首页 > 最新文献

ICT 2013最新文献

英文 中文
A multi-objective approach for routing and wavelength converter allocation under uncertainty 不确定条件下路由和波长转换器分配的多目标方法
Pub Date : 2013-05-06 DOI: 10.1109/ICTEL.2013.6632075
D. Pinto, B. Barán, C. Brizuela
Wavelength Division Multiplexing (WDM) networks are designed for long-term operations in which the uncertainty of future traffic plays an important role. The performance of these networks is highly dependent on the routing and the wavelength-converter allocation algorithms. In order to achieve a good performance on a long-term basis, both problems have to be dealt with together and traffic uncertainty should be included. To this aim, this work proposes a joint optimization approach where the converters allocation plan and paths for routing are calculated simultaneously. A Multi-Objective Evolutionary Algorithm (MOEA) is proposed to minimize the number of wavelength converters, the average blocking probability, and an unfairness measure, all three at the same time, the uncertainty is modelled by means of a set of scenarios. The proposed MOEA calculates an approximation to the optimal set of solutions. This work presents experimental results showing the feasibility of the proposed approach in a multi-objective and uncertain context.
波分复用(WDM)网络是为长期运行而设计的,未来业务的不确定性在其中起着重要作用。这些网络的性能高度依赖于路由和波长转换器分配算法。为了在长期基础上实现良好的性能,这两个问题必须一起处理,并且应该包括流量的不确定性。为此,本文提出了一种同时计算变流器分配计划和路由路径的联合优化方法。提出了一种多目标进化算法(MOEA),以最小化波长转换器数量、平均阻塞概率和不公平度量,同时通过一组场景对不确定性进行建模。提出的MOEA计算最优解集的近似值。这项工作提出了实验结果,显示了在多目标和不确定的背景下提出的方法的可行性。
{"title":"A multi-objective approach for routing and wavelength converter allocation under uncertainty","authors":"D. Pinto, B. Barán, C. Brizuela","doi":"10.1109/ICTEL.2013.6632075","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632075","url":null,"abstract":"Wavelength Division Multiplexing (WDM) networks are designed for long-term operations in which the uncertainty of future traffic plays an important role. The performance of these networks is highly dependent on the routing and the wavelength-converter allocation algorithms. In order to achieve a good performance on a long-term basis, both problems have to be dealt with together and traffic uncertainty should be included. To this aim, this work proposes a joint optimization approach where the converters allocation plan and paths for routing are calculated simultaneously. A Multi-Objective Evolutionary Algorithm (MOEA) is proposed to minimize the number of wavelength converters, the average blocking probability, and an unfairness measure, all three at the same time, the uncertainty is modelled by means of a set of scenarios. The proposed MOEA calculates an approximation to the optimal set of solutions. This work presents experimental results showing the feasibility of the proposed approach in a multi-objective and uncertain context.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115510840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of segment-based crankback re-routing for GMPLS-based WSON 基于gmpls的WSON中基于分段的曲柄回转重路由的评估
Pub Date : 2013-05-06 DOI: 10.1109/ICTEL.2013.6632068
Edgard Jamhour, M. Penna
The successful creation of lightpaths depends on updated information about network resources, such as the availability of wavelengths in the links along a path and the capability of the nodes to perform wavelength conversion. If signaling is performed with outdated information, a setup request of a lightpath may fail by selecting a path with insufficient network resources. An important GMPLS addition to the RSVP-TE was the possibility of correcting lightpath setup requests using crankback. Crankback extensions permit a node that was unable to forward a setup request to return the blocking information to the upstream nodes. In the segment-based crankback, any of the upstream nodes may attempt to correct the signaling by rerouting the request through an alternate path. Such a strategy, however, is not advantageous for any network topology. In this paper, we evaluate eight different network topologies to determine which network features favor the crankback strategy. To perform our evaluation, we consider several network metrics, including some used in SNA (Social Network Analisys).
