The proceedings contain 173 papers. The topics discussed include: efficient and adjustable recipient anonymity in mobile ad hoc networks;fault-tolerant topology control for heterogeneous wireless sensornetworks;routi...
详细信息
ISBN:
(纸本)1424414555
The proceedings contain 173 papers. The topics discussed include: efficient and adjustable recipient anonymity in mobile ad hoc networks;fault-tolerant topology control for heterogeneous wireless sensornetworks;routing overhead as a function of node mobility: modeling framework and implications on proactive routing;Performance evaluation of a hybrid testbed for wireless mesh networks;impact of energy models on energy efficient sensor network routing;a reliability-oriented transmission service in wireless sensornetworks;network connectivity under probabilistic communication models in wireless sensornetworks;routing in mobile ad-hoc networks: the virtual distance vector protocol;open-ZB: an open-source implementation of the IEEE 802.15.4/ZigBee protocol stack on TinyOS;and optimizing the Internet gateway deployment in a wireless mesh network.
This paper describes a new vision for mobility management in nextgeneration all IP networks. We evaluate the vertical-to-horizontal handover in the proposed integration architecture for the third generation wireless ...
详细信息
ISBN:
(纸本)9781424406586
This paper describes a new vision for mobility management in nextgeneration all IP networks. We evaluate the vertical-to-horizontal handover in the proposed integration architecture for the third generation wireless communication (3G) from one side and WLAN 802.11 from the other side. In this architecture, the Inter-Domain Management IDM module introduced is modeled and analytically studied in order to evaluate the handover calls dropping probability and the call blocking probability in function of the access network bandwidth, number of users and the admission control strategy. In this scenario, if it is not possible to guide the handover to a different access network capable of providing the same QoS and context parameters, or in other words, if the vertical handover could not be performed, it will be guided horizontally. In this case, the user is guided to the same access technology, resulting in a vertical-to-horizontal handover. This handover management will decrease the handover dropping probability as well as the QoS degradation sine the Handover is "guided" to the next access network.
Cooperative wireless networks will facilitate a beneficial evolution of multimedia communications, setting out from the today's multitude of communication standards and radio interfaces both in the licensed and th...
详细信息
ISBN:
(纸本)9781424402632
Cooperative wireless networks will facilitate a beneficial evolution of multimedia communications, setting out from the today's multitude of communication standards and radio interfaces both in the licensed and the unlicensed domain. The deployment of cognitive wireless solutions, which will form the communication platforms, will be a key asset because we expect to see an increasingly flexible, ad-hoc utilization of the available spectrum in the unlicensed domain and a co-existence of communication standards in the licensed bands. In this communication, the authors will illustrate a platform based approach towards cognitive wireless communications. Three software defined radio concepts designed by the authors will be presented, namely the HAWK (Highly Adaptable Wireless Kit), the FALCON (Flexible Access Logic for communicationnetworks), and the MUSTANG (MUIti-STAndard single chip transceiver for the nextgeneration), finally, giving an outlook on their wireless optical communication device, termed ARGOS. These concepts form the basis of the authors' cognitive wireless termed PROMETHEUS.
A light-trail is a generalized lightpath that enables multiple nodes to statistically share an optical communication path (wavelength bus). A light-trail is different from a lightpath on account of its unique node arc...
详细信息
ISBN:
(纸本)9781424403523
A light-trail is a generalized lightpath that enables multiple nodes to statistically share an optical communication path (wavelength bus). A light-trail is different from a lightpath on account of its unique node architecture - that enables formation of unidirectional wavelength buses. A node in a light-trail supports signal flow characteristics of drop-and-continue as well as passive addition leading to formation of the bus. Apart from the node architecture, another differentiation between light-trails and lightpaths is in the use of out-of-band control channel (Optical Supervisory Channel - OSC) for dynamic communication. The combined effect of a unique node architecture and out-of-band control channel enables light-trails to provide capability of sub-wavelength grooming, dynamic provisioning and optical multicasting. These features offered by light-trails are critical for nextgeneration emerging applications such as VoIP, Video-on-demand (VoD), Triple-play and Pseudo-Wire Edge-to-Edge Emulation (PWE3). Current OSC based control channel requires engineering enhancement to provision dynamic and bandwidth efficient services over light-trails. We investigate into the control channel hierarchies in light-trail networks to provision these emerging services. Centralized, distributed, static and dynamic control mechanisms are proposed. Light-trail control for provisioning nextgeneration services is considered through theory and simulation.
