首页 > 最新文献

Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.最新文献

英文 中文
Dibbler - a portable dynamic host configuration protocol for IPv6 implementation 一个可移植的动态主机配置协议,用于IPv6的实现
T. Mrugalski
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+ -... | . . . . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+ -...| . . . . . .+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
{"title":"Dibbler - a portable dynamic host configuration protocol for IPv6 implementation","authors":"T. Mrugalski","doi":"10.1109/CONTEL.2005.185821","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185821","url":null,"abstract":"+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | | | | | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+ -... | . . . . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to integration of network design and simulation tools 一种网络设计与仿真工具集成的方法
Md Azizur Rahman, A. Pakstas, Frank Wang
There are available commercial and education network analysis, design, simulation and discovery tools in the market. They help the users/designers in many aspect but different tools are developed for different purposes. Thus, very often such tools are addressing different issues in the network design process, which are complementary to each other. Therefore, these tools can be used in a manner of complementing to each other to cover all aspects of user requirement and because of that there is a genuine need to integrate such tools. This paper is dedicated to the problem of integrating such independently developed network planning, network design and network simulation tools. It is looking at the problem of network meta description language as well as at principles of defining such language using current experience of various tools. Examples of the meta language definitions are shown as well as principles of building a software for conversion between different network models are illustrated.
市场上有可用的商业和教育网络分析、设计、模拟和发现工具。它们在许多方面帮助用户/设计师,但不同的工具是为不同的目的而开发的。因此,这些工具经常在网络设计过程中处理不同的问题,这些问题是相互补充的。因此,这些工具可以以一种相互补充的方式使用,以覆盖用户需求的所有方面,因此确实需要集成这些工具。本文研究的是如何将自主开发的网络规划、网络设计和网络仿真工具进行集成的问题。它着眼于网络元描述语言的问题,以及使用各种工具的当前经验来定义这种语言的原则。文中给出了元语言定义的示例,并说明了构建用于在不同网络模型之间进行转换的软件的原则。
{"title":"An approach to integration of network design and simulation tools","authors":"Md Azizur Rahman, A. Pakstas, Frank Wang","doi":"10.1109/CONTEL.2005.185845","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185845","url":null,"abstract":"There are available commercial and education network analysis, design, simulation and discovery tools in the market. They help the users/designers in many aspect but different tools are developed for different purposes. Thus, very often such tools are addressing different issues in the network design process, which are complementary to each other. Therefore, these tools can be used in a manner of complementing to each other to cover all aspects of user requirement and because of that there is a genuine need to integrate such tools. This paper is dedicated to the problem of integrating such independently developed network planning, network design and network simulation tools. It is looking at the problem of network meta description language as well as at principles of defining such language using current experience of various tools. Examples of the meta language definitions are shown as well as principles of building a software for conversion between different network models are illustrated.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132222323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Reducing dependency on network reliability and availability by encapsulating the negotiation functionalities in ACL messages 通过将协商功能封装在ACL消息中,减少对网络可靠性和可用性的依赖
M. Bagić, M. Kunstic
Network management of multi-agent system could be provided by FIPA agents communicating via ACL (Agent Communicating Language) messages. Such agents can significantly enhance the possibility of dynamic network negotiation and optimization, i.e. reduce dependency on network availability and reliability, encapsulating these functionalities in ACL messages. Here we offer formal specification of such agents using Coloured Petri Nets (CPN) in order to support their validation and verification. We model inter-agent communication via ACL messages specified by Petri colours. We also give an insight into a correlation between informal (AUML Sequnce Diagram) and formal (CPN Tools Diagram) modelling techniques with suggestion on their merging.
