By Topic

Networking and Services, 2008. ICNS 2008. Fourth International Conference on

Date 16-21 March 2008

Filter Results

Displaying Results 1 - 25 of 56
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (10 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (73 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): ix - x
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • Program Committee

    Page(s): xi - xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (68 KB)  
    Freely Available from IEEE
  • An XML Firewall on Embedded Network Processor

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (307 KB) |  | HTML iconHTML  

    XML-based services with flexible and intelligent structures for data expression and exchange are quickly gaining popularity. Enterprises are deploying XML-based services as a central component of the application integration. As the application data are crucial to the enterprises, the XML messages must be secured to ensure the reliability of these services. This paper presents the design of an embedded XML firewall with XML identification, XML validation, XML encryption and decryption, XML signature and signature verification, which is implemented on Intel IXP425, an embedded network processor for small and medium enterprise solutions. Suitable for enterprises to deploy XML security for their IT infrastructure, the XML firewall provides confidentiality, integrity and authenticity for XML-based services. Improvements are introduced and evaluated, including schema preprocessing and hardware acceleration for security processing. Ideas about future work of XML firewall based on this platform are also proposed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Adaptive Transmission Scheduling in Packet Radio Networks

    Page(s): 7 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (303 KB) |  | HTML iconHTML  

    The topology of the packet radio network changes dynamically. The initial slot assignments may cause interferences among the nodes while transmitting. In this paper, the author propose a new adaptive transmission scheduling to packet radio networks that computes the transmission assignments according to the changes in the topology. The node gathers information from its local neighborhood. In addition, this information is useful to reconstruct the slot assignments. The NATS consists of two stages. During the first stage, it obtained a minimal TDMA frame length and the corresponding transmission assignments. In the second stage, the NATS finds the maximum node transmissions. Results show that this method improves the guaranteed throughput and outperforms a 10% improvement over [Vhong and Huynh] .It is also shown that NATS outperforms TTR . View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System for Automated Aircraft Seat Floatation Device Inspection

    Page(s): 13 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    Airlines are governed by government and/or safety regulations that require each aircraft seat is properly equipped with a floatation device for use by the passenger in the unlikely event of a water landing. The current known aircraft inspection process to verify that each seat has the requisite floatation device is time consuming and labor intensive. The Boeing Company has defined and developed a radio frequency identification (RFID) based automated floatation device inspection system that leverages temporal and location awareness mechanisms to automate aircraft inspection process for floatation devices. The developed automated aircraft seat flotation device inspection system mitigates time consuming and labor intensive characteristics and thereby improves aircraft turn-around time and operational efficiencies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling of Interference Using Power Penalty Analysis and Frequency Assignment Problem Approach in Communication

    Page(s): 18 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (367 KB) |  | HTML iconHTML  

    As communication is making the whole world a global village, there seems to be tremendous pressure on the service providers in this field. The greatest demand is for Quality Of Service (QoS) wherein the most important role is played by Interference. There are numerous parameters leading to interference in both wired and wireless communication. In this paper an attempt is made to minimize interference in wired and wireless communication. In wired, an analysis of All Optical Network is carried out whereas in wireless networks, overall interference is reduced using fundamental approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable Evidence of Data Integrity from an Untrusted Storage Service

    Page(s): 24 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of business communications. In this paper we consider the problem of getting reliable evidence of the integrity and existence of some data from a storage service even if the data is not available for reference anymore and even if the partner may be untrustworthy or malicious. Several solutions are presented, among them the first cryptographically secure approach providing evidence of the integrity of remotely stored data, without owning or transferring the complete original data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environmental Monitoring Based on Emerging Wireless Technologies

    Page(s): 30 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (999 KB) |  | HTML iconHTML  

    Biological research in agriculture needs a lot of specialized electronic sensors in order to fulfill different goals, like as: climate monitoring, soil and fruit assessment, control of insects and diseases, chemical pollutants, identification and control of weeds, crop tracking, and so on. That research must be supported by consistent biological models able to simulate diverse environmental conditions, in order to predict the right human actions before risky biological damage could be irreversible. In this paper is described an experimental distributed network based on climatic and biological wireless sensors, for providing real measurements in order to validate different biological models used for viticulture applications. Firstly is introduced the experimental network for field automatic data acquisition, as a system based in a distributed process. Following, the design of the wireless network is explained in detail, with a previous discussion about the state-of-the-art, and some measurements for viticulture research are pointed out. Finally future developments are stated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-geocast Algorithms for Wireless Sparse or Dense Ad Hoc Sensor Networks

    Page(s): 35 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (163 KB) |  | HTML iconHTML  

