Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185845
Md Azizur Rahman, A. Pakstas, Frank Wang
There are available commercial and education network analysis, design, simulation and discovery tools in the market. They help the users/designers in many aspect but different tools are developed for different purposes. Thus, very often such tools are addressing different issues in the network design process, which are complementary to each other. Therefore, these tools can be used in a manner of complementing to each other to cover all aspects of user requirement and because of that there is a genuine need to integrate such tools. This paper is dedicated to the problem of integrating such independently developed network planning, network design and network simulation tools. It is looking at the problem of network meta description language as well as at principles of defining such language using current experience of various tools. Examples of the meta language definitions are shown as well as principles of building a software for conversion between different network models are illustrated.
{"title":"An approach to integration of network design and simulation tools","authors":"Md Azizur Rahman, A. Pakstas, Frank Wang","doi":"10.1109/CONTEL.2005.185845","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185845","url":null,"abstract":"There are available commercial and education network analysis, design, simulation and discovery tools in the market. They help the users/designers in many aspect but different tools are developed for different purposes. Thus, very often such tools are addressing different issues in the network design process, which are complementary to each other. Therefore, these tools can be used in a manner of complementing to each other to cover all aspects of user requirement and because of that there is a genuine need to integrate such tools. This paper is dedicated to the problem of integrating such independently developed network planning, network design and network simulation tools. It is looking at the problem of network meta description language as well as at principles of defining such language using current experience of various tools. Examples of the meta language definitions are shown as well as principles of building a software for conversion between different network models are illustrated.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132222323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185972
M. Bagić, M. Kunstic
Network management of multi-agent system could be provided by FIPA agents communicating via ACL (Agent Communicating Language) messages. Such agents can significantly enhance the possibility of dynamic network negotiation and optimization, i.e. reduce dependency on network availability and reliability, encapsulating these functionalities in ACL messages. Here we offer formal specification of such agents using Coloured Petri Nets (CPN) in order to support their validation and verification. We model inter-agent communication via ACL messages specified by Petri colours. We also give an insight into a correlation between informal (AUML Sequnce Diagram) and formal (CPN Tools Diagram) modelling techniques with suggestion on their merging.
多智能体系统的网络管理可以由FIPA代理通过ACL (Agent communication Language)消息进行通信来实现。这些代理可以显著增强动态网络协商和优化的可能性,即减少对网络可用性和可靠性的依赖,将这些功能封装在ACL消息中。在这里,我们使用彩色Petri网(CPN)提供此类代理的正式规范,以支持其验证和验证。我们通过由Petri颜色指定的ACL消息对代理间通信进行建模。我们还深入了解了非正式(AUML序列图)和正式(CPN工具图)建模技术之间的相关性,并提出了合并它们的建议。
{"title":"Reducing dependency on network reliability and availability by encapsulating the negotiation functionalities in ACL messages","authors":"M. Bagić, M. Kunstic","doi":"10.1109/CONTEL.2005.185972","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185972","url":null,"abstract":"Network management of multi-agent system could be provided by FIPA agents communicating via ACL (Agent Communicating Language) messages. Such agents can significantly enhance the possibility of dynamic network negotiation and optimization, i.e. reduce dependency on network availability and reliability, encapsulating these functionalities in ACL messages. Here we offer formal specification of such agents using Coloured Petri Nets (CPN) in order to support their validation and verification. We model inter-agent communication via ACL messages specified by Petri colours. We also give an insight into a correlation between informal (AUML Sequnce Diagram) and formal (CPN Tools Diagram) modelling techniques with suggestion on their merging.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134187951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185905
M. Hassinen
Our main contribution is confidentiality, integrity and authentication in SMS (Short Message Services). We will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware. Also, we will show how to authenticate the sender of a message and how to ensure that the message has not been tampered with. Programming language Java is used for the realization of our goals. This paper describes the application solution, while details for the encryption methods are described in the referenced articles.
{"title":"SafeSMS - end-to-end encryption for SMS","authors":"M. Hassinen","doi":"10.1109/CONTEL.2005.185905","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185905","url":null,"abstract":"Our main contribution is confidentiality, integrity and authentication in SMS (Short Message Services). We will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware. Also, we will show how to authenticate the sender of a message and how to ensure that the message has not been tampered with. Programming language Java is used for the realization of our goals. This paper describes the application solution, while details for the encryption methods are described in the referenced articles.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132284015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185871
M. Hillenbrand, J. Gøtze, J. Muller, P. Muller
The basic specifications of Web services com- pletely ignore the need for secure services that are based on a solid authentication and authorization infrastructure. An enhancement of the basic specifications is in progress, but takes time to complete. A large-scale application built today is still in need of an authentication and authorization infrastructure to offer its services to the customers of the service provider and only to the customers. In the following such an infrastructure is described that is able to empower Web services to properly handle authentication and authorization. This infrastructure is designed as services that can be used by any Web service needing authentication and authorization.