光路的成功创建取决于有关网络资源的最新信息,例如沿路径的链路中波长的可用性以及节点执行波长转换的能力。如果使用过时的信息执行信令,则光路的设置请求可能会因选择网络资源不足的路径而失败。在RSVP-TE中,GMPLS增加了一个重要的功能,即使用曲柄回调修正光路设置请求的可能性。曲柄后退扩展允许无法转发设置请求的节点将阻塞信息返回给上游节点。在基于段的曲回程中,任何上游节点都可以尝试通过替代路径重新路由请求来纠正信令。然而,这种策略对任何网络拓扑都不是有利的。在本文中,我们评估了八种不同的网络拓扑结构,以确定哪种网络特征有利于曲背策略。为了执行我们的评估,我们考虑了几个网络指标,包括在SNA(社会网络分析)中使用的一些指标。
{"title":"Evaluation of segment-based crankback re-routing for GMPLS-based WSON","authors":"Edgard Jamhour, M. Penna","doi":"10.1109/ICTEL.2013.6632068","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632068","url":null,"abstract":"The successful creation of lightpaths depends on updated information about network resources, such as the availability of wavelengths in the links along a path and the capability of the nodes to perform wavelength conversion. If signaling is performed with outdated information, a setup request of a lightpath may fail by selecting a path with insufficient network resources. An important GMPLS addition to the RSVP-TE was the possibility of correcting lightpath setup requests using crankback. Crankback extensions permit a node that was unable to forward a setup request to return the blocking information to the upstream nodes. In the segment-based crankback, any of the upstream nodes may attempt to correct the signaling by rerouting the request through an alternate path. Such a strategy, however, is not advantageous for any network topology. In this paper, we evaluate eight different network topologies to determine which network features favor the crankback strategy. To perform our evaluation, we consider several network metrics, including some used in SNA (Social Network Analisys).","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115519676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Toward inter-VM visibility in a Cloud environment using packet inspection 在云环境中使用包检测实现vm间可见性
Pub Date : 2013-05-06 DOI: 10.1109/ICTEL.2013.6632122
Karim Benzidane, Saad Khoudali, F. Leila, A. Sekkaki
Virtualization is one of the key elements of Infrastructure as a Service (IaaS), Cloud Computing (CC) offerings and private Clouds, and it is increasingly used in portions of the back-end of Platform as a Service (PaaS) and SaaS (Software as a Service) providers as well. This creates new targets for intrusion due to the complexity of access and difficulty in monitoring all interconnection points between systems, applications, and data sets. This raises many questions about the appropriate infrastructure, processes, and strategy for enacting detection and response to intrusion in a Cloud environment. This article discusses the security and the visibility issues of inter-VM traffic and solutions for it within a Cloud environment context, by proposing an approach relying on distributed intrusion detection technique and packet inspection.
虚拟化是基础设施即服务(IaaS)、云计算(CC)产品和私有云的关键元素之一,它也越来越多地用于平台即服务(PaaS)和软件即服务(SaaS)提供商的后端部分。由于访问的复杂性和监控系统、应用程序和数据集之间的所有连接点的难度,这为入侵创造了新的目标。这就提出了许多关于在云环境中实施入侵检测和响应的适当基础设施、流程和策略的问题。本文通过提出一种依赖于分布式入侵检测技术和数据包检测的方法,讨论了云环境上下文中vm间流量的安全性和可见性问题及其解决方案。
{"title":"Toward inter-VM visibility in a Cloud environment using packet inspection","authors":"Karim Benzidane, Saad Khoudali, F. Leila, A. Sekkaki","doi":"10.1109/ICTEL.2013.6632122","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632122","url":null,"abstract":"Virtualization is one of the key elements of Infrastructure as a Service (IaaS), Cloud Computing (CC) offerings and private Clouds, and it is increasingly used in portions of the back-end of Platform as a Service (PaaS) and SaaS (Software as a Service) providers as well. This creates new targets for intrusion due to the complexity of access and difficulty in monitoring all interconnection points between systems, applications, and data sets. This raises many questions about the appropriate infrastructure, processes, and strategy for enacting detection and response to intrusion in a Cloud environment. This article discusses the security and the visibility issues of inter-VM traffic and solutions for it within a Cloud environment context, by proposing an approach relying on distributed intrusion detection technique and packet inspection.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124408554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new fast re-authentication method for the 3G-WLAN interworking based on EAP-AKA 一种基于EAP-AKA的3G-WLAN网络快速重认证方法
