Vol. 63, n° 3-4, March-April 2008
Content available on Springerlink
Guest editors
José Neuman de Souza, Federal University of Ceara, Brazil
Alan Marshall, Queen’s University of Belfast, Northern Ireland
James Won-Ki Hong, Pohang University of Science and Technology, South Korea
Foreword
J. Neuman, A. Marshall, J. Won-Ki Hong
Sensor-based architecture for QoS provisioning and fast handoff management inWLANs
Sonia Waharte · Jin Xiao · Raouf Boutaba
David R. Cheriton School of Computer Science, University of Waterloo, 200, University Avenue West, Waterloo, Ontario, Canada
Abstract As wireless local area networks gain popularity from network access providers and customers, supporting multimedia applications becomes a crucial yet unresolved challenge. The need to maintain qualityof- service in the presence of bandwidth limitations, increasing traffic volume and user mobility entails radical rethinking in resource management design in WLANs. The unique capabilities of wireless sensor networks constitute a promising research direction to tackle these issues. In this paper, we present a new sensor-based resource management architecture for enhanced QoS provisioning and handoff management in WLANs. Through theoretical analysis and simulations, we show that the framework can maximize bandwidth utilization while satisfying applications’ QoS requirements and significantly reduce handoff latency.
Keywords Wireless mesh networks · Quality-of-service
A service-oriented admission control strategy for class-based IP networks
Solange Rito Lima · Paulo Carvalho · Vasco Freitas
Computer Communications and Networks Group, Department of Informatics, University of Minho, 4710-057 Braga, Portugal
Abstract The clear trend toward the integration of current and emerging applications and services in the Internet launches new demands on service deployment and management. Distributed service-oriented traffic control mechanisms, operating with minimum impact on network performance, assume a crucial role as regards controlling services quality and network resources transparently and efficiently. In this paper, we describe and specify a lightweight distributed admission control (AC) model based on per-class monitoring feedback for ensuring the quality of distinct service levels inmulticlass and multidomain environments. The model design, covering explicit and implicit AC, exhibits relevant properties that allow managing quality of service (QoS) and service-level specifications (SLSs) in multiservice IP networks in a flexible and scalable manner. These properties, stemming from the way service-dependent AC and on-line service performance monitoring are proposed and articulated in the model’s architecture and operation, allow a self-adaptive service and resource management, while abstracting from network core complexity and heterogeneity. A proof of concept is provided to illustrate the AC criteria ability in satisfying multiple service class commitments efficiently. The obtained results show that the self-adaptive
Keywords Internet · Admission control model · Multiservice IP networks · Quality of service · Admission control
Integrated service creation environment for open network services
Sang Ki Kim – Young Mee Shin – Cho Rong Yu – Seung Hwa Chung – Byung Sun Lee
Electronics and Telecommunications Research Institute, 161 Gajeong-Dong, Yuseong-Gu, Daejeon, South Korea
Abstract The service creation scheme is changing with the advent of open network service architecture for nextgeneration network. New requirements should be considered for IT domain developers to create telecom and Internet combined services more easily. This paper describes an integrated service creation environment (SCE) to reflect the trend of network evolution toward an open network environment. The SCE provides multiple service programming tools to support various users’ background, a mash-up toolkit for IT domain, a simulation-based validation tool, a run-time adaptation tool, and a personalized service provisioning environment. Several example services were implemented to verify the features of an integrated SCE. Our approach is very promising because it supports various requirements and background of service developers on the full service creation process. Furthermore, it provides a means for personalized service creation driven by end-user, which is a new trend of future network.
Keywords SCE . Open API . IDE . Open service network
Towards semantic web-based management of security services
Félix J. García Clemente1 – Gregorio Martínez Pérez2 – Andrés Muñoz Ortega2 – Juan A. Botia2 – Antonio F. Gómez Skarmeta2
1 Departamento de Ingeniería y Tecnología de Computadores, Facultad de Informática, Universidad de Murcia, Campus de Espinardo, s/n, 30.071, Murcia, Spain
2 Departamento de Ingeniería de la Información y las Comunicaciones, Facultad de Informática, Universidad de Murcia, Campus de Espinardo, s/n, 30.071, Murcia, Spain
Abstract Policy-based management of distributed system has become a commonly accepted approach for such systems. However, there are a number of open technical issues that might put large-scale deployment of policybased management techniques at risk. They include automated policy translation (i.e., refinement from abstract business goals to final configurations); development of integrated policy architectures for network, service and application management, and dynamic service creation; and methods for policy conflict detection and resolution. Regarding this last issue, there exist some relevant efforts in the security area, but they are still in the design phase and it is not clear how flexible and powerful they will become when they deal with different kinds of securityrelated policies and scenarios. This article provides the main ideas behind the semantically enriched specification of security policies and describes an automated process for doing conflict detection on these policies.
