Secure SIP-based Mobility Management Scheme for Cost-Optimized NEMO Environments

Size: px
Start display at page:

Download "Secure SIP-based Mobility Management Scheme for Cost-Optimized NEMO Environments"

Transcription

1 Secure SIP-based Moblty Management Scheme for Cost-Optmzed NEMO Envronments Chulhee Cho 1 Jae-Young Cho 1 Jun-Dong Cho 2 and Jongpl Jeong 2* 1 College of Informaton and Communcaton Engneerng Sungkyunkwan Unversty Suwon Korea 2 Department of Human ICT Convergence ( * Correspondng Author) Sungkyunkwan Unversty Suwon Korea [email protected] {jaeychojdchojpjeong}@skku.edu ABSTRACT The moble Vrtual Prvate Network (MVPN) of the Internet Engneerng Task Force (IETF) s not desgned to support NEtwork MOblty (NEMO) and s not sutable for real-tme applcatons. Therefore archtecture and protocols to support VPN n NEMO are needed. Therefore n ths paper we propose a costeectve and secure moblty management scheme (SeSIP) that s based on sesson ntaton protocol (SIP) and desgned for real-tme applcatons wth VPN. Our scheme to support MVPN n NEMO enables the sesson to be well mantaned durng movement of the entre network. Further n order to reduce the authentcaton delay tme n hando operatons the sgnalng tme whch occurs to mantan the sesson s shortened through our proposed hando scheme whch adopts authentcaton usng HMAC-based one-tme password (HOTP). Our performance analyss results show our proposed scheme provdes mprovement n average hando performance tme relatve to exstng schemes. KEYWORDS NEMO MVPN SIP HOTP Moblty Management. 1 INTRODUCTION As the coverage area of wreless LAN (WLAN) expands the demand from users s growng for access to the Internet anytme and anywhere. To satsfy ths requrement technologes that enable access to the Internet on trans busses shps and other modes of transportatons have come nto the lmelght. One such technology s NEMO an IP network moblty technology [1-3]. The acronyms used n ths paper s lsted n Table 1. NEMO enables Internet connecton servce to be provded from the moble router (MR) wth all the nodes nsde the network not recognzng the moblty a standardzaton that s makng progress n IETF based on IPv6. NEMO provdes moblty servce through drect lnks to the Internet network wthout passng through other networks. Thus t can be appled to telematcs Personal Area Networks (PAN) Ad-hoc networks etc. as well as provdng varous means of moblty. The IETF NEMO workng group has completed several RFCs to enable a network to move from one locaton to another locaton whle stll mantanng ts local nodes ongong sessons. For example a NEMO VPN can be used n publc safety where wreless devces n a polce patrol car can access to the crmnal databases drver lcense and vehcle regstraton databases or other servces n the dspatch center as the car travels between derent subnets. Smlar type of servces can also be used n ambulance or moble medcal car where varous wreless devces or sensors are deployed nsde the car. Securty has recently emerged as an mportant ssue for the Internet and vrtual prvate network (VPN) was developed to ensure stablty n user communcatons between the Internet and the ntranet. VPN servce n NEMO has wde-rangng applcatons provdng stable access to the ntranet for moble networks. For example NEMO VPN enables access to the crmnal drver s lcense and car regstraton databases from a polce patrol car va the moble devce thereby helpng to ncrease publc safety. However a method for provdng VPN servce has yet to be dentfed n the NEMO workng group of IETF. ISBN: SDIWC 24

2 Although IETF proposed a VPN archtecture that supports moblty ths soluton dd not consder moble equpment groups and s only applcable for a sngle node and furthermore t s based on MIP whch s not suted for real-tme applcatons. MVPN of IETF uses one IPSec [4] tunnels and two MIP tunnels. These three tunnels are major contrbutors to overhead durng the real-tme packet transfer. Thus a new archtecture and protocol are requred to support the MVPN n safe NEMO. In addton the complexty of the authentcaton procedure and multple sgnalng messages that may occur n varous nodes due to the movement of the moble equpment group are also major contrbutors to overhead. Ths paper proposes a Cost-Eectve and Secure Moblty Management Scheme (SeSIP) based on the SIP (Sesson Intaton Protocol) whch s sutable for real-tme applcaton on MVPN and whch shortens the sgnalng tme. Ths desgn mantans the sesson contnuously as the overall network moves. It ntegrates SIP-based MVPN and NEMO to provde ecent group moblty for hgh securty and real-tme servces. Addtonally all SIP clents can drectly communcate wth each other bypassng the moble agent such as the Home Agent (HA) n MIP. Thus the path s optmzed. Ths s useful for real-tme applcatons such as IP-based voce communcatons (VoIP) and vdeo streamng and t does not requre an IPSec tunnel or MIP tunnel. Hence a sngle NEMO VPN gateway can support an entre moble network upon the address request of a moble network that has changed ts connecton locaton address resultng n consderable reducton of sgnalng overhead. Moreover ths approach reduces the sgnalng numbers snce all CNs connecton addresses are combned n a URL lst and ntegrated n a sngle INVITE message for transfer. Further ths desgn adopts an authentcaton method based on HMACbased One Tme Password (HOTP) [5] to shorten the authentcaton tme a sgnfcant element of delay durng hand-o thereby mprovng the ongong sgnalng tme to mantan the sesson. Moreover ths approach ntegrates the generaton sgnals of multple nodes nsde the moble network to reduce sgnalng tme. Table 1. Parameters for Hando Sgnallng Cost. Acronym Descrpton ALG AVP CN CoA HA HMAC HOTP IKE -HA -MIP MAA MAR MIDCOM MIKEY MIP MN MR NEMO OTP RTCP RTP SA SDP SIP SIP-NVG SRTP TEK TGK UAA UAR VPN VPN-TIA X-HA X-MIP Applcaton Level Gateway Attrbute Value Par Correspondent Node Care of Address Home Agent Hash-based Message Authentcaton Code HMAC based One Tme Password Internet Key Exchange Internal HA Internal MIP Multmeda-Auth-Answer Multmeda-Auth-Request Mddlebox Communcaton Multmeda Internet Keyng Moble IP Moble Node Moble Router Network Moblty One Tme Passwords RTP Control Protocol Real-tme Transport Protocol Securty Assocaton Sesson Descrpton Protocol Sesson Intaton Protocol SIP NEMO VPN Gateway Secure Real-tme Transport Protocol Trac Encrypton Key TEK Generaton Key User-Authorzaton-Answer User-Authorzaton-Request Vrtual Prvate Network VPN Tunnel Inner Address external HA external MIP Ths paper conssts of the followng sectons: Secton 2 examnes the problems of archtecture for MVPN proposed n the exstng IETF and t looks nto the need for a SIP-based MVPN. Secton 3 descrbes the proposed SIP-based moblty management scheme whch s cost- ISBN: SDIWC 25

