101 results on '"internet protocol (IP)"'
Search Results
2. A Comparative Study on Routing Convergence of IP-Based and ICN-Based Routing Protocols in Satellite Networks
- Author
-
Yan, Fei, Luo, Hongbin, Zhang, Shan, Wang, Zhiyuan, Lian, Peng, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, and Quan, Wei, editor
- Published
- 2023
- Full Text
- View/download PDF
3. Design of Dual-Stack, Tunneling, and Translation Approaches for Blockchain-IPv6
- Author
-
Mantena, Srihari Varma, Jayasundar, S., Sharma, Dilip Kumar, Veerappan, J., Bennet, M. Anto, Sengan, Sudhakar, Rangasam, Rajasekar, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Reddy, V. Sivakumar, editor, Prasad, V. Kamakshi, editor, Mallikarjuna Rao, D. N., editor, and Satapathy, Suresh Chandra, editor
- Published
- 2022
- Full Text
- View/download PDF
4. Broadband Wireless Payload: Packet-Switched Data
- Author
-
Morais, Douglas H. and Morais, Douglas H.
- Published
- 2022
- Full Text
- View/download PDF
5. Preventing DoS Attack in VANET by Novel RBS-IP-CHOCK Model
- Author
-
Verma, Karan, Saini, Hemant Kumar, Sharma, Ajay K., Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Tiwari, Manish, editor, Maddila, Ravi Kumar, editor, Garg, Amit Kumar, editor, Kumar, Ashok, editor, and Yupapin, Preecha, editor
- Published
- 2022
- Full Text
- View/download PDF
6. Intelligent based packet scheduling scheme using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) technology for 5G : design and investigation of bandwidth management technique for service-aware traffic engineering using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) for 5G
- Author
-
Mustapha, Oba Z.
- Subjects
Bandwidth management ,Packet scheduling ,Internet Protocol (IP) ,Multi-Protocol Label Switching (MPLS) ,Fuzzy algorithm ,Neuro-fuzzy algorithm ,Quality of Service ,Packet Processing Algorithm (PPA) ,Traffic engineering (TE) ,Weighted Fair Queuing (WFQ) - Abstract
Multi-Protocol Label Switching (MPLS) makes use of traffic engineering (TE) techniques and a variety of protocols to establish pre-determined highly efficient routes in Wide Area Network (WAN). Unlike IP networks in which routing decision has to be made through header analysis on a hop-by-hop basis, MPLS makes use of a short bit sequence that indicates the forwarding equivalence class (FEC) of a packet and utilises a predefined routing table to handle packets of a specific FEC type. Thus header analysis of packets is not required, resulting in lower latency. In addition, packets of similar characteristics can be routed in a consistent manner. For example, packets carrying real-time information can be routed to low latency paths across the networks. Thus the key success to MPLS is to efficiently control and distribute the bandwidth available between applications across the networks. A lot of research effort on bandwidth management in MPLS networks has already been devoted in the past. However, with the imminent roll out of 5G, MPLS is seen as a key technology for mobile backhaul. To cope with the 5G demands of rich, context aware and multimedia-based user applications, more efficient bandwidth management solutions need to be derived. This thesis focuses on the design of bandwidth management algorithms, more specifically QoS scheduling, in MPLS network for 5G mobile backhaul. The aim is to ensure the reliability and the speed of packet transfer across the network. As 5G is expected to greatly improve the user experience with innovative and high quality services, users' perceived quality of service (QoS) needs to be taken into account when deriving such bandwidth management solutions. QoS expectation from users are often subjective and vague. Thus this thesis proposes the use of fuzzy logic based solution to provide service aware and user-centric bandwidth management in order to satisfy requirements imposed by the network and users. Unfortunately, the disadvantage of fuzzy logic is scalability since dependable fuzzy rules and membership functions increase when the complexity of being modelled increases. To resolve this issue, this thesis proposes the use of neuro-fuzzy to solicit interpretable IF-THEN rules. The algorithms are implemented and tested through NS2 and Matlab simulations. The performance of the algorithms are evaluated and compared with other conventional algorithms in terms of average throughput, delay, reliability, cost, packet loss ratio, and utilization rate. Simulation results show that the neuro-fuzzy based algorithm perform better than fuzzy and other conventional packet scheduling algorithms using IP and IP over MPLS technologies.
- Published
- 2019
7. An efficient EDoS-DOME system in cloud computing using obfuscated IP spoofing technique and RCDH-ENN detection technique.
- Author
-
Ribin Jones, S. B. and Kumar, N.
- Subjects
COMPUTER systems ,DOMES (Architecture) ,WEB services ,CLOUD computing ,DEER ,INTERNET protocols - Abstract
Cloud computing (CC) permits the end-users to access the network via a shared resources field. The vulnerabilities on the service providers will augment with the augmentation of the demand for CC. Economical denial of service (EDoS) attacks take over the supplier financially affecting the disparate organizations that utilize the cloud data. It is not possible to identify the hackers subsequent to EDoS attacks; however, their passage can well be detected and blocked. Nevertheless, loads of challenges are there to surmount. The work renders an effectual EDoS–Dome system in CC. Secured user authentication is initiated here with the instigation of the secret question key technique in the user registration together with the verification phase. After that, for the effective tracing back of the hacked data, an effectual Obfuscation technique is developed aimed at IP spoofing. To attain fast response time (RT) along with block the passage of attackers, a CI-RDA load balancer is developed. Lastly, the developed regression coefficients deer hunting-deep Elman neural network classifies the user data into a blacklist or white list centered on particular conditions. The experimentation's outcomes exhibit that the proposed work is effectual with 97.01% accuracy and 97.05% recalls when weighed against prevailing methods to classify the attacks. It also encompasses lower cost as well as fast RT with the equivalent web services, which signifies a safe model in opposition to the EDoS attack. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. 5G Transport Payload: Ethernet-Based Packet-Switched Data
- Author
-
Morais, Douglas H and Morais, Douglas H
- Published
- 2021
- Full Text
- View/download PDF
9. Implementation of a Hotel Network Using Cisco Packet Tracer.
- Author
-
Roshith, Inapagolla and Padmapriya V. M.