多智能体系统的网络管理可以由FIPA代理通过ACL (Agent communication Language)消息进行通信来实现。这些代理可以显著增强动态网络协商和优化的可能性,即减少对网络可用性和可靠性的依赖,将这些功能封装在ACL消息中。在这里,我们使用彩色Petri网(CPN)提供此类代理的正式规范,以支持其验证和验证。我们通过由Petri颜色指定的ACL消息对代理间通信进行建模。我们还深入了解了非正式(AUML序列图)和正式(CPN工具图)建模技术之间的相关性,并提出了合并它们的建议。
{"title":"Reducing dependency on network reliability and availability by encapsulating the negotiation functionalities in ACL messages","authors":"M. Bagić, M. Kunstic","doi":"10.1109/CONTEL.2005.185972","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185972","url":null,"abstract":"Network management of multi-agent system could be provided by FIPA agents communicating via ACL (Agent Communicating Language) messages. Such agents can significantly enhance the possibility of dynamic network negotiation and optimization, i.e. reduce dependency on network availability and reliability, encapsulating these functionalities in ACL messages. Here we offer formal specification of such agents using Coloured Petri Nets (CPN) in order to support their validation and verification. We model inter-agent communication via ACL messages specified by Petri colours. We also give an insight into a correlation between informal (AUML Sequnce Diagram) and formal (CPN Tools Diagram) modelling techniques with suggestion on their merging.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134187951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SafeSMS - end-to-end encryption for SMS SafeSMS -端到端SMS加密
M. Hassinen
Our main contribution is confidentiality, integrity and authentication in SMS (Short Message Services). We will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware. Also, we will show how to authenticate the sender of a message and how to ensure that the message has not been tampered with. Programming language Java is used for the realization of our goals. This paper describes the application solution, while details for the encryption methods are described in the referenced articles.
我们的主要贡献是短信服务的保密性、完整性和身份验证。我们将展示如何在没有任何额外硬件的情况下使用移动电话安全地发送、接收和存储文本消息。此外,我们将展示如何对消息的发送方进行身份验证,以及如何确保消息未被篡改。编程语言Java用于实现我们的目标。本文描述了应用解决方案,而加密方法的细节在参考文章中进行了描述。
{"title":"SafeSMS - end-to-end encryption for SMS","authors":"M. Hassinen","doi":"10.1109/CONTEL.2005.185905","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185905","url":null,"abstract":"Our main contribution is confidentiality, integrity and authentication in SMS (Short Message Services). We will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware. Also, we will show how to authenticate the sender of a message and how to ensure that the message has not been tampered with. Programming language Java is used for the realization of our goals. This paper describes the application solution, while details for the encryption methods are described in the referenced articles.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132284015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A single sign-on framework for web-services-based distributed applications 用于基于web服务的分布式应用程序的单点登录框架
M. Hillenbrand, J. Gøtze, J. Muller, P. Muller
The basic specifications of Web services com- pletely ignore the need for secure services that are based on a solid authentication and authorization infrastructure. An enhancement of the basic specifications is in progress, but takes time to complete. A large-scale application built today is still in need of an authentication and authorization infrastructure to offer its services to the customers of the service provider and only to the customers. In the following such an infrastructure is described that is able to empower Web services to properly handle authentication and authorization. This infrastructure is designed as services that can be used by any Web service needing authentication and authorization.
Web服务的基本规范完全忽略了对基于可靠身份验证和授权基础结构的安全服务的需求。基本规范的增强正在进行中,但需要时间来完成。今天构建的大型应用程序仍然需要身份验证和授权基础设施,以便向服务提供者的客户提供服务,并且只向客户提供服务。下面将描述这样一种基础设施,它能够授权Web服务正确地处理身份验证和授权。该基础设施被设计为任何需要身份验证和授权的Web服务都可以使用的服务。
{"title":"A single sign-on framework for web-services-based distributed applications","authors":"M. Hillenbrand, J. Gøtze, J. Muller, P. Muller","doi":"10.1109/CONTEL.2005.185871","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185871","url":null,"abstract":"The basic specifications of Web services com- pletely ignore the need for secure services that are based on a solid authentication and authorization infrastructure. An enhancement of the basic specifications is in progress, but takes time to complete. A large-scale application built today is still in need of an authentication and authorization infrastructure to offer its services to the customers of the service provider and only to the customers. In the following such an infrastructure is described that is able to empower Web services to properly handle authentication and authorization. This infrastructure is designed as services that can be used by any Web service needing authentication and authorization.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Exploiting multihoming for low latency handoff in heterogeneous networks 利用多宿主实现异构网络中的低延迟切换
V.S. Kaulgud, S.A. Mondal
Low latency handoff is critical for supporting delay sensitive applications on a mobile device. Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, we explore how this "multihoming" feature effectively reduces handoff latency and corresponding packet loss. We present a number of strategies for link layer handoff. In the proposed scheme, link-layer association procedures and MIP handoff operations are performed proactively to reduce the handoff delay. The paper presents an analysis of the scheme and experimental results based on simulation using ns-2. The results substantiate the efficacy of the scheme in reducing the handoff delay significantly. Keywords—low latency handoff, multihoming, seamless mobility.