{"title":"A single sign-on framework for web-services-based distributed applications","authors":"M. Hillenbrand, J. Gøtze, J. Muller, P. Muller","doi":"10.1109/CONTEL.2005.185871","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185871","url":null,"abstract":"The basic specifications of Web services com- pletely ignore the need for secure services that are based on a solid authentication and authorization infrastructure. An enhancement of the basic specifications is in progress, but takes time to complete. A large-scale application built today is still in need of an authentication and authorization infrastructure to offer its services to the customers of the service provider and only to the customers. In the following such an infrastructure is described that is able to empower Web services to properly handle authentication and authorization. This infrastructure is designed as services that can be used by any Web service needing authentication and authorization.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185816
V.S. Kaulgud, S.A. Mondal
Low latency handoff is critical for supporting delay sensitive applications on a mobile device. Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, we explore how this "multihoming" feature effectively reduces handoff latency and corresponding packet loss. We present a number of strategies for link layer handoff. In the proposed scheme, link-layer association procedures and MIP handoff operations are performed proactively to reduce the handoff delay. The paper presents an analysis of the scheme and experimental results based on simulation using ns-2. The results substantiate the efficacy of the scheme in reducing the handoff delay significantly. Keywords—low latency handoff, multihoming, seamless mobility.
{"title":"Exploiting multihoming for low latency handoff in heterogeneous networks","authors":"V.S. Kaulgud, S.A. Mondal","doi":"10.1109/CONTEL.2005.185816","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185816","url":null,"abstract":"Low latency handoff is critical for supporting delay sensitive applications on a mobile device. Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, we explore how this \"multihoming\" feature effectively reduces handoff latency and corresponding packet loss. We present a number of strategies for link layer handoff. In the proposed scheme, link-layer association procedures and MIP handoff operations are performed proactively to reduce the handoff delay. The paper presents an analysis of the scheme and experimental results based on simulation using ns-2. The results substantiate the efficacy of the scheme in reducing the handoff delay significantly. Keywords—low latency handoff, multihoming, seamless mobility.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115513945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185834
A. Guitton, J. Moulierac
IP multicast is not widely deployed yet over Internet. This is mainly due to the forwarding entries scalability and control explosion problems. In this paper, we propose an algorithm called STA (Scalable Tree Aggregation) which reduces the number of trees by allowing several groups to be aggregated to the same tree: the less trees, the less forwarding entries and the less control messages to maintain trees. STA performs faster aggregations than previous aggregation algorithms by evaluating fewer trees for each group, while keeping the same performance. We show the scalability and the fastness of STA by extensive simulations and we compare its performance to the previous algorithm.
{"title":"Scalable tree aggregation for multicast","authors":"A. Guitton, J. Moulierac","doi":"10.1109/CONTEL.2005.185834","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185834","url":null,"abstract":"IP multicast is not widely deployed yet over Internet. This is mainly due to the forwarding entries scalability and control explosion problems. In this paper, we propose an algorithm called STA (Scalable Tree Aggregation) which reduces the number of trees by allowing several groups to be aggregated to the same tree: the less trees, the less forwarding entries and the less control messages to maintain trees. STA performs faster aggregations than previous aggregation algorithms by evaluating fewer trees for each group, while keeping the same performance. We show the scalability and the fastness of STA by extensive simulations and we compare its performance to the previous algorithm.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185837
O. Laouamri, C. Aktouf
This paper describes a way of monitoring and testing embedded cores within a System On a Chip (SoC) through classical network management protocols. All embedded cores can be tested and monitored through the hardware-based SNMP (Simple Network Management Protocol) proxy agent implemented within an SoC. The basic idea of this work is to extrapolate the advantages of network management functions (monitoring, control, test…) to the chip level. The proposed approach is described and its efficiency is illustrated through extensive experimentations.