- Subjects
INTERNET domain naming system ,LOCAL area networks ,COMPUTER networks ,PRIVATE networks ,INTERNET protocol address ,TELECOMMUNICATION systems - Abstract
A Local Area Network (LAN) is a private communication network for connecting computers and devices in a circumscribed location. This paper explains the design and implementation of LAN for a Hotel named 'Greenwich'. The network topology is achieved with the help of nodes such as Server, Routers, Switches, PCs, Wireless Devices, WLANs and Ethernet cables. The paper also deals with a few other topics like Server Configuration (HTTP, DNS, FTP and Email Servers), IP Address Configuration, transmission of packets among the devices in the network, working of IP phones and also how Virtual LANs can help in separating sectors in a network. All routers of all the floors are connected to the Internet. The entire network topology of Hotel Greenwich is simulated with the help of a simulating software called Cisco Packet Tracer (CPT). The implemented design is of primary level and can be enhanced for higher levels. [ABSTRACT FROM AUTHOR]
- Published
- 2022
10. Protocol
- Author
-
Gerd Beuster, Oliver Leistert, and Theo Röhle
- Subjects
Protocols ,Internet protocol (IP) ,Blockchain ,Cybernetics ,Q300-390 ,Information theory ,Q350-390 - Abstract
Protocol describes a cascade of formalised standards or agreements to be implemented as control regimes for flexible material and/or semiotic organisation. It predictably structures in an often layered, sometimes hierarchical way the behaviours of data and objects to participate in infrastructural networks. While 'protocol' may refer specifically to Internet protocols, it also describes a mode of organisation evident in a variety of technical and non-technical settings.
- Published
- 2022
- Full Text
- View/download PDF
11. A Dual Protocol Stack for Intelligent Traffic Monitoring System
- Author
-
Sasirekha, S., Swamynathan, S., Barbosa, Simone Diniz Junqueira, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Deshpande, A.V., editor, Unal, Aynur, editor, Passi, Kalpdrum, editor, Singh, Dharm, editor, Nayak, Malaya, editor, Patel, Bharat, editor, and Pathan, Shafi, editor
- Published
- 2018
- Full Text
- View/download PDF
12. Automated Computer Vision System Based on Color Concentration and Level for Product Quality Inspection
- Author
-
Rahman, Nor Nabilah Syazana Abdul, Mohd Saad, Norhashimah, Abdullah, Abdul Rahim, Wahab, Farhan Abdul, Ao, Sio-Iong, editor, Kim, Haeng Kon, editor, Castillo, Oscar, editor, Chan, Alan Hoi-Shou, editor, and Katagiri, Hideki, editor
- Published
- 2018
- Full Text
- View/download PDF
13. Technical Challenges of Integration of Space and Terrestrial Systems
- Author
-
Walker, John L., Hoeber, Chris, Pelton, Joseph N., editor, Madry, Scott, editor, and Camacho-Lara, Sergio, editor
- Published
- 2017
- Full Text
- View/download PDF
14. The Internet : Origins and evolution
- Author
-
Meyer, David
- Published
- 2019
15. Patent aggregation, innovation and eu competition law
- Author
-
Galli, Niccolò and Galli, Niccolò
- Abstract
Patents in information and communication technology (‘ICT’) industries have acquired new functions beyond the protection of a product market exclusivity, such as blocking competitors’ operations, improving bargaining positions in commercial negotiations, and influencing the setting of standardised technologies. The multiple functions make ICT patents very valuable to firms, which aggregate them in collections, also known as patent portfolios. This research analyses the activities of the different entities aggregating patents that go under the encompassing term of patent aggregation. Specifically, it assesses whether single patent aggregation instances can have anti-innovative effects and whether, in so doing, they could violate EU competition law, which also protects technological development.
- Published
- 2023
16. ATSC 3.0 Standards Usher in Next Gen TV Era.
- Author
-
Noland, Madeleine
- Subjects
STANDARDS ,INTERNET protocols ,VIDEO coding ,DIGITAL television ,TCP/IP - Abstract
ATSC 3.0 is the Next Gen TV broadcast emission system defined by the Advanced Television Systems Committee (ATSC) encompassing the entire terrestrial broadcast system from the physical layer to the applications and presentation layer. This paper offers an overview of the important advancements in the ATSC 3.0 Standard, which is designed to inspire today's content creators, business leaders, and consumers. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
17. Portable Wi-Fi Calling and Interactive Voice Response System
- Author
-
Kasare, Ruchi W., Muneshwar, Pooja K., Tembhekar, Nikhil D., Yadav, V. P., and Shriral, J. V.
- Published
- 2017
18. Patent aggregation, innovation and eu competition law
- Author
-
Niccolò Galli, Drexl, Josef, Pugatch, Meir, Conde Gallego, Beatriz, International and European Law, and RS: FdR Institute IGIR
- Subjects
Antitrust ,standards ,empirical research ,internet protocol (IP) - Abstract
Patents in information and communication technology (‘ICT’) industries have acquired new functions beyond the protection of a product market exclusivity, such as blocking competitors’ operations, improving bargaining positions in commercial negotiations, and influencing the setting of standardised technologies. The multiple functions make ICT patents very valuable to firms, which aggregate them in collections, also known as patent portfolios. This research analyses the activities of the different entities aggregating patents that go under the encompassing term of patent aggregation. Specifically, it assesses whether single patent aggregation instances can have anti-innovative effects and whether, in so doing, they could violate EU competition law, which also protects technological development.
