95,396 research outputs found
Design and Implementation of a Measurement-Based Policy-Driven Resource Management Framework For Converged Networks
This paper presents the design and implementation of a measurement-based QoS
and resource management framework, CNQF (Converged Networks QoS Management
Framework). CNQF is designed to provide unified, scalable QoS control and
resource management through the use of a policy-based network management
paradigm. It achieves this via distributed functional entities that are
deployed to co-ordinate the resources of the transport network through
centralized policy-driven decisions supported by measurement-based control
architecture. We present the CNQF architecture, implementation of the prototype
and validation of various inbuilt QoS control mechanisms using real traffic
flows on a Linux-based experimental test bed.Comment: in Ictact Journal On Communication Technology: Special Issue On Next
Generation Wireless Networks And Applications, June 2011, Volume 2, Issue 2,
Issn: 2229-6948(Online
Policy-based Danger Management in Artificial Immune System Inspired Secure Routing in Wireless Mesh Networks
This paper introduces Policy based Management Information Base to manage danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management functions are defined and the paper focuses only on the security function. Proposed policy based management and typical operation of the architecture are also reported
The Role of Licence-Exemption in Spectrum Reform
Spectrum reform initiatives in the US and Europe have identified a need to move away from the traditional command and control approach towards flexible and tradable licences and licence-exemption. Current regulatory initiatives are tending to focus on the flexible licensing route, and there is a risk that licence-exemption will be sidelined during the important formative years of this major policy transition. This must not happen; licence-exemption supports innovation and entrepreneurship and is an important second leg of a market-based spectrum management regime. A current case in point is the transition in UHF frequency bands from analogue to digital TV, where licence exempt use of resulting gaps in the spectrum could yield enormous benefits for citizens and consumers.spectrum policy, spectrum management, wireless services, deregulation, Telecommunications, regulation, Networks
Technology and market conditions toward a new competitive landscape in the wireless access market
This article argues that the wireless telecommunication
market is about to witness a shift in
business models and market structure as a result
of the deployment of new broadband access
technologies, spectrum management techniques,
policy-based network management, and the drive
of new entrants to compete against the incumbents.
The article discusses four agents of evolutionary
changes: a range of broadband wireless
access standards and technologies that are frontrunners
in the industry’s efforts to embody the
next generation of wireless networks; new
provider-customer relationships facilitated
through changes in the usual contract patterns
that will allow consumers to enter short-term
and spot contracts with the new wireless providers;
an overview of the current debate on
spectrum management; and an explanation of
how autonomic communications and policybased
management would support the new structure.
Finally, the article asserts the necessity for
the integration of the heterogeneous technologies
that make up this emerging, hybrid wireless
landscape, and describes the economic characteristics
of a new competitive scenario.Postprint (published version
A Study of Authentication Scheme for Wireless Access Network using APEA Framework
In case of wireless access networks significantly changes the way we live and work, bringing us closer anywhere at any time. Security, privacy, accountability, and efficiency issues are of most concern in such networks. because of need and importance, little research has been conducted on designing accountable and privacy-preserving authentication schemes for wireless access networks, and this motivates us to develop an authentication framework, namely APEA using Attribute Based Encryption, that defines new form of APEA while Existing version of APEA integrates a key management protocol, where key transfer mechanism is more complicated , time consuming and less secure In our proposed approach attribute based encryption does is that, it effectively binds the access-control policy to the data and the users(clients) instead of having a server mediating access to files. An effective approach to simultaneously achieve the four goals without involving any trusted third party. However, with the requirement of wireless area network security solution, this paper presents the various techniques on WAN authentication with certain constraints and analyzes their strengths and weaknesses
Hidden Costs Of The Wireless Broadband Lifestyle: Comparing Consumer Protections In The United States, Canada, And The European Union
Spurred by relatively inexpensive and widely available retail equipment and increased residential Internet penetration, consumer demand for more wireless broadband options continues at a rapid rate. Now, with consumers increasingly looking for mobile Internet interconnectivity over greater distances and with greater flexibility, technology companies are pushing the next generation of wireless broadband technologies with the promise of freeing consumers from location-based Internet access. These newer technologies can provide robust video and audio capabilities, such as digital television, on-demand video, and VoIP on a variety of digital devices. Yet, the rise of wireless
broadband networks and the roll-out of new technologies pose new public policy and regulatory challenges for spectrum management. If these issues are not addressed, rather than yielding ultimately beneficial private, public, and commercial uses of spectrum, the result could be detrimental frequency interference with negative impacts on equipment functionality, the integrity and reliability of networks, and the quality of service for spectrum-dependent commercial services
Cognitive Wireless Sensor Networks: Intelligent Channel Assignment
One of the major problems in Wireless Sensor Networks (WSNs) is the traffic congestion caused by increasing number of devices sharing the limited spectrum of the ISM (Industrial, Scientific, and Medical radio) band. As a result, a new concept of Cognitive Wireless Sensor Networks (CWSNs) has been proposed in order to achieve reliable and efficient communication via spectrum awareness and smart adaption. Based on such concept, this paper proposes the intelligent channel assignment technique for channel management in CWSNs. The proposed method is based on the learning and prediction technique so called Policy Gradient together with our proposed virtual channel environment classification. Simulation model is used for the system performance evaluation. The simulation results show that our proposed intelligent channel assignment provides substantially higher performance in terms of system throughput and average packet end-to-end delay than the traditional IEEE 802.15.4 based system. It also outperforms the systems integrated with Episodic Reinforcement and GPOMDP learning technique
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
In recent years, wireless ad hoc sensor network becomes popular both in civil
and military jobs. However, security is one of the significant challenges for
sensor network because of their deployment in open and unprotected environment.
As cryptographic mechanism is not enough to protect sensor network from
external attacks, intrusion detection system needs to be introduced. Though
intrusion prevention mechanism is one of the major and efficient methods
against attacks, but there might be some attacks for which prevention method is
not known. Besides preventing the system from some known attacks, intrusion
detection system gather necessary information related to attack technique and
help in the development of intrusion prevention system. In addition to
reviewing the present attacks available in wireless sensor network this paper
examines the current efforts to intrusion detection system against wireless
sensor network. In this paper we propose a hierarchical architectural design
based intrusion detection system that fits the current demands and restrictions
of wireless ad hoc sensor network. In this proposed intrusion detection system
architecture we followed clustering mechanism to build a four level
hierarchical network which enhances network scalability to large geographical
area and use both anomaly and misuse detection techniques for intrusion
detection. We introduce policy based detection mechanism as well as intrusion
response together with GSM cell concept for intrusion detection architecture.Comment: 16 pages, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap
with arXiv:1111.1933 by other author
- …