233 research outputs found
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions
Network steganography conceals the transfer of sensitive information within
unobtrusive data in computer networks. So-called micro protocols are
communication protocols placed within the payload of a network steganographic
transfer. They enrich this transfer with features such as reliability, dynamic
overlay routing, or performance optimization --- just to mention a few. We
present different design approaches for the embedding of hidden channels with
micro protocols in digitized audio signals under consideration of different
requirements. On the basis of experimental results, our design approaches are
compared, and introduced into a protocol engineering approach for micro
protocols.Comment: 20 pages, 7 figures, 4 table
Quality of service technologies for multimedia applications in next generation networks
Next Generation Networks are constantly evolving towards solutions that allow the operator to provide advanced multimedia applications with QoS guarantees in heterogeneous, multi-domain and multi-services networks. Other than the unquestionable advantages inherent the ability to simultaneously handle traffic flows at different QoS levels, these architectures require management systems to efficiently perform quality guarantees and network resource utilization. These issues have been addressed in this thesis.
DiffServ-aware Traffic Engineering (DS-TE) has been considered as reference architecture for the deployment of the quality management systems. It represents the most advanced technology to accomplish either network scalability and service granularity goals. On the basis of DS-TE features, a methodology for traffic and network resource management has been defined. It provides some rules for QoS service characterization and allows to implement Traffic Engineering policies with a class-based approach. A set of basic parameters for quality evaluation has been defined, that are the Key Performance Indicators; some mathematical model to derive the statistical nature of traffic have been analyzed and an algorithm to improve the fulfillment of quality of service targets and to optimize network resource utilization. It is aimed at reducing the complexity inherent the setting of some of the key parameters in the NGN architectures. Multidomain scenarios with technologies different from DS-TE have been also evaluated, defining some methodologies for network interoperability. Simulations with Opnet Modeler confirmed the efficacy of the proposed system in computing network configurations with QoS targets.
With regard to QoS performance at the application level, video streaming applications in wireless domains have been particularly addressed. A rate control algorithm to adjust the rate on a per-window basis has been defined, making use of a short-term prediction of the network delay to keep the probability of playback buffer starvation lower than a desired threshold during each window.
Finally, a framework for mutual authentication in web applications has been proposed and evaluated. It integrates an IBA password technique with a challenge-response scheme based on a shared secret key for image scrambling. The wireless environment is mainly addressed by the proposed system, which tries to overcome the severe constraints on security, data transmission capability and user friendliness imposed by such environment
Recommended from our members
Traffic engineering multi-layer optimization for wireless mesh network transmission a campus network routing protocol transmission performance inhancement
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel UniversityThe wireless mesh network is a potential network for the future due to its excellent inherent characteristic for dynamic self-healing, self-configuration and self-organization. It also has the advantage of easy interoperability networking and the ability to form multi-linked ad-hoc networks. It has a decentralized topology, is cheap and highly scalable. Furthermore, its ease in deployment and easy maintenance are other inherent networking qualities. These aforementioned qualities of the wireless mesh network bring advantages to transmission capability of heterogeneous networks. However, transmissions in wireless mesh network create comparative performance based challenges such as congestion, load-balancing, scalability over increasing networks and coverage capacity. Consequently, these challenges and problems in the routing and switching of packets in the wireless mesh network routing protocols led to a proposal on the resolution of these failures with a combination algorithm and a management based security for the network and its transmitted packets. There are equally contentious services like reliability of the network and quality of service for real-time multimedia traffic flows with other challenges such as path computation and selection in the wireless mesh network.
This thesis is therefore a cumulative proposal to the resolution of the outlined challenges and open research areas posed by using wireless mesh network routing protocol. It advances the resolution of these challenges in the mesh environment using a hybrid optimization – traffic engineering, to increase the effectiveness and the reliability of the network. It also proffers a cumulative resolution of the diverse contributions on wireless mesh network routing protocol and transmission. Adaptation and optimization are carried out on the wireless mesh network designed network using traffic engineering mechanism and technique. The research examines the patterns of mesh packet transmission and evaluates the challenges and failures in the mesh network packet transmission. It develops a solution based algorithm for resolutions and proposes the traffic engineering based solution.. These resultant performances and analysis are usually tested and compared over wireless mesh IEEE802.11n or other older proposed documented solution.