- Published
- 2023
19. Technical Challenges of Integration of Space and Terrestrial Systems
- Author
-
Walker, John L., Hoeber, Chris, Pelton, Joseph N., editor, Madry, Scott, editor, and Camacho-Lara, Sergio, editor
- Published
- 2013
- Full Text
- View/download PDF
20. The Impact of IPv6 on Video-to-Video and Mobile Video Communications
- Author
-
Ladid, Latif, Chochliouros, Ioannis P., Iliadis, Lazaros, editor, Maglogiannis, Ilias, editor, Papadopoulos, Harris, editor, Karatzas, Kostas, editor, and Sioutas, Spyros, editor
- Published
- 2012
- Full Text
- View/download PDF
21. IP Networking and Future Evolution
- Author
-
Sun, Zhili, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, and Kouvatsos, Demetres D., editor
- Published
- 2011
- Full Text
- View/download PDF
22. Adaptation of Powerline Communications-Based Smart Metering Deployments to the Requirements of Smart Grids
- Author
-
Alberto Sendin, Txetxu Arzuaga, Iker Urrutia, Iñigo Berganza, Ainara Fernandez, Laura Marron, Asier Llano, and Aitor Arzuaga
- Subjects
smart metering ,smart grid ,powerline communications (PLC) ,international telecommunication union ITU-T G.9904 ,distribution grid ,network management system ,internet protocol (IP) ,simple network management protocol (SNMP) ,Technology - Abstract
Powerline communications (PLC)-based smart meter deployments are now a reality in many regions of the world. Although PLC elements are generally incorporated in smart meters and data concentrators, the underlying PLC network allows the integration of other smart grid services directly over it. The remote control capabilities that automation programs need and are today deployed over their medium voltage (MV) grid, can be extended to the low voltage (LV) grid through these existing PLC networks. This paper demonstrates the capabilities of narrowband high data rate (NB HDR) PLC technologies deployed over LV grids for smart metering purposes to support internet protocol internet protocol (IP) communications in the LV grid. The paper demonstrates these possibilities with the presentation of the simulation and laboratory results of IP communications over international telecommunication union: ITU-T G.9904 PLC technology, and the definition of a PLC Network Management System based on a simple network management protocol (SNMP) management information base (MIB) definition and applicable use cases.
- Published
- 2015
- Full Text
- View/download PDF
23. The Usage of MPLS in Voice over IP Network
- Author
-
Khawaja, Kashif R., Hulaiyel M. Khaldi, Shukri, Majed I., Baraka H. Mutairi, and Al-Khaldi, Fahad Nasser
- Subjects
Voice over Internet Protocol (VoIP) ,Multiprotocol Label Switching (MPLS) ,Internet Protocol (IP) ,Traffic Engineering (TE) ,Label Switched Path (LSP) - Abstract
The article focused on the usage of Multiprotocol Label Switching (MPLS) over VOIP network. One of the features that MPLS has is Traffic Engineering (TE) which can help overcome potential pot holes in the network or to circumvent sub-optimal paths, especially in a network consisting of a diverse geographical terrain. The prevalence of MPLS IP VPN networks make them the de facto transport for inter-connecting IMS based VoIP devices. Inevitably, this creates the need for a fundamental set of guidelines, which can ensure that the quality of service for real time traffic is acceptable. To that end, a systematic approach was taken to implement traffic engineering LSPs which enabled the real time multimedia traffic to be delivered with highest priority and minimal loss and delay. This helped provide tangible network operations benefits such as, early detection of service disruption because of faults in the desired end to end label switched paths, reduction of the Mean Time to Resolve (MTTR) and lead to proposals for further improvements which could produce a more intelligent re-routing of the LSPs Keywords: Multiprotocol Label Switching (MPLS), Traffic Engineering (TE), Voice over Internet Protocol (VoIP), Internet Protocol (IP), Label Switched Path (LSP). Title: The Usage of MPLS in Voice over IP Network Author: Kashif R. Khawaja, Hulaiyel M. Khaldi, Majed I. Shukri, Baraka H. Mutairi, Fahad Nasser Al-Khaldi International Journal of Engineering Research and Reviews ISSN 2348-697X (Online) Vol. 10, Issue 3, July 2022 - September 2022 Page No: 6-10 Research Publish Journals Website: www.researchpublish.com Published Date: 12-August-2022 DOI: https://doi.org/10.5281/zenodo.6985144 Paper Download Link (Source) https://www.researchpublish.com/papers/the-usage-of-mpls-in-voice-over-ip-network, International Journal of Engineering Research and Reviews, ISSN 2348-697X (Online), Research Publish Journals, Website: www.researchpublish.com, {"references":["[1]\tMahesh Kr. Porwal., Anjulata Yadav., S. V. Charhate, \"Traffic Analysis of MPLS and Non MPLS Network including MPLS Signaling Protocols and Traffic distribution in OSPF and MPLS,\" International Conference on Emerging Trends in Engineering and Technology, ICETET, July 2008","[2]\tNader F.Mir., Albert Chien, \"Simulation of Voice over MPLS communications Networks,\" IEEE ICSS\"02, conference","[3]\tLiwen He, Paul. Botham, \"Pure MPLS Technology\". The Third International Conference on Availability, Reliability and Security, IEEE","[4]\tXipeng Xiao, Alan Hannan, and Brook Bailey, Global Center Inc. Lionel M, NI, Michigan State University. \"Traffic Engineering with MPLS in the Internet\"","[5]\tRahman M.A.,Kabir A.H., Lutfullah K.A.M., Hassan M.Z. and Amin M.R., \"Performance analysis and the study of the behavior of MPLS protocols,\" International Conference on Computer and Communication Engineering ICCCE, 13-15 May 2008, Page(s):226 – 229","[6]\tWeb ProForum Tutorials, \"Multiprotocol Label Switching (MPLS)\", Proc of the International Engineering Consortium, pp. 1-24, http://www.iec.org"]}
- Published
- 2022
- Full Text
- View/download PDF
24. Protocol
- Author
-
Beuster, Gerd, Leistert, Oliver, and Röhle, Theo
- Subjects
Blockchain ,Computer Networks and Communications ,Communication ,Internet protocol (IP) ,ddc:300 ,Management, Monitoring, Policy and Law ,Protocols - Abstract
Protocol describes a cascade of formalised standards or agreements to be implemented as control regimes for flexible material and/or semiotic organisation. It predictably structures in an often layered, sometimes hierarchical way the behaviours of data and objects to participate in infrastructural networks. While "protocol" may refer specifically to Internet protocols, it also describes a mode of organisation evident in a variety of technical and non-technical settings.