    Multi-geocasting in wireless sensor network and ad hoc network is the delivery of packets from a source (or sink) to all the nodes located in several geographic areas. The objectives of a multi-geocasting protocol are guaranteed message delivery and low transmission cost. All the existing protocols guarantee delivery only in dense networks. In this paper, we present two multi-geocast protocols which guarantee delivery of the packets whatever is the density of the sensor network (dense or sparse). They are also suitable for networks with irregular distributions with gaps or obstacles. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effairness: Dealing with Time in Congestion Control Evaluation

    Page(s): 40 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (171 KB) |  | HTML iconHTML  

    Congestion control algorithms are traditionally evaluated in contrast to ideal capacity allocations that specify instantaneous efficient fair rates for application sessions but ignore time. While the latter is tenable for local networks and networks where all application sessions last long, instantaneous ideal allocations are inadequate standards for congestion control evaluation in dynamic wide-area networks. In this paper, we propose an alternative ideal of an effair allocation that explicitly accounts for unavoidable propagation delay. We develop an algorithm for computing the effair allocation and present a metric of effairness that quantifies how close the actual network services are to the effair allocation on the receiver, session, and network levels. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Corouting: An IP Hybrid Routing Approach

    Page(s): 46 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (248 KB) |  | HTML iconHTML  

    We propose a hybrid routing scheme that combines traditional shortest-path based OSPF mechanisms as well as a new form of explicit routing executed at the flow level. The scheme consists of finding explicit routes for real-time UDP flows, on network links that -at flow entry time- do not present more than 50% bandwidth utilisation. As for TCP packets, they will be routed on the unique least-cost path found through standard Link State algorithms. The approach improves the robustness and scalability of the network, thanks to its inherent traffic engineering mechanisms and offers better overall service for jitter and delay- sensitive real-time traffic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Optimizing Leaf Initiated Point to Multi Point Trees in MPLS

    Page(s): 53 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (365 KB) |  | HTML iconHTML  

    Resource ReSerVation Protocol-Traffic Engineering (RSVP-TE), and Label Distribution Protocol (LDP) may be used to set up Point to Multi Point (P2MP) trees in MPLS. RSVP-TE performs better in optimizing network resources, while LDP is simpler but has no guarantee on resource optimization. This paper presents a comparative study between RSVP-TE and LDP in regards of resource optimization and the resulting impact on the amount of memory consumed. It shows that the amount of memory needed in the case of RSVP-TE grows linearly as the size of the tree increases. In contrast, an approximate constant behavior is observed in the case of LDP, yielding an important scalability property. The paper then proposes two extension to LDP aiming to achieve better resource optimization. In both extension, a new leaf is provided a partial tree knowledge, by involving either all the nodes of the tree or only its leaves. The leaf joins the tree by connecting to the closest node among the known ones. Valuable comparisons with RSVP-TE are performed, and they represent an important background to decide when and how to use each protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An IMS Control and Access Layer PR-SCTP Based Network

    Page(s): 61 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (668 KB) |  | HTML iconHTML  

    The recent growth of peer-to-peer traffic and the popularity of streaming video is a cause for possible instability of the networks because most of these services run over UDP, without any mechanism for congestion control. Moreover, the adaptive features of peer-to-peer traffic may lead a misuse of the classical QoS rules legitimately applied to end-user applications. This paper proposes the usage of the partial reliability extension of the stream control transmission protocol (PR-SCTP) as the unique transport entity in an IP multimedia subsystem (IMS) network control and access layer, to mitigate situations of traffic congestion. The IMS is a 3GPP standardized approach that enables convergence of data, voice, video and mobile network technology over an IP-based network. Session initiation protocol (SIP) and session description protocol (SDP) are the groundwork to support the convergence proposed by IMS. PR-SCTP provides several features to improve the transport of SIP between the IMS entities and after introducing the motivation to this proposal, we discuss and compare the benefits and drawbacks of using PR-SCTP instead of TCP or UDP to transport SIP. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DiProNN: Distributed Programmable Network Node Architecture

    Page(s): 67 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (301 KB) |  | HTML iconHTML  

    The programmable network approach allows processing of passing user data in a network, which is highly suitable especially for multimedia streams processing. However, programming of complex stream processing applications for programmable nodes is not effortless since they usually do not provide sufficient flexibility (both programming flexibility and execution environment flexibility). In this paper we present the programmable network node architecture named DiProNN that is able to accept and run user-supplied programs and/or virtual machines and process them over passing data. All the DiProNN programs are described using our modular programming model based on the workflow principles that takes advantages of DiProNN virtualization and makes programming of complex streaming applications easier. As a possible application we show a sketch implementation of simple MCU (Multipoint Control Unit) used for large videoconferences that profits from DiProNN properties. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VPN Analysis and New Perspective for Securing Voice over VPN Networks