{"title":"Hardware-based network management framework for monitoring and testing of system-on-chips","authors":"O. Laouamri, C. Aktouf","doi":"10.1109/CONTEL.2005.185837","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185837","url":null,"abstract":"This paper describes a way of monitoring and testing embedded cores within a System On a Chip (SoC) through classical network management protocols. All embedded cores can be tested and monitored through the hardware-based SNMP (Simple Network Management Protocol) proxy agent implemented within an SoC. The basic idea of this work is to extrapolate the advantages of network management functions (monitoring, control, test…) to the chip level. The proposed approach is described and its efficiency is illustrated through extensive experimentations.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124106538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185849
W. Xie, Shuang Li, Jianhua Zhang, Ping Zhang
The paper proposes a novel estimation scheme of carrier frequency offset (CFO) based on Added Preamble Sequence Semi-Blind (APSSB) scheme. The proposed maximum-likelihood (ML) CFO estimator is based on APSSB OFDMA model in which Gold sequence is added to the output of IFFT modulator and exploited for CFO estimation at the receiver. CFO estimators based on APSSB scheme and preamble are compared by both SINR analysis and simulation. We propose that the APPSB scheme should be employed for fine frequency synchronization in OFDMA especially in delay-insensitive service. In this paper, we propose the APSSB OFDMA model in which APSSB sequence is added to the output of IFFT modulator. The APSSB sequence is exploited for CFO estimation by correlation detection with the local APSSB sequence at the receiver. Comparison of SINR is made between CFO estimation schemes based on APSSB and preamble. The APSSB scheme suffers no data rate loss, and is more accurate than preamble scheme when APSSB symbol number for CFO estimation is large enough to excess the threshold. Compared with preamble scheme, the APPSB scheme has the property of better accuracy as well as larger delay. We propose the APPSB scheme should be employed for fine frequency synchronization in delay-insensitive service. The rest sections of the paper are organized as follows. In Section 2, the proposed APSSB OFDMA system model is described. Based on this model, section 3 presents the ML CFO estimation scheme based on APSSB. A comparison is made in section 4 in terms of SINR of the two schemes in fading channel. Simulation and analysis are presented in section 5. Finally, section 6 concludes the paper.
{"title":"Comparison of ML carrier estimation schemes based on APSSB and preamble for OFDMA in fading channel","authors":"W. Xie, Shuang Li, Jianhua Zhang, Ping Zhang","doi":"10.1109/CONTEL.2005.185849","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185849","url":null,"abstract":"The paper proposes a novel estimation scheme of carrier frequency offset (CFO) based on Added Preamble Sequence Semi-Blind (APSSB) scheme. The proposed maximum-likelihood (ML) CFO estimator is based on APSSB OFDMA model in which Gold sequence is added to the output of IFFT modulator and exploited for CFO estimation at the receiver. CFO estimators based on APSSB scheme and preamble are compared by both SINR analysis and simulation. We propose that the APPSB scheme should be employed for fine frequency synchronization in OFDMA especially in delay-insensitive service. In this paper, we propose the APSSB OFDMA model in which APSSB sequence is added to the output of IFFT modulator. The APSSB sequence is exploited for CFO estimation by correlation detection with the local APSSB sequence at the receiver. Comparison of SINR is made between CFO estimation schemes based on APSSB and preamble. The APSSB scheme suffers no data rate loss, and is more accurate than preamble scheme when APSSB symbol number for CFO estimation is large enough to excess the threshold. Compared with preamble scheme, the APPSB scheme has the property of better accuracy as well as larger delay. We propose the APPSB scheme should be employed for fine frequency synchronization in delay-insensitive service. The rest sections of the paper are organized as follows. In Section 2, the proposed APSSB OFDMA system model is described. Based on this model, section 3 presents the ML CFO estimation scheme based on APSSB. A comparison is made in section 4 in terms of SINR of the two schemes in fading channel. Simulation and analysis are presented in section 5. Finally, section 6 concludes the paper.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"407 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120882307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-06-15DOI: 10.1109/CONTEL.2005.185813
D. Zagar, S. Vidaković
IPv6 provides many new possibilities and features and also enables significant improvements in confidentiality of information transmitted through the network. Many modifications implemented in IPv6 are expected to directly or indirectly improve security environment for devices connected to both public and private networks. Security features developed for IPv6 are known as IP Security (IPsec). This protocol assures a certain level of security, but does not solve all existing security issues. In this paper methods for network security improvement by implementation of firewalls and intrusion detection systems were analyzed. Furthermore, the methods for ensuring privacy in IPv6 were evaluated and available tools were analyzed. Security tests were done and comments of their results were given. Finally, suggestions about network security improvement and implementation of security mechanisms in IPv6 networks were given.
{"title":"IPv6 security: improvements and implementation aspects","authors":"D. Zagar, S. Vidaković","doi":"10.1109/CONTEL.2005.185813","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185813","url":null,"abstract":"IPv6 provides many new possibilities and features and also enables significant improvements in confidentiality of information transmitted through the network. Many modifications implemented in IPv6 are expected to directly or indirectly improve security environment for devices connected to both public and private networks. Security features developed for IPv6 are known as IP Security (IPsec). This protocol assures a certain level of security, but does not solve all existing security issues. In this paper methods for network security improvement by implementation of firewalls and intrusion detection systems were analyzed. Furthermore, the methods for ensuring privacy in IPv6 were evaluated and available tools were analyzed. Security tests were done and comments of their results were given. Finally, suggestions about network security improvement and implementation of security mechanisms in IPv6 networks were given.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}