The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The easy deployment of P2P self-organized systems has contributed to their wide diffusion and to the definition of a new communication paradigm. Mobile communities can now spontaneously emerge to enable users to become both consumer and service providers. However, the presence of selfish and malicious nodes can thwart the sustainability of these systems as nodes try to exploit services without contributing...
Mechanisms to extract the characteristics of network traffic play a significant role in the traffic monitoring, offering helpful information for network management and control. In this paper, a method based on random matrix theory (RMT) and principal components analysis (PCA) is proposed for monitoring and analyzing large scale traffic pattern of Internet. Besides the analysis of the largest eigenvalue...
With the technological changes on the horizon, there seems significant potential for availability of telecommunications access, and hence services. Many incumbent telecommunications operators are announcing a transition to so-called Next Generation Networks (NGN) to replace their existing networks. Such changes are expected to have significant implications in the way services are provided and the...
When GSM was introduced in the early 90's, it was considered an over specified system. Nowadays, it is obvious that the whole range of services is widely in use. In addition, performance is degrading due to the rapidly increasing number of mobile subscribers, numbering over 2.9 billion subscribers around the world. The performance of cellular networks is the most important issue concerning their operators...
In this research, we propose an architectural solution to implement the Intrusion Detection System (IDS) via snort in campus network environment. Intrusion Detection System(IDS) via snort application has become a discussion issue for this time being. The objective of this implementation is to measure and detect the malware on snort application over local area network (LAN). Virtual private network...
The wireless sensor network discussed in this article is one with Web interface based on radio frequency connection, information-driven star topology and energy-saved mode are used, the energy of each sensor node is reduced and secure management of each sensor node is improved.
APCO Project-25 wireless data link is a narrow band wireless link. This causes communication link to have very limited bandwidth which is between from 4 kbps up to 7.2 kbps. In such case we are in search of every opportunity to improve and well-utilize this low-bandwidth channel for data communications. In this paper we study two data communication modes of APCO Project-25 data communication structure...
The issue of fault location received extensive concern in the field of telecom network management. The data mining approaches is are introduced to extract clues from the telecom alarm data for fault location. Aiming at the key problems in telecom data mining, we have made a comprehensive analysis on the telecom network and its data as well as the fault propagation, some important characteristics are...
The telecommunications policy and industry development in China have attracted sizable interests. However, there is a lack of empirical studies to evaluate the effect of China's telecommunications reform and restructure. In line with most scholars opinions, we believe that telecommunications restructure in China began in 1994 and has become ldquovery dramatic and far-reachingrdquo since 1998. We treat...
We present the framework development of network management system approach. This research designs for network management system monitoring in Local Area Network (LAN) environment. The main objective of this study is to monitor and measure the server performance, thus to analyze whether the server is normal, optimal or overloaded. As a result, this framework of network management system can provide...
Cognitive radio (CR) technology is considered as an effective solution to enhance overall spectrum efficiency, especially primary radio network (PRN) typically having relatively low spectrum utilization. However, to realize CR concept, it is essential to provide enough incentives to PRN and extra profit to the service provider so that cognitive radio mobile stations (CR-MSs) may utilize PRN spectrum...
This paper addresses the design of joint multi-cell resource allocation and scheduling with coordination among neighboring base stations (BS). Considering Ns neighboring sectors, the solution that maximizes the sum-rate in the covered area is found for TDMA and TDMA/OFDMA access. The optimum solution exhibits low complexity as it presents the useful property that its computation admits a decomposition...
The standardization of the Internet multimedia subsystem (IMS) renewed the architecture of management of the advanced telecommunication services. Nevertheless the IMS also introduces new interrogations, in particular concerning the management of Quality of service (QoS) considering the services multi-media calling upon of technologies so much advanced (UMTS) that existing (POTS, GSM). In this context,...
In a wireless sensor network (WSN), when an adversary physically captures one or more sensor nodes, all the information stored on these nodes may be exposed completely. Consequently, the adversary can use the information to attack the remaining part of the network. In this paper, we investigate the effects of different node capture attack patterns on state-of- the-art key management schemes. We find...
In cognitive radio networks, the unlicensed users can utilize the unoccupied licensed spectrum opportunistically. In this paper, we propose a joint power and end-to-end rate control algorithm considering restricting the interference to licensed users. By duality theory, the optimal resource allocation solution is given for the unlicensed users while satisfying the interference temperature limits....
Recently, Numerous dynamic key management schemes have been proposed for WSNs , and it has long-lived networks, more sustained security and survivability, such as SHELL and LCOK. But most of these schemes are greatly depend on some central nodes (gateways), if these nodes were compromised, there will be great threat to the whole networks security and survivability. In this paper, we proposed a Location-aware...
This work addresses the problem of inter-cell interference (ICI) management in the context of single frequency broadband OFDMA-based networks. Five proposals, based on a combination of ICI coordination/avoidance techniques along with a set of heuristic adaptive power and subcarrier allocation algorithms, have been considered in order to achieve better interference performance and resource utilization...
This paper presents the architecture, design, implementation and samples of tests performed on a testbed for IEEE 802.16/WiMax access technology while used in a multi-domain environment IP networks. The final target was to implement a system capable to offer connectivity services, with different levels of end to end QoS guarantees, adaptable to different applications. Flexible solutions are proposed...
Presented in this paper a preliminary proposal of a security framework for delivering security properties to Trust and Reputation management systems in decentralized networks. When TR metrics are used in this framework, nodes can be held responsible for their actions and identity spoofing is prevented. By protecting trust reply messages and/or the interaction with trust holding agents, false reporting...
Opportunistic spectrum access presents a new approach to wireless spectrum utilization and management. In this paper, we propose a non-cooperative based OSA approach: learning-based approach to allow multiple secondary users to achieve maximal throughput in an unslotted opportunistic spectrum access (OSA) network. In this approach, collisions among secondary users are taken into consideration while...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.