- Published
- 2022
25. A Linux Implementation of a Differentiated Services Router
- Author
-
Braun, Torsten, Einsiedler, Hans Joachim, Scheidegger, Matthias, Stattenberger, Günther, Jonas, Karl, Heinrich, J.Stüttgen, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Rao, Sathya, editor, and Sletta, Kaare Ingar, editor
- Published
- 2000
- Full Text
- View/download PDF
26. An implementation of a gateway for hierarchically encoded video across ATM and IP networks
- Author
-
Robinet, Jean-michel, Au, Yuhang, Banerjea, Anindo, and van As, Harmen R., editor
- Published
- 1998
- Full Text
- View/download PDF
27. Adaptation of Powerline Communications-Based Smart Metering Deployments to the Requirements of Smart Grids.
- Author
-
Sendin, Alberto, Arzuaga, Txetxu, Urrutia, Iker, Berganza, Iñigo, Fernandez, Ainara, Marron, Laura, Llano, Asier, and Arzuaga, Aitor
- Subjects
- *
SMART power grids , *ELECTRIC power distribution grids , *ELECTRIC potential , *ELECTRIC lines , *SIMPLE Network Management Protocol (Computer network protocol) , *MANAGEMENT information systems - Abstract
Powerline communications (PLC)-based smart meter deployments are now a reality in many regions of the world. Although PLC elements are generally incorporated in smart meters and data concentrators, the underlying PLC network allows the integration of other smart grid services directly over it. The remote control capabilities that automation programs need and are today deployed over their medium voltage (MV) grid, can be extended to the low voltage (LV) grid through these existing PLC networks. This paper demonstrates the capabilities of narrowband high data rate (NB HDR) PLC technologies deployed over LV grids for smart metering purposes to support internet protocol internet protocol (IP) communications in the LV grid. The paper demonstrates these possibilities with the presentation of the simulation and laboratory results of IP communications over international telecommunication union: ITU-T G.9904 PLC technology, and the definition of a PLC Network Management System based on a simple network management protocol (SNMP) management information base (MIB) definition and applicable use cases. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
28. Bloom-filter based IP-CHOCK detection scheme for denial of service attacks in VANET.
- Author
-
Verma, Karan and Hasbullah, Halabi
- Subjects
VEHICULAR ad hoc networks ,INTELLIGENT transportation systems ,COMPUTER industry security measures ,COMPUTER industry -- Social aspects ,INTERNET protocols ,INTERNET domain naming system - Abstract
ABSTRACT Vehicular ad hoc networks (VANETs) have drawn increasing attention in recent years due to their wide range of applications. At the present time, vehicle communication is exposed to many security threats, such as denial of service (DoS) attacks. In these attacks, a malicious node forges a large number of fake identities. Internet Protocol (IP) spoofing addresses is to disrupt the proper functioning of the fair data transfer between two fast moving vehicles. In this paper, IP spoofing addresses of DoS attacks have been detected and defended by using the Bloom-filter based IP-CHOCK detection method, which provides the availability of a service for the legitimate vehicles in the VANET. The IP spoofing addresses in the DoS attacks committed by fraud and malicious nodes have also been investigated. This method provides a secure communication as well as frees the bandwidth. This proposed approach requires fewer resources and is easy to deploy. Simulation results have shown that this method is efficient and effective to detect and defend against DoS attacks in the VANET. Specifically, this method provides faster detection time, lower storage capacity, and computational cost. Copyright © 2014 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
29. Embedded VoIP communication system with graphical user interface features.
- Author
-
Divya, G. S. and Srikanth, P. C.
- Abstract
The wide-scale deployment of intranet and internet along with the advancements in hardware and software technologies are leading to the emergence of new applications that mainly involve the delivery of voice, video and images to the end users. One such application that has generated considerable interest is VoIP. The applications of VoIP technology have gained momentum due to the advancements and widespread usage of internet. The use of embedded platforms for these applications overcomes the PC environments for simple voice communications through internet. The VOIP application in this paper sets the hardware foundation on DSP embedded platform, adopts TCP and UDP as transmission protocols and employs compression algorithms to ensure the low-latency and high quality communication. A telephone network is created with this infrastructure using a DSP based systems for voice and data communication on the basis of existing LAN. A centralized control has been provided by porting HTML pages onto the processor. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
30. An intelligent scheduling architecture for mixed traffic in LTE-Advanced.
- Author
-
Kausar, R., Chen, Y., and Chai, K. K.
- Abstract
In this paper an intelligent scheduling architecture is presented for LTE-Advanced downlink transmission, to enhance the Quality of Service (QoS) provision to different traffic types while maintaining system level performance in such as system throughput. Hebbian learning process and K-mean clustering algorithm are integrated in the Time Domain (TD) of scheduling architecture, to intelligently allocate available radio resources to Real Time (RT) and Non Real Time (NRT) traffic, and to prioritise RT users based on their Packet Drop Rate (PDR) feedback. The integration of these algorithms allows just enough resource allocation to RT traffic and diverts extra resources to NRT traffic, to fulfill its minimum throughput requirements. System level simulation is set up for system level performance evaluation. Simulation results show that the proposed architecture reduces average delay, delay violation probability and average Packet Drop Rate (PDR) of RT traffic while guaranteeing the support of minimum throughput to NRT traffic and maintains system throughput at good level. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