Pub Date : 2013-05-06 DOI: 10.1109/ICTEL.2013.6632107
Younes El Hajjaji El Idrissi, N. Zahid, M. Jedra
The 3G network technology provides a completed connectivity solution with low data rates. While wireless network offers a high data rate in a small geographic area, interworking the 3G and WLAN can provide a complementary solution for network service and user equipment. This interworking introduces a new challenge to assure a secure and fast handover without impacting the service security in both networks. EAP-AKA is the authentication mechanism adopted by the 3rd Generation Partnership Project (3GPP) for vertical handover between the 3G and WLAN. The EAP-AKA method suffers from several weaknesses, such as user identity display, high authentication delay and additional bandwidth consumption. In this paper we propose a new fast local re-authentication method (EAP-FLAKA) based on the standard EAP-AKA. The proposed method improves the authentication performance, achieves fast re-authentication protocol and defines a new keying framework. The security properties of the new method are checked by using a formal verification (AVISPA) which has proved a high talent in automatically finding potential attacks in security protocols.
3G网络技术提供了一个完整的低数据速率连接解决方案。虽然无线网络在小的地理区域内提供高的数据速率,但3G和WLAN的互连可以为网络服务和用户设备提供互补的解决方案。这种互连带来了一个新的挑战,即在不影响两个网络中的服务安全性的情况下确保安全快速的切换。EAP-AKA是第三代合作伙伴计划(3GPP)采用的用于3G和WLAN垂直切换的认证机制。EAP-AKA方法有几个缺点,例如用户身份显示、高身份验证延迟和额外的带宽消耗。本文在标准EAP-AKA的基础上提出了一种新的快速本地重认证方法(EAP-FLAKA)。该方法提高了认证性能,实现了快速的重认证协议,并定义了新的密钥框架。采用形式化验证(AVISPA)对新方法的安全性进行了检验,该方法在自动发现安全协议中的潜在攻击方面具有很高的才能。
{"title":"A new fast re-authentication method for the 3G-WLAN interworking based on EAP-AKA","authors":"Younes El Hajjaji El Idrissi, N. Zahid, M. Jedra","doi":"10.1109/ICTEL.2013.6632107","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632107","url":null,"abstract":"The 3G network technology provides a completed connectivity solution with low data rates. While wireless network offers a high data rate in a small geographic area, interworking the 3G and WLAN can provide a complementary solution for network service and user equipment. This interworking introduces a new challenge to assure a secure and fast handover without impacting the service security in both networks. EAP-AKA is the authentication mechanism adopted by the 3rd Generation Partnership Project (3GPP) for vertical handover between the 3G and WLAN. The EAP-AKA method suffers from several weaknesses, such as user identity display, high authentication delay and additional bandwidth consumption. In this paper we propose a new fast local re-authentication method (EAP-FLAKA) based on the standard EAP-AKA. The proposed method improves the authentication performance, achieves fast re-authentication protocol and defines a new keying framework. The security properties of the new method are checked by using a formal verification (AVISPA) which has proved a high talent in automatically finding potential attacks in security protocols.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115909867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Optimizing level set initialization for satellite image segmentation 优化水平集初始化卫星图像分割
Pub Date : 2013-05-06 DOI: 10.1109/ICTEL.2013.6632078
Gregoris Liasis, S. Stavrou
Obtaining segmentations of buildings from satellite images for telecommunication applications is a complex process due to the fact that satellite or aerial images are complicated scenes. The algorithm presented in this work uses level set Chan-Vese formulation, to establish the corresponding boundaries of the buildings. Level set segmentation tends to be sensitive on initialization, thus proper initialization can yield better segmentation results. In this work an effective procedure is performed using K-mean classifier in order to design and develop the initial level set contours. Morphological features are incorporated for refining the obtained outlines. Finally, the coordinates of each and every building are extracted along with additional information for the processed scene, like the number of buildings, as well as the center and area of each building. The optimization algorithm was evaluated qualitative and quantitative against the original Chan-Vese model and proved to provide more accurate results.