The provisioning of wireless broadband services will be a key functionality of nextgeneration wireless networks. Hereby the intelligent caching of data at strategic positions within the network will improve its perfo...
详细信息
ISBN:
(纸本)9781424402656
The provisioning of wireless broadband services will be a key functionality of nextgeneration wireless networks. Hereby the intelligent caching of data at strategic positions within the network will improve its performance as well as consumer satisfaction. Furthermore future wireless communication systems will integrate several heterogeneous networks which form a combined overlay network [1]. For the integration of these different systems, which most likely all base on IP backbone connections, Mobile IP will be employed [2]. The combination of smart caching and Mobile IP is therefore an obvious solution. This paper presents the advantages and performance improvements of the new approach.
The IP Multimedia Subsystem (IMS) has emerged as nextgeneration value added communication services including mobile multimedia broadcasting, multimedia conferencing, push to talk and presence etc on top of all IP net...
详细信息
ISBN:
(纸本)9781424417193
The IP Multimedia Subsystem (IMS) has emerged as nextgeneration value added communication services including mobile multimedia broadcasting, multimedia conferencing, push to talk and presence etc on top of all IP networks. Offering multimedia streaming services across heterogeneous fixed and mobile networks have faced many challenges e.g. security, QoS, mobility and services management. In this article our objective is to identity vulnerability threats and attacks, and to study existing potential solutions for mobile multimedia broadcasting. The attacks possibilities are from multiple communication protocols suite i.e. Session Initiation Protocol (SIP) is used for session management, Diameter is used for authentication and authorization, Real-time Transport Protocol (RTP) & Real Time Streaming Protocol (RTSP) are used for media streaming on top of transport and IP infrastructure, therefore facing security challenges from three protocols domains. We will also present extended security by developing Intrusion Detection and Prevention (IDP) System to secure IMS based Mobile Multimedia Broadcasting communication from Denial-of-Service (DoS) attacks.
In this paper an analytical framework is proposed for the evaluation of the tradeoffs between location privacy and energy efficiency in wireless sensornetworks. We assume that random routing is utilized to improve pr...
详细信息
ISBN:
(纸本)97830540726050
In this paper an analytical framework is proposed for the evaluation of the tradeoffs between location privacy and energy efficiency in wireless sensornetworks. We assume that random routing is utilized to improve privacy. However, this involves an increase in the average path length and thus an increase in energy consumption. The privacy loss is measured using information theory concepts;indeed, it is calculated as the difference between the uncertainties on the target location before and after the attack. To evaluate both privacy loss and average energy consumption the behavior of the routing protocol is modeled through a Markov chain in which states represent the nodes traversed by a packet in its way to the sink. The analytical framework can be used by designers to evaluate the most appropriate setting of the random routing parameters depending on the privacy and/or energy efficiency requirements.
This paper studies LEACH protocol, and puts forward energy-LEACH and multihop-LEACH protocols. Energy-LEACH protocol improves the choice method of the cluster head, makes some nodes which have more residual energy as ...
详细信息
Operator drivers for extending the reach of GPON and futureproofing GPON deployments by reserving wavelengths for future use will be discussed. nextgeneration PON options will be reviewed as will economic aspects.
ISBN:
(纸本)9783800730421
Operator drivers for extending the reach of GPON and futureproofing GPON deployments by reserving wavelengths for future use will be discussed. nextgeneration PON options will be reviewed as will economic aspects.
Wireless sensornetworks (WSNs) consists of plenty nodes which are low cost, low power consuming, small volume and short-transmitting. As sensor nodes are deployed in sensing field, they can help people to monitor and...
详细信息
ISBN:
(纸本)0769530486
Wireless sensornetworks (WSNs) consists of plenty nodes which are low cost, low power consuming, small volume and short-transmitting. As sensor nodes are deployed in sensing field, they can help people to monitor and aggregate data. Researchers also try to find more efficient ways of utilizing limited energy of sensor node in order to give longer life time of WSNs. Therefore, how to reduce node's energy that is consumed in transmitting data has became a very important issue. From many kinds of paper, multi-hop routing protocol is well known for power saving in data gathering. Recently researches uses such types of the cluster-based (e.g., LEACH), the chain-based (e.g., PEGASIS) and the tree-based (e.g., TREEPSI) to establish their energy-efficient routing protocol. In this paper, we propose tree-clustered data gathering protocol (also called TCDGP) to improve the LEACH and TREEPSI. The novel proposed protocol can preserve both advantages and improve the power consumption further. Finally, simulation results show that our proposal has better performance than before.
暂无评论