低延迟切换对于支持移动设备上的延迟敏感应用程序至关重要。最近硬件技术的进步使得移动设备与多种不同类型的网络连接成为可能。在本文中,我们探讨了这种“多归巢”特性如何有效地减少切换延迟和相应的数据包丢失。我们提出了一些链路层切换的策略。在该方案中,主动执行链路层关联过程和MIP切换操作,以减少切换延迟。本文给出了基于ns-2仿真的方案分析和实验结果。实验结果证实了该方案在降低切换延迟方面的有效性。关键词:低延迟切换,多宿主,无缝移动性。
{"title":"Exploiting multihoming for low latency handoff in heterogeneous networks","authors":"V.S. Kaulgud, S.A. Mondal","doi":"10.1109/CONTEL.2005.185816","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185816","url":null,"abstract":"Low latency handoff is critical for supporting delay sensitive applications on a mobile device. Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, we explore how this \"multihoming\" feature effectively reduces handoff latency and corresponding packet loss. We present a number of strategies for link layer handoff. In the proposed scheme, link-layer association procedures and MIP handoff operations are performed proactively to reduce the handoff delay. The paper presents an analysis of the scheme and experimental results based on simulation using ns-2. The results substantiate the efficacy of the scheme in reducing the handoff delay significantly. Keywords—low latency handoff, multihoming, seamless mobility.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115513945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Scalable tree aggregation for multicast 可扩展的多播树聚合
A. Guitton, J. Moulierac
IP multicast is not widely deployed yet over Internet. This is mainly due to the forwarding entries scalability and control explosion problems. In this paper, we propose an algorithm called STA (Scalable Tree Aggregation) which reduces the number of trees by allowing several groups to be aggregated to the same tree: the less trees, the less forwarding entries and the less control messages to maintain trees. STA performs faster aggregations than previous aggregation algorithms by evaluating fewer trees for each group, while keeping the same performance. We show the scalability and the fastness of STA by extensive simulations and we compare its performance to the previous algorithm.
IP多播在Internet上还没有得到广泛的应用。这主要是由于转发表项的可扩展性和控制爆炸问题。在本文中,我们提出了一种称为STA(可扩展树聚合)的算法,该算法通过允许多个组聚合到同一棵树来减少树的数量:树越少,转发条目就越少,维护树的控制消息就越少。STA通过对每个组评估更少的树来执行比以前的聚合算法更快的聚合,同时保持相同的性能。我们通过大量的仿真证明了STA的可扩展性和快速性,并将其性能与之前的算法进行了比较。
{"title":"Scalable tree aggregation for multicast","authors":"A. Guitton, J. Moulierac","doi":"10.1109/CONTEL.2005.185834","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185834","url":null,"abstract":"IP multicast is not widely deployed yet over Internet. This is mainly due to the forwarding entries scalability and control explosion problems. In this paper, we propose an algorithm called STA (Scalable Tree Aggregation) which reduces the number of trees by allowing several groups to be aggregated to the same tree: the less trees, the less forwarding entries and the less control messages to maintain trees. STA performs faster aggregations than previous aggregation algorithms by evaluating fewer trees for each group, while keeping the same performance. We show the scalability and the fastness of STA by extensive simulations and we compare its performance to the previous algorithm.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Hardware-based network management framework for monitoring and testing of system-on-chips 用于监控和测试片上系统的基于硬件的网络管理框架
O. Laouamri, C. Aktouf
This paper describes a way of monitoring and testing embedded cores within a System On a Chip (SoC) through classical network management protocols. All embedded cores can be tested and monitored through the hardware-based SNMP (Simple Network Management Protocol) proxy agent implemented within an SoC. The basic idea of this work is to extrapolate the advantages of network management functions (monitoring, control, test…) to the chip level. The proposed approach is described and its efficiency is illustrated through extensive experimentations.