由于卫星或航空图像是复杂的场景,从卫星图像中获得用于电信应用的建筑物分割是一个复杂的过程。本文提出的算法使用水平集Chan-Vese公式来建立相应的建筑物边界。水平集分割对初始化比较敏感,适当的初始化可以得到较好的分割效果。在这项工作中,使用k -均值分类器执行了一个有效的过程,以设计和开发初始水平集轮廓。形态学特征被纳入以精炼所获得的轮廓。最后,提取每个建筑物的坐标以及处理场景的附加信息,如建筑物的数量,以及每个建筑物的中心和面积。通过对原Chan-Vese模型的定性和定量评价,证明该优化算法能提供更准确的结果。
{"title":"Optimizing level set initialization for satellite image segmentation","authors":"Gregoris Liasis, S. Stavrou","doi":"10.1109/ICTEL.2013.6632078","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632078","url":null,"abstract":"Obtaining segmentations of buildings from satellite images for telecommunication applications is a complex process due to the fact that satellite or aerial images are complicated scenes. The algorithm presented in this work uses level set Chan-Vese formulation, to establish the corresponding boundaries of the buildings. Level set segmentation tends to be sensitive on initialization, thus proper initialization can yield better segmentation results. In this work an effective procedure is performed using K-mean classifier in order to design and develop the initial level set contours. Morphological features are incorporated for refining the obtained outlines. Finally, the coordinates of each and every building are extracted along with additional information for the processed scene, like the number of buildings, as well as the center and area of each building. The optimization algorithm was evaluated qualitative and quantitative against the original Chan-Vese model and proved to provide more accurate results.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116515998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-resource allocation for LTE networks: Joint-optimality and distributed algorithm LTE网络的多资源分配:联合最优与分布式算法
Pub Date : 2013-05-06 DOI: 10.1109/ICTEL.2013.6632096
Chungang Yang, Jiandong Li, Hongyan Li, Min Sheng, Qin Liu, Wei Liu, Yuzhou Li
Current schemes of radio resource allocation for LTE Networks can be summarized as either the centralized or the distributed. In this paper, a hybrid multi-resource allocation scheme is presented from a network overall performance perspective, where evolved NodeBs (eNBs) are motivated to assist users to implement the joint bandwidth scheduling and power water-filling on the physical resource block (PRB). Closed-form bandwidth and power solution are derived with the joint-optimality property proved. Then, a distributed iteration algorithm of joint bandwidth scheduling and power water-filling on the physical resource block (PRB) is developed. Numerical results verify the proposed distributed algorithm, which can achieve a better guarantee of throughput and fairness.
