95,396 research outputs found

    Design and Implementation of a Measurement-Based Policy-Driven Resource Management Framework For Converged Networks

    Full text link
    This paper presents the design and implementation of a measurement-based QoS and resource management framework, CNQF (Converged Networks QoS Management Framework). CNQF is designed to provide unified, scalable QoS control and resource management through the use of a policy-based network management paradigm. It achieves this via distributed functional entities that are deployed to co-ordinate the resources of the transport network through centralized policy-driven decisions supported by measurement-based control architecture. We present the CNQF architecture, implementation of the prototype and validation of various inbuilt QoS control mechanisms using real traffic flows on a Linux-based experimental test bed.Comment: in Ictact Journal On Communication Technology: Special Issue On Next Generation Wireless Networks And Applications, June 2011, Volume 2, Issue 2, Issn: 2229-6948(Online

    Policy-based Danger Management in Artificial Immune System Inspired Secure Routing in Wireless Mesh Networks

    Full text link
    This paper introduces Policy based Management Information Base to manage danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management functions are defined and the paper focuses only on the security function. Proposed policy based management and typical operation of the architecture are also reported

    The Role of Licence-Exemption in Spectrum Reform

    Get PDF
    Spectrum reform initiatives in the US and Europe have identified a need to move away from the traditional command and control approach towards flexible and tradable licences and licence-exemption. Current regulatory initiatives are tending to focus on the flexible licensing route, and there is a risk that licence-exemption will be sidelined during the important formative years of this major policy transition. This must not happen; licence-exemption supports innovation and entrepreneurship and is an important second leg of a market-based spectrum management regime. A current case in point is the transition in UHF frequency bands from analogue to digital TV, where licence exempt use of resulting gaps in the spectrum could yield enormous benefits for citizens and consumers.spectrum policy, spectrum management, wireless services, deregulation, Telecommunications, regulation, Networks

    Technology and market conditions toward a new competitive landscape in the wireless access market

    Get PDF
    This article argues that the wireless telecommunication market is about to witness a shift in business models and market structure as a result of the deployment of new broadband access technologies, spectrum management techniques, policy-based network management, and the drive of new entrants to compete against the incumbents. The article discusses four agents of evolutionary changes: a range of broadband wireless access standards and technologies that are frontrunners in the industry’s efforts to embody the next generation of wireless networks; new provider-customer relationships facilitated through changes in the usual contract patterns that will allow consumers to enter short-term and spot contracts with the new wireless providers; an overview of the current debate on spectrum management; and an explanation of how autonomic communications and policybased management would support the new structure. Finally, the article asserts the necessity for the integration of the heterogeneous technologies that make up this emerging, hybrid wireless landscape, and describes the economic characteristics of a new competitive scenario.Postprint (published version

    A Study of Authentication Scheme for Wireless Access Network using APEA Framework

    Get PDF
    In case of wireless access networks significantly changes the way we live and work, bringing us closer anywhere at any time. Security, privacy, accountability, and efficiency issues are of most concern in such networks. because of need and importance, little research has been conducted on designing accountable and privacy-preserving authentication schemes for wireless access networks, and this motivates us to develop an authentication framework, namely APEA using Attribute Based Encryption, that defines new form of APEA while Existing version of APEA integrates a key management protocol, where key transfer mechanism is more complicated , time consuming and less secure In our proposed approach attribute based encryption does is that, it effectively binds the access-control policy to the data and the users(clients) instead of having a server mediating access to files. An effective approach to simultaneously achieve the four goals without involving any trusted third party. However, with the requirement of wireless area network security solution, this paper presents the various techniques on WAN authentication with certain constraints and analyzes their strengths and weaknesses

    Hidden Costs Of The Wireless Broadband Lifestyle: Comparing Consumer Protections In The United States, Canada, And The European Union

    Get PDF
    Spurred by relatively inexpensive and widely available retail equipment and increased residential Internet penetration, consumer demand for more wireless broadband options continues at a rapid rate. Now, with consumers increasingly looking for mobile Internet interconnectivity over greater distances and with greater flexibility, technology companies are pushing the next generation of wireless broadband technologies with the promise of freeing consumers from location-based Internet access. These newer technologies can provide robust video and audio capabilities, such as digital television, on-demand video, and VoIP on a variety of digital devices. Yet, the rise of wireless broadband networks and the roll-out of new technologies pose new public policy and regulatory challenges for spectrum management. If these issues are not addressed, rather than yielding ultimately beneficial private, public, and commercial uses of spectrum, the result could be detrimental frequency interference with negative impacts on equipment functionality, the integrity and reliability of networks, and the quality of service for spectrum-dependent commercial services

    Cognitive Wireless Sensor Networks: Intelligent Channel Assignment

    Get PDF
    One of the major problems in Wireless Sensor Networks (WSNs) is the traffic congestion caused by increasing number of devices sharing the limited spectrum of the ISM (Industrial, Scientific, and Medical radio) band. As a result, a new concept of Cognitive Wireless Sensor Networks (CWSNs) has been proposed in order to achieve reliable and efficient communication via spectrum awareness and smart adaption. Based on such concept, this paper proposes the intelligent channel assignment technique for channel management in CWSNs. The proposed method is based on the learning and prediction technique so called Policy Gradient together with our proposed virtual channel environment classification. Simulation model is used for the system performance evaluation. The simulation results show that our proposed intelligent channel assignment provides substantially higher performance in terms of system throughput and average packet end-to-end delay than the traditional IEEE 802.15.4 based system. It also outperforms the systems integrated with Episodic Reinforcement and GPOMDP learning technique

    Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

    Full text link
    In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.Comment: 16 pages, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap with arXiv:1111.1933 by other author
    • …
    corecore