31. SISTEMA DE MONITOREO REMOTO VÍA INTERNET CON GENERACIÓN DE INDICADORES DE PRODUCCIÓN PARA PROCESOS AUTOMATIZADOS.
- Author
-
Escudero Restrepo, Santiago, Merino Pérez, Mauricio, and Vásquez Salazar, Rubén Darío
- Abstract
A remote monitoring system via Internet for the Multivariable and Level modules, available in Politécnico Colombiano Jaime Isaza Cadavid, is presented. It is achieved through an interaction between the S7-1200 PLC and a PC server with LabVIEW® software. The main aim is to provide a new way to obtain information about a remote process in real time that can be applied industrially for small and medium enterprises. This is a solution relatively cheaper than those existing in the market. First, the selection of the most relevant indicators for the 2 production processes is described, continuing with the selection of hardware and software tools needed to perform the remote monitoring via the Internet through a web-browser. A dynamic online file of historical indicators is created and finally communication tests from the same network and an external network are implemented to validate the full operation of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2014
32. A comparison study between the TLS-based security framework and IKEv2 when protecting DSMIPv6 signaling.
- Author
-
Faria, B., Korhonen, J., and Souto, E.
- Subjects
- *
COMPARATIVE studies , *DATA security , *TELECOMMUNICATION systems , *SIGNALS & signaling , *DATA transmission systems , *BANDWIDTHS - Abstract
Abstract: This paper presents a comparison study between the TLS-based security for DSMIPv6 and IKEv2 when establishing Security Associations between MN and HA. The network transmission and processing costs are examined for each protocol using different authentication methods. The results show that the TLS-based solution has less computation cost and less authentication delay than IKEv2with D–H Groups 5 and 14. However, the high amount of transmitted data for certificate based authentications increases the authentication delay in low bandwidth wireless networks. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
33. Stochastic MCDM Framework Over Converged Infrastructure.
- Author
-
Mushtaq, Sajjad Ali, Sajjad, Naheed, and Khan, Zahoor
- Subjects
MULTIPLE criteria decision making ,STOCHASTIC systems ,INTERNET ,ENTERPRISE application integration (Computer systems) ,NETWORK operating system ,INTERNET protocols - Abstract
Abstract: Service unification and application integration have brought about vendors, network operators, service providers, car- riers, businesses and infrastructures over a platform while offering the business plans, presenting solution packages, proposing virtualization strategies and outsourcing the resources whereas promising an all Internet Protocol (IP) setup. Diverse business goals from distinctive providers alongside the technology merger and service unification in addition to dynamic border traffic management issues introduce more complexity over such platforms. A decision-making frame- work for handling the border traffic management issues at private public network with multi homing support is presented. Augmented Multi Criteria Decision Making (MCDM) theory addresses the qualitative entities while constructing the structural hierarchy of goals, criteria, sub criteria and alternatives. Inter/Intra-domain knowledge over different planes (service, control and transport) is modeled by using ontology. Blending ontology with Bayesian captures uncertainty over the planes. A simple use-case is presented over the test-bed to validate the proposed solution. The system offers higher throughput with lower call/session/request drop at the cost of an add-on delay. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
34. Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense.
- Author
-
Phatak, Dhananjay, Sherman, Alan T., Joshi, Nikhil, Sonawane, Bhushan, Relan, Vivek G., and Dawalbhakta, Amol
- Subjects
- *
ANONYMITY , *CRYPTOGRAPHY , *DENIAL of service attacks , *INTERNET protocols , *COMPUTER security - Abstract
We present and experimentally evaluate Spread Identity (SI) - a new dynamic network address remapping mechanism that provides anonymity and DDoS defense capabilities for Internet communications. For each session between a source and destination host, the trusted source gateway dynamically and randomly assigns an IP address for the source host from the pool of all routable IP addresses allocated to the source organization. Similarly, in response to a name resolution query from the source gateway, the trusted authoritative DNS server for the destination organization dynamically assigns an IP address for the destination host from the pool of all routable IP addresses allocated to the destination organization. These assignments depend upon the state of the server (including load, residual capacity, time of day) and policy. Different hosts can share the same IP address when communicating with distinct peers. Each gateway creates a NAT entry, valid for the communication session, based on the dynamic assignment by its organization. An eavesdropper listening to packets flowing through the Internet between the source and destination gateways learns only the source and destination domains; the eavesdropper cannot see the actual complete IP addresses of the source and destination hosts. In addition, SI enhances DDoS defense capabilities by enabling packet filtering based on destination addresses. With multiple IP addresses for the same destination, filtering based on destination addresses can block attackers without necessarily blocking legitimate users. Deploying SI requires changes to organizational gateways and, possibly, to the edge-routers that interface with organizational gateways; but network mechanisms farther upstream, including the core routers in the Internet, remain unchanged. Likewise, the installed base of operating systems running individual hosts in the internal network, together with the end-user application suites they support, remain untouched. SI mechanisms are backward compatible, incrementally deployable, and robustly scalable. A naïve implementation of SI can increase the DNS traffic; however, when SI is implemented at both the source and the destination ends, it is possible for SI to reduce DNS traffic. Ns-2 simulations and experiments on the DeterLab test bed corroborate the main hypotheses and demonstrate advantages of the SI paradigm. Ns-2 simulations demonstrate that file transfer success rates for our SI DDoS protection mechanism are similar to those of filter- and capability-based approaches, with lower file transfer times than for filter-based approaches. DeterLab trials demonstrate that SI consumes similar resources (connection establishment time, network address translation table size, packet forwarding rate and memory) to those of a typical single NAT system, though with higher name resolution times. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