目前的LTE网络无线资源分配方案可以概括为集中式和分布式两种。本文从网络整体性能的角度提出了一种混合多资源分配方案,该方案激励进化节点(enb)协助用户在物理资源块(PRB)上实现联合带宽调度和电力注水。导出了闭型带宽和功率解,并证明了联合最优性。在此基础上,提出了一种物理资源块(PRB)上带宽调度与电力注水联合的分布式迭代算法。数值结果验证了所提出的分布式算法,能够更好地保证吞吐量和公平性。
{"title":"Multi-resource allocation for LTE networks: Joint-optimality and distributed algorithm","authors":"Chungang Yang, Jiandong Li, Hongyan Li, Min Sheng, Qin Liu, Wei Liu, Yuzhou Li","doi":"10.1109/ICTEL.2013.6632096","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632096","url":null,"abstract":"Current schemes of radio resource allocation for LTE Networks can be summarized as either the centralized or the distributed. In this paper, a hybrid multi-resource allocation scheme is presented from a network overall performance perspective, where evolved NodeBs (eNBs) are motivated to assist users to implement the joint bandwidth scheduling and power water-filling on the physical resource block (PRB). Closed-form bandwidth and power solution are derived with the joint-optimality property proved. Then, a distributed iteration algorithm of joint bandwidth scheduling and power water-filling on the physical resource block (PRB) is developed. Numerical results verify the proposed distributed algorithm, which can achieve a better guarantee of throughput and fairness.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the hybrid localization in heterogeneous networks with lack of hearability 缺乏可听性的异构网络中的混合定位
Pub Date : 2013-05-06 DOI: 10.1109/ICTEL.2013.6632158
A. Yassine, M. Awad, Y. Nasser
This paper investigates and presents the results of hybrid localization techniques in heterogeneous networks with lack of hearability scenarios. In this contribution, we generalize the work presented in [1] and [2] by investigating the limits of their combination but also the limits of the minimal number of anchor nodes (AN) used for hybrid positioning. The focus is on two scenarios: the small indoor scenario combining WiFi and cellular systems; and, the small-to-mid-scale scenario composed of one located mobile terminal and one AN. In this work, we investigate the effect of the availability of the three metrics i.e. the Time of Arrival (TOA), the Angle of Arrival (AOA), the Received Signal Strength based Fingerprint (RSS) on the positioning accuracy when the number of anchor nodes is minimal. To combine these measurements, we propose to use the two levels Unscented Kalman Filter (UKF). Simulations results show better system performance in poor transmission scenarios.
本文研究并介绍了混合定位技术在缺乏可听性场景的异构网络中的应用结果。在这篇文章中,我们通过研究[1]和[2]组合的限制以及用于混合定位的最小锚节点数(AN)的限制,概括了[1]和[2]中所做的工作。重点是两个场景:结合WiFi和蜂窝系统的小型室内场景;以及由一个定位移动终端和一个AN组成的中小型场景。在这项工作中,我们研究了三个指标的可用性,即到达时间(TOA),到达角(AOA),基于接收信号强度的指纹(RSS)对锚节点数量最小时定位精度的影响。为了结合这些测量,我们建议使用两级无气味卡尔曼滤波器(UKF)。仿真结果表明,在较差的传输情况下,系统具有较好的性能。
{"title":"On the hybrid localization in heterogeneous networks with lack of hearability","authors":"A. Yassine, M. Awad, Y. Nasser","doi":"10.1109/ICTEL.2013.6632158","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632158","url":null,"abstract":"This paper investigates and presents the results of hybrid localization techniques in heterogeneous networks with lack of hearability scenarios. In this contribution, we generalize the work presented in [1] and [2] by investigating the limits of their combination but also the limits of the minimal number of anchor nodes (AN) used for hybrid positioning. The focus is on two scenarios: the small indoor scenario combining WiFi and cellular systems; and, the small-to-mid-scale scenario composed of one located mobile terminal and one AN. In this work, we investigate the effect of the availability of the three metrics i.e. the Time of Arrival (TOA), the Angle of Arrival (AOA), the Received Signal Strength based Fingerprint (RSS) on the positioning accuracy when the number of anchor nodes is minimal. To combine these measurements, we propose to use the two levels Unscented Kalman Filter (UKF). Simulations results show better system performance in poor transmission scenarios.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114194132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Maximizing predictive mode probability in fast handovers for mobile IP 最大化移动 IP 快速切换中的预测模式概率
Pub Date : 2013-05-06 DOI: 10.1109/ICTEL.2013.6632120
M. Boutabia, H. Afifi
Mobility management across multi technology wireless networks is an important feature for ubiquitous access. In such heterogeneous environment, service providers have to deal with service continuity especially for real time applications like voice over IP. In order to achieve this goal, the Internet Engineering Task Force (IETF) proposed fast handovers for IPv6 (FMIPv6) to reduce handover delay for real-time applications. FMIPv6 operates in two modes: predictive mode and reactive mode. FMIPv6 handover is achieved seamlessly when the predictive mode is used. The failure of the predictive mode degrades the handover performance and disrupts the perceived quality. In this paper, we propose an enhanced FMIPv6 that maximizes the predictive mode probability by forwarding the acknowledgment of the fast binding update to the new location of the mobile node. Moreover, the solution is based on the use of media independent handover services in both mobile node and network in order to achieve a successful predictive handover. A new state machine is defined for the mobile node to answer the requirements of the new enhancement. The impact of the proposed improvement is investigated through an analytical study.