    Page(s): 73 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (434 KB) |  | HTML iconHTML  

    Security and privacy become mandatory requirements for VoIP communications that needs security services such as confidentiality, integrity, authentication, non-replay and non- repudiation. The available solutions are generic and do not respect voice specificities and constraints. Thus, QoS of the voice is affected by delay, jitter, and packet loss. New security solutions must take into account the real-time constraint of voice service and their mechanisms should address possible attacks and overhead associated with it. Nowadays, VPNs (Virtual Private Networks) is considered the strongest security solutions for communications over IP networks. Most VPN solutions are implemented to tunnel data traffic while the trend toward a converged data and voice network, however, places new demands on VPNs to support real time traffic. In this paper we compare the VPN security protocols presenting their advantage and drawbacks. Then we present our new solution to secure voice over IPSec VPNs while guaranteeing the performance and quality of services, without reducing the effective bandwidth. We use the AVISPA model to analyze the security vulnerabilities of exchange messages to initiate session and establish VPN. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Study of PANA Pre-authentication for Interdomain Handover

    Page(s): 79 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (859 KB) |  | HTML iconHTML  

    To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuous connectivity, one prerequisite is the incorporation of seamless handover. The make-before-break approach facilitates seamless handover by means of executing an authentication to a new domain simultaneously while maintaining connection to current domain. The connection is only terminated after the handover to the new domain is successfully completed. However, the duration of the authentication is critical for the handover process because if the mobile nodes move very fast the remaining amount of time of connection to the current domain can become very limited. Therefore, it is a vital issue for seamless mobility to study the authentication performance of a pre-authentication framework. In this paper we model an authentication infrastructure and consider a scenario in which a high number of nodes handover to a new administration domain. The simulation of the authentication process shows the relation between authentication performance and traffic intensity. Furthermore we identify some critical points and potential bottlenecks of this pre-authentication approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of Broadband Wireless Technologies and PMR Systems for Professional Communications

    Page(s): 84 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    The paper contributes to the evolution of Public Safety and Disaster Relief (PSDR) communications by specifying a solution for interoperability and integration among Professional Mobile Radio systems (TETRA and Simulcast), public systems (GSM/GPRS/UMTS), and broadband wireless technologies, such as WiMAX. A policy for PSDR services scheduling and fundamental guidelines for mapping the quality of service over heterogeneous networks are presented. Hence, the paper outlines the key issues to be debated by a regulatory authority. Operation of the devised PSDR mobile integration solution is tested to ensure complete connectivity among users adopting different communication standards, as well as to enable distributed services provisioning guaranteeing always best connection to bandwidth demanding applications provided by an IP-based core network. Finally, the employment of the envisaged integration platform is detailed in Mobile Ad-Hoc and Wireless Sensor Networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jitter-Buffer Management for VoIP over Wireless LAN in a Limited Resource Device

    Page(s): 90 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (282 KB) |  | HTML iconHTML  

    VoIP over WLAN is a promising technology as a powerful replacement for current local wireless telephony systems. Packet timing Jitter is a constant issue in QoS of IEEE802.11 networks and exploiting an optimum jitter handling algorithm is an essential part of any VoIP over WLAN (VoWiFi) devices especially for the low cost devices with limited resources. In this paper two common algorithms using buffer as a method for Jitter handling are analyzed with relation to different traffic patterns. The effect of different buffer sizes on the quality of voice will be assessed for these patterns. Various traffic patterns were generated using OPNET and Quality of output voice was evaluated based on ITU PESQ method. It was shown that an optimum voice quality can be attained using a circular buffer with a size of around twice that of a voice packet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Scheduling Techniques in Distributed Parallel Environments Using Mobile Agents

    Page(s): 96 - 101
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (435 KB) |  | HTML iconHTML  

    The proposed mobile agent collects the load index and performs the distributed scheduling considering the behavior of the different kinds of applications. The environments obtained were considered due to the application of parallel processing of using medical images as well as the comparison of their performance time to measure them. The objective of this paper is to offer alternatives of processes scheduling aiming at maximize the use of the machines. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test-Bed Evaluation of Ingress Queuing for Improved Packet Delivery

    Page(s): 102 - 108
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (182 KB) |  | HTML iconHTML  

    In addition to bit errors and packet collisions, packets in ad hoc networks are lost due to missing routes and unreachable next hop nodes. The latter is costly, since these packets consume scarce network resources as they are retransmitted up to transmission-threshold times before being discarded. In this paper we demonstrate, through experimental test beds and simulation, the advantage of ingress queuing. By comparing the experimental results with the simulation we illustrate the difference between actual behaviour and the behaviour of the system abstraction. The latter has value in itself, since simulation by far is the preferred methodology in ad hoc networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.