Keywords Security management . Semantic-aware policy languages . Policy conflict analysis . SemanticWeb
Design and implementation of Web Services-based NGOSS technology-specific architecture
Mi-Jung Choi1 – Hong-Taek Ju1 – James W. Hong2 – Dong-Sik Yun3
1 Dept. of Computer Science and Engineering, POSTECH, Pohang, South Korea 790-784
2 Dept. of Computer Science, Keimyoung University, 1000 Sindang-Dong, Dalseo-Gu, Daegu, South Korea 704-701
3 KT network technology laboratory, 463-1, jeonmin-dong, Yuseong-gu, Daejeon, South Korea
Abstract To cope with frequent changes and functional additions of operation and support systems (OSSs), a guideline of OSS’s architecture and development methods is needed. TeleManagement Forum has provided Next Generation Operations Systems and Software (NGOSS) technologyneutral architecture (TNA), which describes major concepts and architectural details of the NGOSS architecture in a technologically neutral manner. The TNA can be mapped onto technology-specific architectures (TSAs) using specific technologies such as Extensible Markup Language, Java, and Common Object Request Broker Architecture. Web Service, a distributed and service-oriented computing technology, can be also applied to NGOSS TSA. In this paper, we provide a design and implementation of Web Services-based TSA in accordance with the architectural principles of TNA and the performance evaluation of our proposed system. Our work can be used as a guideline for anyone planning to develop a Web Services-based NGOSS TSA.
Keywords NGOSS . TNA . TSA . CCV. Framework services . Contract . Web Services
A novel IPv6 traceback architecture using COPS protocol
Syed Obaid Amin – Muhammad Shoaib Siddiqui – Choong Seon Hong
Department of Computer Engineering, School of Electronics and Information, Kyung Hee University, 1 Seocheon, Giheung, Yongin, Gyeonggi 449-701, South Korea
Abstract In any Distributed Denial of Service (DDoS) attack, invaders may use incorrect or spoofed Internet Protocol (IP) addresses in the attacking packets and thus disguise the actual origin of the attacks. This is primarily due to the stateless nature of the Internet. IP traceback algorithms provide mechanisms for identifying the true source of an IP datagram on the Internet ensuring at least the accountability of cyber attacks. While many IP traceback techniques have been proposed, most of the previous studies focus and offer solutions for DDoS attacks done on Internet Protocol version 4 (IPv4) environment. IPv4 and IPv6 networks differ greatly from each other, which urge the need of traceback techniques specifically tailored for IPv6 networks. In this paper, we propose a novel traceback architecture for IPv6 networks using Common Open-Policy Service and a novel packet-marking scheme. We also provide complete underlying protocol details required for traceback support in IPv6 networks. The proposed architecture is on demand and only single packet is required to traceback the attack.
Keywords DDoS . Traceback . IPv6 . Network security . Network management
Terrestrial communication experiments over various regions of Indian subcontinent and tuning of Hata’s model
M. V. S. N. Prasad1 – K. Ratnamala1 – M. Chaitanya2 – P. K. Dalela3
1 Radio & Atmospheric Sciences Division, National Physical Laboratory (NPL), New Delhi 110012, India
2 Department of computer science and electrical engineering, 546 Flarsheim Hall, University of Missouri-Kansas City, 5100 Rockhill Road, Kansas City, MO 64110, USA
3 C-DOT, Mandigaon road, opp. New Manglapuri, Chatterpur, Mehrauli, New Delhi 110030, India
Abstract The development of various radio planning tools for the design of fixed and mobile communication systems requires radio channel measurements, comparison with various models, and the tuning of various parameters involved in the model. Based on the various land- and rail-based VHF/ UHF measurements over northern, southern, western, and eastern parts of Indian subcontinent, the parameters of Okumura-Hata model are tuned, and modified parameters for the above regions have been deduced. These can be utilized for the design and development of future broadcast systems, mobile communication systems in this region of the world.
Keywords Path loss . Measurements . Model tuning . Hata’s method