35. VIP-WAVE: On the Feasibility of IP Communications in 802.11p Vehicular Networks.
- Author
-
Cespedes, Sandra, Lu, Ning, and Shen, Xuemin (Sherman)
- Abstract
Vehicular communication networks, such as the 802.11p and Wireless Access in Vehicular Environments (WAVE) technologies, are becoming a fundamental platform for providing real-time access to safety and entertainment information. In particular, infotainment applications and, consequently, IP-based communications, are key to leverage market penetration and deployment costs of the 802.11p/WAVE network. However, the operation and performance of IP in 802.11p/WAVE are still unclear as the WAVE standard guidelines for being IP compliant are rather minimal. This paper studies the 802.11p/WAVE standard and its limitations for the support of infrastructure-based IP applications, and proposes the Vehicular IP in WAVE (VIP-WAVE) framework. VIP-WAVE defines the IP configuration for extended and non-extended IP services, and a mobility management scheme supported by Proxy Mobile IPv6 over WAVE. It also exploits multi-hop communications to improve the network performance along roads with different levels of infrastructure presence. Furthermore, an analytical model considering mobility, handoff delays, collisions, and channel conditions is developed for evaluating the performance of IP communications in WAVE. Extensive simulations are performed to demonstrate the accuracy of our analytical model and the effectiveness of VIP-WAVE in making feasible the deployment of IP applications in the vehicular network. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
36. Satellite application for train control systems: The Test Site in Sardinia.
- Author
-
Senesi, Fabio
- Abstract
Highlights: [•] GNSS. [•] ERTMS/ETCS (European Railways Train Management System/European Train Control System). [•] EGNOS-Galileo infrastructures for localization. [•] Railway Safety. [•] Telecomunication by IP for train to track data exchange. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
37. Intercultural Communication Competence via IP Services Applications: A Modified Task-technology Fit Perspective.
- Author
-
Vannoy, Sandra A. and Chen, Charlie C.
- Subjects
CROSS-cultural communication ,INTERNET protocols ,CULTURAL competence ,GLOBALIZATION ,COMMUNICATION & technology ,LEAST squares ,SELF-efficacy - Abstract
Technology and effective communication have been acknowledged as essential components of the globalization process. However, there is little empirical research regarding the role of technology in assisting individuals in communicating across cultures. Over a four week period, one hundred American and sixty Taiwanese subjects communicated virtually via the Internet Protocol (IP) services application Skype on a one-to-one basis in order to learn from each about their respective cultures and acquire communication skills. A survey was administered to the American participants at the end of the four weeks. The results of a Partial Least Squares analysis show strong support for using a self-efficacy modified task-technology fit perspective to understand the relationship between IP services applications and intercultural communication competence. The utilization of IP services applications and the perception that the IP services applications fit intercultural communication tasks are useful predictors for perceived intercultural communication competence. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
38. A data mining framework for product and service migration analysis.
- Author
-
Au, Siu-Tong, Duan, Rong, and Jiang, Wei
- Subjects
- *
CONSUMERS , *EMIGRATION & immigration , *DATA mining , *INTERNET protocols , *CUSTOMER relationship management - Abstract
With new technologies or products invented, customers migrate from a legacy product to a new product from time to time. This paper discusses a time series data mining framework for product and service migration analysis. In order to identify who migrate, how migrations look like, and the relationship between the legacy product and the new product, we first discuss certain characteristics of customer spending data associated with product migration. By exploring interesting patterns and defining a number of features that capture the associations between the spending time series, we develop a co-integration-based classifier to identify customers associated with migration and summarize their time series patterns before, during and after the migration. Customers can then be scored based on the migration index that integrates the statistical significance and business impact of migration customers. We illustrate the research through a case study of internet protocol (IP) migration in telecommunications and compare it with likelihood-ratio-based tests for change point detections. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
39. A fraud management system architecture for next-generation networks
- Author
-
Bihina Bella, M.A., Eloff, J.H.P., and Olivier, M.S.
- Subjects
- *
FRAUD prevention , *COMPUTER architecture , *COMPUTER networks , *INTERNET protocols , *ARTIFICIAL neural networks , *SELF-organizing maps , *PROTOTYPES , *TELECOMMUNICATION - Abstract
Abstract: This paper proposes an original architecture for a fraud management system (FMS) for convergent. Next-generation networks (NGNs), which are based on the Internet protocol (IP). The architecture has the potential to satisfy the requirements of flexibility and application-independency for effective fraud detection in NGNs that cannot be met by traditional FMSs. The proposed architecture has a thorough four-stage detection process that analyses billing records in IP detail record (IPDR) format – an emerging IP-based billing standard – for signs of fraud. Its key feature is its usage of neural networks in the form of self-organising maps (SOMs) to help uncover unknown NGN fraud scenarios. A prototype was implemented to test the effectiveness of using a SOM for fraud detection and is also described in the paper. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
40. IP-based NGNs and Interconnection: The Debate in Europe.
- Author
-
MARCUS, J. Scott
- Subjects
INTERNET ,INTEGRATED circuit interconnections ,MOBILE communication systems ,INTERNET protocols ,COMPUTER networks ,COMPUTER network protocols - Abstract
Historically, interconnection in the world of the Internet has been approached significantly differently from interconnection in the fixed Public Switched Telephone Network (PSTN) and the mobile Public Land Mobile Network (PLMN). As fixed and mobile networks evolve to Next Generation Networks (NGNs) based on the Internet Protocol (IP), it becomes increasingly necessary to merge these perspectives in order to achieve a unified and integrated approach to network interconnection. There is a rich history of economic analysis of IP-based and of conventional switched networks that began to converge early in this decade. In 2008, this issue is coming to a boil, as regulators seek to provide regulatory certainty for the build-out of NGNs, even in the face of substantial uncertainties, and even though practical experience with NGNs is still in a very preliminary state, What can we learn from the historical evolution of the theory of interconnection for Internet, NGN, PSTN and PLMN? What issues are "in play" today? What is the appropriate destination in the long term? What nearer term measures are appropriate? [ABSTRACT FROM AUTHOR]
- Published
- 2008
41. An Efficient Approach to On-Chip Logic Minimization.
- Author
-
Ahmad, Seraj and Mahapatra, Rabi N.