多技术无线网络的移动性管理是泛在接入的一项重要功能。在这种异构环境中,服务提供商必须保证服务的连续性,尤其是 IP 语音等实时应用。为了实现这一目标,互联网工程任务组(IETF)提出了 IPv6 快速切换(FMIPv6)方案,以减少实时应用的切换延迟。FMIPv6 有两种运行模式:预测模式和反应模式。使用预测模式时,FMIPv6 可以实现无缝切换。如果预测模式失效,则会降低切换性能并破坏感知质量。本文提出了一种增强型 FMIPv6,通过将快速绑定更新的确认转发到移动节点的新位置,最大限度地提高了预测模式的概率。此外,该解决方案基于在移动节点和网络中使用媒体独立切换服务,以实现成功的预测切换。为移动节点定义了一个新的状态机,以满足新改进的要求。通过分析研究调查了拟议改进的影响。
{"title":"Maximizing predictive mode probability in fast handovers for mobile IP","authors":"M. Boutabia, H. Afifi","doi":"10.1109/ICTEL.2013.6632120","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632120","url":null,"abstract":"Mobility management across multi technology wireless networks is an important feature for ubiquitous access. In such heterogeneous environment, service providers have to deal with service continuity especially for real time applications like voice over IP. In order to achieve this goal, the Internet Engineering Task Force (IETF) proposed fast handovers for IPv6 (FMIPv6) to reduce handover delay for real-time applications. FMIPv6 operates in two modes: predictive mode and reactive mode. FMIPv6 handover is achieved seamlessly when the predictive mode is used. The failure of the predictive mode degrades the handover performance and disrupts the perceived quality. In this paper, we propose an enhanced FMIPv6 that maximizes the predictive mode probability by forwarding the acknowledgment of the fast binding update to the new location of the mobile node. Moreover, the solution is based on the use of media independent handover services in both mobile node and network in order to achieve a successful predictive handover. A new state machine is defined for the mobile node to answer the requirements of the new enhancement. The impact of the proposed improvement is investigated through an analytical study.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Two-way distributed transmission based on the golden code for application in wireless relay networks 基于黄金码的双向分布式传输在无线中继网络中的应用
Pub Date : 2013-05-06 DOI: 10.1109/ICTEL.2013.6632079
L. Ge, Gaojie Chen, Yu Gong, J. Chambers
In this paper, we consider the use of the Golden Code within two-way transmission over a wireless relay network in the fixed and selected relay cases. Such two-way transmission potentially improves the rate performance over one-way schemes. A four time slot amplify-and-forward (AF) protocol is exploited. Two policies are considered for relay selection, one based on a maximum-minimum strategy and a second using the maximum-mean approach. The combination of relay selection and two-way transmission mitigates the potential loss of diversity and rate in one-way fixed relay Golden Code transmission. End-to-end bit error rate simulations are used to evaluate the performance of the proposed approaches.