This thesis used a carefully designed campus mesh network to show a comparative evaluation of an optimal performance of the mesh nodes and routers over a normal IEE802.11n based wireless domain network to show differentiation by optimization using the created algorithms. Furthermore, the indexes of performance being the metric are used to measure the utility and the reliability, including capacity and throughput at the destination during traffic engineered transmission. In addition, the security of these transmitted data and packets are optimized under a traffic engineered technique. Finally, this thesis offers an understanding to the security contribution using traffic engineering resolution to create a management algorithm for processing and computation of the wireless mesh networks security needs. The results of this thesis confirmed, completed and extended the existing predictions with real measurement
Recommended from our members
Integration of unidirectional technologies into wireless back-haul architecture
This thesis was submitted for the degree of Docter of Philosophy and awarded by Brunel University.Back-haul infrastructures of today's wireless operators must support the triple-play services demanded by the market or regulatory bodies. To cope with increasing capacity demand, the EU FP7 project CARMEN has developed a cost-effective heterogeneous
multi-radio wireless back-haul architecture, which may also leverage the native multicast
capabilities of broadcast technologies such as DVB-T to off-load high-bandwidth broadcast
content delivery. However, the integration of such unidirectional technologies into a packet-switched architecture requires careful considerations. The contribution of this thesis is the investigation, design and evaluation of protocols and mechanisms facilitating the integration of such unidirectional technologies into the wireless
back-haul architecture so that they can be configured and utilized by the spectrum and
capacity optimization modules. This integration mainly concerns the control plane and, in particular, the aspects related to resource and capability descriptions, neighborhood, link and Multi Protocol Label Switching (MPLS) Label-Switched Path (LSP) monitoring, unicast and multicast LSP signalling as well as topology forming and maintenance. During the course of this study we have analyzed the problem space, proposed solutions to the resulting research questions and evaluated our approach. Our results show that the now Unidirectional Technology (UDT)-aware architecture can readily consider
Unidirectional Technologies (UDTs) to distribute, for example, broadcast content
Proceedings of the Second International Mobile Satellite Conference (IMSC 1990)
Presented here are the proceedings of the Second International Mobile Satellite Conference (IMSC), held June 17-20, 1990 in Ottawa, Canada. Topics covered include future mobile satellite communications concepts, aeronautical applications, modulation and coding, propagation and experimental systems, mobile terminal equipment, network architecture and control, regulatory and policy considerations, vehicle antennas, and speech compression
Secure mobile radio communication over narrowband RF channel.
by Wong Chun Kau, Jolly.Thesis (M.Phil.)--Chinese University of Hong Kong, 1992.Includes bibliographical references (leaves 84-88).ABSTRACT --- p.1ACKNOWLEDGEMENT --- p.3Chapter 1. --- INTRODUCTION --- p.7Chapter 1.1 --- Land Mobile Radio (LMR) CommunicationsChapter 1.2 --- Paramilitary Communications SecurityChapter 1.3 --- Voice Scrambling MethodsChapter 1.4 --- Digital Voice EncryptionChapter 1.5 --- Digital Secure LMRChapter 2. --- DESIGN GOALS --- p.20Chapter 2.1 --- System Concept and ConfigurationChapter 2.2 --- Operational RequirementsChapter 2.2.1 --- Operating conditionsChapter 2.2.2 --- Intelligibility and speech qualityChapter 2.2.3 --- Field coverage and transmission delayChapter 2.2.4 --- Reliability and maintenanceChapter 2.3 --- Functional RequirementsChapter 2.3.1 --- Major system featuresChapter 2.3.2 --- Cryptographic featuresChapter 2.3.3 --- Phone patch facilityChapter 2.3.4 --- Mobile data capabilityChapter 2.4 --- Bandwidth RequirementsChapter 2.5 --- Bit Error Rate RequirementsChapter 3. --- VOICE CODERS --- p.38Chapter 3.1 --- Digital Speech Coding MethodsChapter 3.1.1 --- Waveform codingChapter 3.1.2 --- Linear predictive codingChapter 3.1.3 --- Sub-band codingChapter 3.1.4 --- VocodersChapter 3.2 --- Performance EvaluationChapter 4. --- CRYPTOGRAPHIC CONCERNS --- p.52Chapter 4.1 --- Basic Concepts and CryptoanalysisChapter 4.2 --- Digital Encryption TechniquesChapter 4.3 --- Crypto SynchronizationChapter 4.3.1 --- Auto synchronizationChapter 4.3.2 --- Initial synchronizationChapter 4.3.3 --- Continuous synchronizationChapter 4.3.4 --- Hybrid synchronizationChapter 5. --- DIGITAL MODULATION --- p.63Chapter 5.1 --- Narrowband Channel RequirementsChapter 5.2 --- Narrowband Digital FMChapter 5.3 --- Performance EvaluationChapter 6. --- SYSTEM IMPLEMENTATION --- p.71Chapter 6.1 --- Potential EMC ProblemsChapter 6.2 --- Frequency PlanningChapter 6.3 --- Key ManagementChapter 6.4 --- Potential Electromagnetic Compatibility (EMC) ProblemsChapter 7. --- CONCLUSION --- p.80LIST OF ILLUSTRATIONS --- p.81REFERENCES --- p.82APPENDICES --- p.89Chapter I. --- Path Propagation Loss(L) Vs Distance (d)Chapter II. --- Speech Quality Assessment Tests performedby Special Duties Unit (SDU
An investigation into glottal waveform based speech coding
Coding of voiced speech by extraction of the glottal waveform has shown promise in improving the efficiency of speech coding systems. This thesis describes an investigation into the performance of such a system.
The effect of reverberation on the radiation impedance at the lips is shown to be negligible under normal conditions. Also, the accuracy of the Image Method for adding artificial reverberation to anechoic speech recordings is established.
A new algorithm, Pre-emphasised Maximum Likelihood Epoch Detection (PMLED), for Glottal Closure Instant detection is proposed. The algorithm is tested on natural speech and is shown to be both accurate and robust.
Two techniques for giottai waveform estimation, Closed Phase Inverse Filtering (CPIF) and Iterative Adaptive Inverse Filtering (IAIF), are compared. In tandem with an LF model fitting procedure, both techniques display a high degree of accuracy However, IAIF is found to be slightly more robust.
Based on these results, a Glottal Excited Linear Predictive (GELP) coding system for voiced speech is proposed and tested. Using a differential LF parameter quantisation scheme, the system achieves speech quality similar to that of U S Federal Standard 1016 CELP at a lower mean bit rate while incurring no extra delay
- …