- Subjects
INTEGRATED circuits ,BOOLEAN rings ,LOGIC circuits ,LOGIC design ,ELECTRONIC circuit design ,AUTOMATION ,ACCESS control ,COMPUTER security ,COMPUTER storage devices - Abstract
Boolean logic minimization is being applied increasingly to a new variety of applications that demand very fast and frequent minimization services. These applications typically have access to very limited computing and memory resources, rendering the traditional logic minimizers ineffective. We present a new approximate logic minimization algorithm based on ternary trie. We compare its performance with Espresso-II and ROCM logic minimizers for routing table compaction and demonstrate that it is 100 to 1000 times faster and can execute with a data memory as little as 16 KB. We also found that the proposed approach can support up to 25000 incremental updates per second. We also compare its performance for compaction of the routing access control list and demonstrate that the proposed approach is highly suitable for minimizing large access control lists containing several thousand entries. Therefore, the algorithm is ideal for on-chip logic minimization. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
42. Secure Mobile Architecture (SMA) – A way to fix the broken Internet
- Author
-
Paine, Richard H.
- Subjects
- *
INTERNET , *INTERNET protocols , *COMPUTER networks , *INTERNET service providers - Abstract
Abstract: The Internet is broken. There have been many attempts to fix it, but they are all complex and very difficult to implement and none of them answer the fundamental questions of what is wrong with it. The first basic flaw is the very nature of the Internet Protocol address. It is treated as both a name and an address to deliver the information to its end-to-end destination. In addition, the security of the protocol is dependent on that address. The second major flaw is the inability of the Internet protocols to address mobility with fast and secure handoff. The Secure Mobile Architecture (SMA) fundamentally addresses these flaws in the very nature of the Internet Protocols. It does this by treating the IP layer as an insecure transport layer. It requires four elements to effect this transformation of the Internet. It can be integrated into existing Intranets. It can function easily in the namespace of an Internet service provider (ISP), an enterprise, or governments. The rest of this chapter will take you through the architecture and its elements. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
43. Offline firewall analysis.
- Author
-
Mayer, Alain, Wool, Avishai, and Ziskind, Elisha
- Subjects
- *
FIREWALLS (Computer security) , *COMPUTER network security , *INTERNET protocols , *COMPUTER security , *INTERNET , *COMPUTER systems - Abstract
Practically every corporation that is connected to the Internet has at least one firewall, and often many more. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. Therefore, testing, auditing, or reverse-engineering existing firewall configurations are important components of every corporation’s network security practice. Unfortunately, this is easier said than done. Firewall configuration files are written in notoriously hard to read languages, using vendor-specific GUIs. A tool that is sorely missing in the arsenal of firewall administrators and auditors is one that allows them to analyze the policy on a firewall. To alleviate some of these difficulties, we designed and implemented two generations of novel firewall analysis tools, which allow the administrator to easily discover and test the global firewall policy. Our tools use a minimal description of the network topology, and directly parse the various vendor-specific low-level configuration files. A key feature of our tools is that they are passive: no packets are sent, and the analysis is performed offline, on a machine that is separate from the firewall itself. A typical question our tools can answer is “from which machines can our DMZ be reached, and with which services?.” Thus, our tools complement existing vulnerability analyzers and port scanners, as they can be used before a policy is actually deployed, and they operate on a more understandable level of abstraction. This paper describes the design and architecture of these tools, their evolution from a research prototype to a commercial product, and the lessons we have learned along the way. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
44. IEEE8O2.11 Sensor Networking.
- Author
-
Ferrari, Paolo, Flammini, Alessandra, Marioli, Daniele, and Taroni, Andrea
- Subjects
- *
TRANSDUCERS , *WIRELESS communications , *IEEE 802.11 (Standard) , *COMPUTER network protocols , *INFORMATION technology , *COMPUTER architecture - Abstract
This paper deals with a smart-transducer wireless network for industrial applications. Thanks to its high popularity, a solution based on IEEE802.11 (also known as wireless fidelity or Wi-Fi) is experimentally investigated. A master-slave network organization is proposed to allow several sensors to be connected with generic Wi-Fi devices like PCs; a proprietary protocol over Internet Protocol (IP)/User Datagram Protocol (UDP) has also been developed. Last, some low-cost prototypes have been built to test the network behavior performances in terms of timing characteristics and power dissipation. Experimental results prove the applicability in a soft real-time (nontime-critical) industrial context. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
45. ON THE EXPANSION PROBLEM OF RELIABLE IP NETWORKS WITH PERFORMANCE GUARANTEES.
- Author
-
Chamberlan, Steven
- Subjects
COMPUTER network protocols ,INTERNET protocols ,COMPUTER network resources ,NETWORK routers ,COST effectiveness ,ALGORITHMS ,DATA transmission systems ,COST analysis ,COMPUTER networks - Abstract
In this paper, we tackle the problem of how to expand Internet protocol (IP) networks with performance guarantees, in a cost-effective way. We first propose an optimization model that deals with selecting the location of the routers, selecting their types, expanding the access and the backbone networks and selecting the transmission link types. The model also considers the routing of the IP traffic using a standardized routing protocol. The performance guarantees we refer to are bandwidth guarantees between the clients' routers. The performance guarantees stand not only for the normal state of the network, but also for all failure scenarios of interest to the network planner. A tabu-based metaheuristic algorithm is proposed to find solutions of the model. Numerical results show that "good" solutions can be found using the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
46. Dynamic reconfiguration and routing algorithms for IP-over-WDM networks with stochastic traffic.
- Author
-
Brzezinski, A. and Modiano, E.
