lateral, and vertical axis of ground vehicles. It is assumed that the independent wheel speed data and steering wheel angle information are provided for the sensor compensation algorithm. Using a disturbance observer, through designing a linear model and inverse model of the vehicle motion, the offset errors of the accelerometers are estimated. The stability of the entire compensational system is verified, and finally, the performance of the suggested algorithm is tested based on a well-known vehicle dynamics simulation tool, CarSim.
本文主要研究与测量地面车辆在纵、横、纵轴上的线加速度和角速度的6D惯性测量单元(IMU)相关的偏移误差补偿算法。假设为传感器补偿算法提供了独立的轮速数据和方向盘角度信息。利用扰动观测器,通过设计车辆运动的线性模型和逆模型,估计加速度计的偏移误差。验证了整个补偿系统的稳定性,最后,基于著名的车辆动力学仿真工具CarSim对所提算法的性能进行了测试。
{"title":"Real-Time Offset Error Compensation of 6D IMU Mounted on Ground Vehicles Using Disturbance Observer","authors":"J. Oh, Y. Noh, Seibum B. Choi","doi":"10.7763/JACN.2013.V1.18","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.18","url":null,"abstract":"This paper mainly deals with the offset error compensation algorithm related with the 6D IMU (inertial measurement unit) that measures the linear accelerations and angular velocities about the longitudinal, lateral, and vertical axis of ground vehicles. It is assumed that the independent wheel speed data and steering wheel angle information are provided for the sensor compensation algorithm. Using a disturbance observer, through designing a linear model and inverse model of the vehicle motion, the offset errors of the accelerometers are estimated. The stability of the entire compensational system is verified, and finally, the performance of the suggested algorithm is tested based on a well-known vehicle dynamics simulation tool, CarSim.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on Time Division Multi-channel p-Persistent CSMA Based on Binary Trees Conflict Resolution Mechanism 基于二叉树的分时多通道p-Persistent CSMA冲突解决机制研究
Pub Date : 1900-01-01 DOI: 10.18178/jacn.2016.4.2.213
Yifan Zhao
{"title":"Research on Time Division Multi-channel p-Persistent CSMA Based on Binary Trees Conflict Resolution Mechanism","authors":"Yifan Zhao","doi":"10.18178/jacn.2016.4.2.213","DOIUrl":"https://doi.org/10.18178/jacn.2016.4.2.213","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115213582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Advances in Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1