在本文中,我们考虑在固定中继和选定中继情况下,在无线中继网络的双向传输中使用黄金码。这种双向传输可能比单向方案提高速率性能。采用四时隙放大转发(AF)协议。考虑了两种中继选择策略,一种基于最大值-最小策略,另一种使用最大值-平均值方法。中继选择与双向传输相结合,减轻了单向固定中继金码传输中可能出现的分集和速率损失。端到端误码率模拟用于评估所提出的方法的性能。
{"title":"Two-way distributed transmission based on the golden code for application in wireless relay networks","authors":"L. Ge, Gaojie Chen, Yu Gong, J. Chambers","doi":"10.1109/ICTEL.2013.6632079","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632079","url":null,"abstract":"In this paper, we consider the use of the Golden Code within two-way transmission over a wireless relay network in the fixed and selected relay cases. Such two-way transmission potentially improves the rate performance over one-way schemes. A four time slot amplify-and-forward (AF) protocol is exploited. Two policies are considered for relay selection, one based on a maximum-minimum strategy and a second using the maximum-mean approach. The combination of relay selection and two-way transmission mitigates the potential loss of diversity and rate in one-way fixed relay Golden Code transmission. End-to-end bit error rate simulations are used to evaluate the performance of the proposed approaches.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"708 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128985402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient data replication approach for structured peer-to-peer systems 结构化点对点系统的有效数据复制方法
Pub Date : 2013-05-06 DOI: 10.1109/ICTEL.2013.6632143
Fahima Ben Guirat, Imen Filali
The peer-to-peer (P2P) communication model has gained an enormous research interest in the last few years due to its promising properties (e.g., decentralization, self-organization, scalability, etc.) to build large scale distributed applications. However, the P2P systems are characterized by their dynamic behavior as peers can frequently join and leave the network. This property makes the data availability in a such dynamic behavior a crucial problem. Indeed, to provide a high data availability under peer churn, one possible solution is to replicate the same bloc of data into a set of nodes according to a well defined strategy. In this paper, we have deeply investigated the main existing approaches of data replication that have been proposed in the literature. Then, we have proposed an efficient data replication mechanism that overcomes the limitations of these approaches. In order to evaluate these strategies, we have conducted an extensive simulation study. Simulations results show that our strategy performs well compared with others approaches not only in a static environment but also under churn.
点对点(P2P)通信模型由于其在构建大规模分布式应用程序方面有前景的特性(例如,去中心化、自组织、可扩展性等),在过去几年中获得了巨大的研究兴趣。然而,P2P系统的特点是其动态行为,因为对等体可以频繁地加入和离开网络。这一特性使得这种动态行为中的数据可用性成为一个关键问题。实际上,为了在对等点混乱的情况下提供高数据可用性,一种可能的解决方案是根据定义良好的策略将相同的数据块复制到一组节点中。在本文中,我们深入研究了文献中提出的主要现有数据复制方法。然后,我们提出了一种有效的数据复制机制,克服了这些方法的局限性。为了评估这些策略,我们进行了广泛的模拟研究。仿真结果表明,该策略不仅在静态环境下,而且在扰动环境下,都比其他方法具有更好的性能。
{"title":"An efficient data replication approach for structured peer-to-peer systems","authors":"Fahima Ben Guirat, Imen Filali","doi":"10.1109/ICTEL.2013.6632143","DOIUrl":"https://doi.org/10.1109/ICTEL.2013.6632143","url":null,"abstract":"The peer-to-peer (P2P) communication model has gained an enormous research interest in the last few years due to its promising properties (e.g., decentralization, self-organization, scalability, etc.) to build large scale distributed applications. However, the P2P systems are characterized by their dynamic behavior as peers can frequently join and leave the network. This property makes the data availability in a such dynamic behavior a crucial problem. Indeed, to provide a high data availability under peer churn, one possible solution is to replicate the same bloc of data into a set of nodes according to a well defined strategy. In this paper, we have deeply investigated the main existing approaches of data replication that have been proposed in the literature. Then, we have proposed an efficient data replication mechanism that overcomes the limitations of these approaches. In order to evaluate these strategies, we have conducted an extensive simulation study. Simulations results show that our strategy performs well compared with others approaches not only in a static environment but also under churn.","PeriodicalId":430600,"journal":{"name":"ICT 2013","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133734193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
ICT 2013
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1