- Abstract
We develop algorithms for joint IP-layer routing and WDM logical topology reconfiguration in IP-over-WDM networks experiencing stochastic traffic. At the wavelength division multiplexing (WDM) layer, we associate a nonnegligible overhead with WDM reconfiguration, during which time tuned transceivers cannot service backlogged data. The Internet Protocol (IP) layer is modeled as a queueing system. We demonstrate that the proposed algorithms achieve asymptotic throughput optimality by using frame-based maximum weight scheduling decisions. We study both fixed and variable frame durations. In addition to dynamically triggering WDM reconfiguration, our algorithms specify precisely how to route packets over the IP layer during the phases in which the WDM layer remains fixed. We demonstrate that optical-layer constraints do not affect the results, and provide an analysis of the specific case of WDM networks with multiple ports per node. In order to gauge the delay properties of our algorithms, we conduct a simulation study and demonstrate an important tradeoff between WDM reconfiguration and IP-layer routing. We find that multihop routing is extremely beneficial at low-throughput levels, while single-hop routing achieves improved delay at high-throughput levels. For a simple access network, we demonstrate through simulation the benefit of employing multihop IP-layer routes. [ABSTRACT FROM PUBLISHER]
- Published
- 2005
- Full Text
- View/download PDF
47. Intelligent Content Aware Services in 3G Wireless Networks.
- Author
-
De Angelis, Flavio, Habib, Ibrahim, Davide, Fabrizio A. M., and Naghshineh, Mahmoud
- Subjects
PROBABILITY theory ,MATHEMATICAL optimization ,TELECOMMUNICATION ,COMMUNICATION ,WIRELESS communications - Abstract
In this paper, we address the problem of optimizing the delivery of multimedia services with different quality-of-service (QoS) requirements to mobile users. We assume that the network provides two distinct classes of service to which users may subscribe: Premium, or Economy. Subscribers to the Premium service pay more for their connections but receive a higher level of quality measured by a set of parameters such as call blocking probability, coding rate, and format of the multimedia services. By optimizing the delivery of the multimedia services, we mean that the network guarantees that all users receive their agreed-upon contractual level of quality, while maximizing the links' throughput, avoiding congestion, and maintaining the QoS requirements for each type of media (e.g., video, voice and data). Our proposed solution is based upon utilizing genetic algorithms to solve a multi-objective optimization function that adaptively selects the downloading bit-rate for each type of traffic flow subject to the constraints of the optimization function. A traffic flow is an abstract of aggregate traffic of the same type of media (e.g., voice, video, or data) that is downloaded to a group of users who share some common attribute such as the same class of service. The optimization function is adaptive in the sense that the selected downloading bit-rates are time-dependant according to the dynamics of the links' traffic-loads and users' requests. It is implemented on every output port of each node in the network. The function is used to control a filter that changes the coding rate of each media-type and, if necessary, performs transcoding of one, or more, media-types (i.e., video, voice, or data). Simulation results show significant improvement in terms of increasing the number of admitted users, while maintaining the QoS requirements, as well as target call blocking rates. An interesting result to report is that the performance improvement of the system (measured by t... [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
48. Scalable multiple description coding and distributed video streaming in 3G mobile communications.
- Author
-
Ruobin Zheng, Weihua Zhuang, and Hai Jiang
- Subjects
MULTIMEDIA systems ,MULTIMEDIA communications ,MOBILE communication systems ,STREAMING technology ,DATA transmission systems ,COMPUTER network protocols ,ALGORITHMS - Abstract
This paper proposes a distributed multimedia delivery mobile network for video streaming in 3rd generation (3G) mobile communications. The joint design of layered coding (LC) and multiple description coding (MDC) is employed to address the bandwidth fluctuations and packet loss problems in the wireless network and to further enhance the error resilience tools in MPEG-4. A new Internet protocol (IP) differentiated services (DiffServ) video marking algorithm is presented to support an unequal error protection of the LC components. Both intra-RAN (radio access network) handoff and inter-RAN handoff procedures are discussed, which provide path diversity to combat streaming video outage due to handoff in the universal mobile telecommunications system (UMTS). Computer simulation results demonstrate that: (1) the newly proposed IP DiffServ video marking algorithm is more suitable for video streaming in an IP mobile network as compared with the previously proposed algorithm, and (2) the proposed handoff procedures have better performance in terms of handoff latency, end-to-end delay and handoff scalability than that in UMTS. Copyright © 2005 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
49. On the Design of Fault-Tolerant Logical Topologies in Wavelength-Routed Packet Networks.
- Author
-
Nucci, Antonio, Sansò, Brunilde, Crainic, Theodor Gabriel, Leonardi, Emilio, and Marsan, Marco Ajmone
- Subjects
TOPOLOGY ,OPTICAL communications ,TELECOMMUNICATION systems ,ELECTRONIC data processing ,PHOTONICS - Abstract
In this paper, we present a new methodology for the design of fault-tolerant logical topologies in wavelength-routed optical networks supporting Internet protocol (IP) datagram flows. Our design approach generalizes the "design protection" concepts, and relies on the dynamic capabilities of IP to reroute datagrams when faults occur, thus achieving protection and restoration, and leading to high-performance cost-effective fault-tolerant logical topologies. In this paper, for the first time we consider resilience properties during the logical topology optimization process, thus extending the optimization of the network resilience also to the space of logical topologies. Numerical results clearly show that our approach outperforms previous ones, being able to obtain very effective survivable logical topologies with limited computational complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
50. Evolution of the Wireless PAN and LAN standards
- Author
-
Zahariadis, Th.
- Subjects
- *
COMMUNICATION , *LOCAL area networks , *PERSONAL communication service systems , *INTERFACES (Physical sciences) -- Mathematics - Abstract
In the forthcoming fourth-generation (4G) all-IP mobile communications era, apart from the cellular/mobile networks, Wireless Personal Area Networks (PANs) and Local Area Network (LAN) are expected to fulfil the “anywhere and anytime” ubiquitous services'' requirement. Users will request forming “ad hoc” personal area networks to enable personal devices to autonomously inter-communicate, while Wireless LANs will enable communication with colleagues at work, at conferences, at “hot spots”, at home, or on the move. In parallel, advanced sensor devices of the surrounding environment will recognize the user and provide for added value services. In order to achieve this, open standard interfaces and interoperability between devices and manufacturers are mandatory. In this paper, we describe the most important, mature Wireless PAN and LAN standards, and introduce some evolving new standards. [Copyright &y& Elsevier]
- Published
- 2004
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.