Pub Date : 2010-12-01DOI: 10.1109/MCOM.2012.6163588
Ved P. Kafle, M. Inoue
The present day Internet has no separate namespace for host IDs. It uses IP addresses as host IDs, which are in fact locators. This dual role is problematic for mobility, multihoming, security, and routing on the Internet. To solve these problems, research has recently begun on ID/locator split architectures. Some standardization activities based on this concept are also progressing in ITU-T Study Group 13 and in the IETF. We expect that introduction of the ID/locator split concept into the new generation network or future Internet architecture can bring about additional functions, such as heterogeneous network protocol support, multicast, QoS, resource or service discovery, and flexible human-network interaction. Toward realization of these functions, this paper presents a study on an approach of introducing multi-ID and multi-locator support into the network architecture. The paper also lists items that have the potential to be standardized in ITU-T.
{"title":"Introducing multi-ID and multi-locator into network architecture","authors":"Ved P. Kafle, M. Inoue","doi":"10.1109/MCOM.2012.6163588","DOIUrl":"https://doi.org/10.1109/MCOM.2012.6163588","url":null,"abstract":"The present day Internet has no separate namespace for host IDs. It uses IP addresses as host IDs, which are in fact locators. This dual role is problematic for mobility, multihoming, security, and routing on the Internet. To solve these problems, research has recently begun on ID/locator split architectures. Some standardization activities based on this concept are also progressing in ITU-T Study Group 13 and in the IETF. We expect that introduction of the ID/locator split concept into the new generation network or future Internet architecture can bring about additional functions, such as heterogeneous network protocol support, multicast, QoS, resource or service discovery, and flexible human-network interaction. Toward realization of these functions, this paper presents a study on an approach of introducing multi-ID and multi-locator support into the network architecture. The paper also lists items that have the potential to be standardized in ITU-T.","PeriodicalId":332624,"journal":{"name":"2010 ITU-T Kaleidoscope: Beyond the Internet? - Innovations for Future Networks and Services","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The very nature of Radio Frequency (RF) technology makes Wireless LANs (WLANs) open to a variety of unique attacks. Most of these RF-related attacks begin as exploits of Layer 1 (Physical — PHY) & Layer 2 (Media Access Control — MAC) of the 802.11 specification, and then build into a wide array of more advanced assaults, including Denial of Service (DOS) attacks. In Intelligent Jamming the jammer jammed physical layer of WLAN by generating continuous high power noise in the vicinity of wireless receiver nodes. In this paper, we study the threats in an Intelligent jamming Comparison with WLAN Ethernet Router and WLAN Ethernet Bridge and the security goals to be achieved. We present and examine analytical simulation results for the throughput for different scenario performance, using the well-known network simulator OPNET 10.0 and OPNET Modeler 14.5 for WiMAX Performance. IEEE 802.11b has two different DCF modes: basic CSMA/CA and RTS/CTS. Intelligent jamming, which jams with the knowledge of the protocol, the jamming describe in our paper is based on the basis of Fake AP Jamming. When we have applied same concept in WiMAX system under the influence of jamming we have received same effect of router performance.
{"title":"Performance comparison of Intelligent Jamming in RF (Physical) Layer with WLAN Ethernet Router and WLAN Ethernet Bridge","authors":"R. Jha, U. Dalal","doi":"10.1109/CNC.2010.95","DOIUrl":"https://doi.org/10.1109/CNC.2010.95","url":null,"abstract":"The very nature of Radio Frequency (RF) technology makes Wireless LANs (WLANs) open to a variety of unique attacks. Most of these RF-related attacks begin as exploits of Layer 1 (Physical — PHY) & Layer 2 (Media Access Control — MAC) of the 802.11 specification, and then build into a wide array of more advanced assaults, including Denial of Service (DOS) attacks. In Intelligent Jamming the jammer jammed physical layer of WLAN by generating continuous high power noise in the vicinity of wireless receiver nodes. In this paper, we study the threats in an Intelligent jamming Comparison with WLAN Ethernet Router and WLAN Ethernet Bridge and the security goals to be achieved. We present and examine analytical simulation results for the throughput for different scenario performance, using the well-known network simulator OPNET 10.0 and OPNET Modeler 14.5 for WiMAX Performance. IEEE 802.11b has two different DCF modes: basic CSMA/CA and RTS/CTS. Intelligent jamming, which jams with the knowledge of the protocol, the jamming describe in our paper is based on the basis of Fake AP Jamming. When we have applied same concept in WiMAX system under the influence of jamming we have received same effect of router performance.","PeriodicalId":332624,"journal":{"name":"2010 ITU-T Kaleidoscope: Beyond the Internet? - Innovations for Future Networks and Services","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133108996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An empirical study which identifies 251 technical interoperability standards implemented in a modern laptop computer, and estimates that the total number of standards relevant to such a device is much higher. Of the identified standards, the authors find that 44% were developed by consortia, 36% by formal standards development organizations, and 20% by single companies. The intellectual property rights policies associated with 197 of the standards are assessed: 75% were developed under “RAND” terms, 22% under “royalty free” terms, and 3% utilize a patent pool. The authors make certain observations based on their findings, and identify promising areas for future research.
{"title":"How many standards in a laptop? (And other empirical questions)","authors":"Brad Biddle, A. White, Sean Woods","doi":"10.2139/ssrn.1619440","DOIUrl":"https://doi.org/10.2139/ssrn.1619440","url":null,"abstract":"An empirical study which identifies 251 technical interoperability standards implemented in a modern laptop computer, and estimates that the total number of standards relevant to such a device is much higher. Of the identified standards, the authors find that 44% were developed by consortia, 36% by formal standards development organizations, and 20% by single companies. The intellectual property rights policies associated with 197 of the standards are assessed: 75% were developed under “RAND” terms, 22% under “royalty free” terms, and 3% utilize a patent pool. The authors make certain observations based on their findings, and identify promising areas for future research.","PeriodicalId":332624,"journal":{"name":"2010 ITU-T Kaleidoscope: Beyond the Internet? - Innovations for Future Networks and Services","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124332936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/kaleidoscope.2014.6858463
U. B. Desai
Summary form only. Summaries of three conference keynotes are provided: "Modern academia: teaching, research, development, patents and standards" by Uday B. Desai "Vehicle communication: a future telecommunication market" by Tadao Saito; and "Future of communications - the individual user experience" by Detlev Otto.
只有摘要形式。会议提供了三个主题演讲的摘要:Uday B. Desai的“现代学术界:教学、研究、开发、专利和标准”,斋藤忠雄的“车辆通信:未来的电信市场”;以及Detlev Otto的《通信的未来——个人用户体验》。
{"title":"Keynote Summaries","authors":"U. B. Desai","doi":"10.1109/kaleidoscope.2014.6858463","DOIUrl":"https://doi.org/10.1109/kaleidoscope.2014.6858463","url":null,"abstract":"Summary form only. Summaries of three conference keynotes are provided: \"Modern academia: teaching, research, development, patents and standards\" by Uday B. Desai \"Vehicle communication: a future telecommunication market\" by Tadao Saito; and \"Future of communications - the individual user experience\" by Detlev Otto.","PeriodicalId":332624,"journal":{"name":"2010 ITU-T Kaleidoscope: Beyond the Internet? - Innovations for Future Networks and Services","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129652034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}