本文介绍了一种通过经典网络管理协议对片上系统(SoC)内的嵌入式内核进行监控和测试的方法。所有嵌入式内核都可以通过在SoC内实现的基于硬件的SNMP(简单网络管理协议)代理进行测试和监控。本工作的基本思想是将网络管理功能(监控、控制、测试等)的优势外推到芯片层面。本文描述了该方法,并通过大量的实验证明了其有效性。
{"title":"Hardware-based network management framework for monitoring and testing of system-on-chips","authors":"O. Laouamri, C. Aktouf","doi":"10.1109/CONTEL.2005.185837","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185837","url":null,"abstract":"This paper describes a way of monitoring and testing embedded cores within a System On a Chip (SoC) through classical network management protocols. All embedded cores can be tested and monitored through the hardware-based SNMP (Simple Network Management Protocol) proxy agent implemented within an SoC. The basic idea of this work is to extrapolate the advantages of network management functions (monitoring, control, test…) to the chip level. The proposed approach is described and its efficiency is illustrated through extensive experimentations.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124106538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of ML carrier estimation schemes based on APSSB and preamble for OFDMA in fading channel 衰落信道中基于APSSB和preamble的OFDMA ML载波估计方案的比较
W. Xie, Shuang Li, Jianhua Zhang, Ping Zhang
The paper proposes a novel estimation scheme of carrier frequency offset (CFO) based on Added Preamble Sequence Semi-Blind (APSSB) scheme. The proposed maximum-likelihood (ML) CFO estimator is based on APSSB OFDMA model in which Gold sequence is added to the output of IFFT modulator and exploited for CFO estimation at the receiver. CFO estimators based on APSSB scheme and preamble are compared by both SINR analysis and simulation. We propose that the APPSB scheme should be employed for fine frequency synchronization in OFDMA especially in delay-insensitive service. In this paper, we propose the APSSB OFDMA model in which APSSB sequence is added to the output of IFFT modulator. The APSSB sequence is exploited for CFO estimation by correlation detection with the local APSSB sequence at the receiver. Comparison of SINR is made between CFO estimation schemes based on APSSB and preamble. The APSSB scheme suffers no data rate loss, and is more accurate than preamble scheme when APSSB symbol number for CFO estimation is large enough to excess the threshold. Compared with preamble scheme, the APPSB scheme has the property of better accuracy as well as larger delay. We propose the APPSB scheme should be employed for fine frequency synchronization in delay-insensitive service. The rest sections of the paper are organized as follows. In Section 2, the proposed APSSB OFDMA system model is described. Based on this model, section 3 presents the ML CFO estimation scheme based on APSSB. A comparison is made in section 4 in terms of SINR of the two schemes in fading channel. Simulation and analysis are presented in section 5. Finally, section 6 concludes the paper.
提出了一种新的基于附加前导序列半盲(APSSB)的载波频偏估计方案。提出的最大似然(ML) CFO估计器基于APSSB OFDMA模型,该模型将Gold序列添加到IFFT调制器的输出中,并利用该模型在接收端进行CFO估计。通过信噪比分析和仿真对基于APSSB方案和preamble方案的CFO估计进行了比较。我们建议在OFDMA中,特别是在延迟不敏感的业务中,采用APPSB方案进行精细的频率同步。在本文中,我们提出了在IFFT调制器输出中加入APSSB序列的APSSB OFDMA模型。通过与接收端本地APSSB序列的相关性检测,利用APSSB序列进行CFO估计。比较了基于APSSB的CFO估计方案和基于preamble的CFO估计方案的SINR。当用于CFO估计的APSSB符号数大到超过阈值时,APSSB方案没有数据速率损失,并且比前置方案更准确。与前置方案相比,APPSB方案具有更高的精度和更大的时延。我们提出了在延迟不敏感业务中采用APPSB方案进行精细频率同步。本文的其余部分组织如下。在第2节中,描述了提出的APSSB OFDMA系统模型。在此模型的基础上,第3节给出了基于APSSB的ML CFO估计方案。第4节比较了两种方案在衰落信道下的信噪比。仿真和分析在第5节中给出。最后,第六部分对全文进行总结。
{"title":"Comparison of ML carrier estimation schemes based on APSSB and preamble for OFDMA in fading channel","authors":"W. Xie, Shuang Li, Jianhua Zhang, Ping Zhang","doi":"10.1109/CONTEL.2005.185849","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185849","url":null,"abstract":"The paper proposes a novel estimation scheme of carrier frequency offset (CFO) based on Added Preamble Sequence Semi-Blind (APSSB) scheme. The proposed maximum-likelihood (ML) CFO estimator is based on APSSB OFDMA model in which Gold sequence is added to the output of IFFT modulator and exploited for CFO estimation at the receiver. CFO estimators based on APSSB scheme and preamble are compared by both SINR analysis and simulation. We propose that the APPSB scheme should be employed for fine frequency synchronization in OFDMA especially in delay-insensitive service. In this paper, we propose the APSSB OFDMA model in which APSSB sequence is added to the output of IFFT modulator. The APSSB sequence is exploited for CFO estimation by correlation detection with the local APSSB sequence at the receiver. Comparison of SINR is made between CFO estimation schemes based on APSSB and preamble. The APSSB scheme suffers no data rate loss, and is more accurate than preamble scheme when APSSB symbol number for CFO estimation is large enough to excess the threshold. Compared with preamble scheme, the APPSB scheme has the property of better accuracy as well as larger delay. We propose the APPSB scheme should be employed for fine frequency synchronization in delay-insensitive service. The rest sections of the paper are organized as follows. In Section 2, the proposed APSSB OFDMA system model is described. Based on this model, section 3 presents the ML CFO estimation scheme based on APSSB. A comparison is made in section 4 in terms of SINR of the two schemes in fading channel. Simulation and analysis are presented in section 5. Finally, section 6 concludes the paper.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"407 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120882307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPv6 security: improvements and implementation aspects IPv6安全:改进和实现方面
D. Zagar, S. Vidaković
IPv6 provides many new possibilities and features and also enables significant improvements in confidentiality of information transmitted through the network. Many modifications implemented in IPv6 are expected to directly or indirectly improve security environment for devices connected to both public and private networks. Security features developed for IPv6 are known as IP Security (IPsec). This protocol assures a certain level of security, but does not solve all existing security issues. In this paper methods for network security improvement by implementation of firewalls and intrusion detection systems were analyzed. Furthermore, the methods for ensuring privacy in IPv6 were evaluated and available tools were analyzed. Security tests were done and comments of their results were given. Finally, suggestions about network security improvement and implementation of security mechanisms in IPv6 networks were given.
IPv6提供了许多新的可能性和特性,也使通过网络传输的信息的保密性得到了显著改善。IPv6中实施的许多修改有望直接或间接地改善连接到公共和私有网络的设备的安全环境。为IPv6开发的安全特性称为IPsec (IP Security)。该协议保证了一定程度的安全性,但不能解决现有的所有安全问题。本文分析了通过防火墙和入侵检测系统来提高网络安全性的方法。此外,评估了在IPv6中确保隐私的方法,并分析了可用的工具。进行了安全性测试,并对测试结果进行了评价。最后,对IPv6网络的网络安全改进和安全机制的实施提出了建议。
{"title":"IPv6 security: improvements and implementation aspects","authors":"D. Zagar, S. Vidaković","doi":"10.1109/CONTEL.2005.185813","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185813","url":null,"abstract":"IPv6 provides many new possibilities and features and also enables significant improvements in confidentiality of information transmitted through the network. Many modifications implemented in IPv6 are expected to directly or indirectly improve security environment for devices connected to both public and private networks. Security features developed for IPv6 are known as IP Security (IPsec). This protocol assures a certain level of security, but does not solve all existing security issues. In this paper methods for network security improvement by implementation of firewalls and intrusion detection systems were analyzed. Furthermore, the methods for ensuring privacy in IPv6 were evaluated and available tools were analyzed. Security tests were done and comments of their results were given. Finally, suggestions about network security improvement and implementation of security mechanisms in IPv6 networks were given.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1