3 eectve and secure. Secton 4 dscusses the analytcal model to evaluate the functonng of the proposed scheme. Secton 5 descrbes the numercal results for the analyss presented n Secton 4. Fnally conclusons are drawn n Secton 6. 2 RELATED WORK IETF has prevously defned the archtecture and protocol for MVPN [6]; t s shown n Fg. 1. Here the nternal HA (-HA) and external HA (x-ha) are present n the ntranet and Internet and the two HAs. A new care-of address (CoA) s frst obtaned from the dynamc host confguraton protocol (DHCP) server or foregn agent (FA) when the MN moves out of the ntranet. Ths CoA s regstered n x-ha. Then MN creates a VPN gateway and IPSec tunnel usng ts external home address (x-hoa). An IPSec tunnel s created by usng nternet key exchange (IKE) [7]. Fg. 1 shows the three tunnels (x-mip IPSec and -MIP). x-fa b AP Subnet DHCP Internet x-ha VPN Gateway & AAAF DMZ Intranet -HA AAAH Subnet b AP DHCP/-FA MN transfer delay for host and sesson moblty [1213]. However f SIP s appled to NEMO t may ncrease the hando sgnalng cost when many re-invite messages are transferred among the sessons n progress. HTTP dgest s the basc user authentcaton realzed n SIP. Ths authentcaton uses a secret key and s based on the challenge-response paradgm. Most protocols n Internet applcatons use ths mechansm for clent authentcaton before provdng servces; however SIP authentcaton usng HTTP dgest ncreases the sgnalng exchange n the protocol desgn requrng two handshakes to occur. To smplfy the authentcaton procedure we can nstead adopt HOTP-based authentcaton shortenng processng tme and so reducng sgnalng cost. Therefore n ths paper we consder these methods for supportng the MVPN n NEMO and for shortenng authentcaton tme and sgnalng tme n moble networks sutable for real-tme applcatons. MN Moble Gateway DHCP X-HA AAAF AAAH Ipsec-VPN -HA CN MN gets a new CoA Reg-Req & MN-AAA (x-mip) Reg-Reply (x-mip) AMR HAR HAA AMA AMR HAR HAA AMA Regster to x-ha (CoA mode) b AP Subnet MN x-mip (x-ha to MN Coa) 1. Regster to x-ha by usng CoA 2. Establsh Ipsec tunnel wth VPN by usng x-hoa 3. Regster to -HoA by usng VPN-TIA IPsec -MIP (VPN GW to x-hoa) (-HA to VPN-TIA) Three Tunnels Orgnal Packet Subnet b AP HDR SA HDR KE N HDR* KE Id HASH_I Reg-Req(-MIP) HDR SA HDR KE Nr HDR* KE Id HASH_R Establsh Ipsec tunnel Reg-Reply(-MIP) Regster to -HA Fgure 1. MVPN proposed by IETF. HDR* N/D (Informaton Exchange) Termnate Ipsec tunnel Fg. 2 shows the sgnalng message flows of IETF MVPN. Because the moblty of a moble equpment group was not consdered n IETF MVPN t cannot be appled to NEMO snce t would cause long hando latency and end-to-end latency [89]. These tunnels sgnfcantly ncrease the overhead due to packet length and processng tme and ths can degrade the performance n realtme applcatons. Although SIP-based MVPN was proposed only the moblty of a sngle node was consdered [1011]. In ths paper we propose SIP-based NEMO because t s easly dstrbuted and reduces the data Fgure 2. Sgnallng flows of IETF MVPN. 3 COST-EFFECTIVE AND SECURE MOBILITY MANAGEMENT SCHEME 3.1 System Archtecture IETF has defned archtecture and protocols for moble VPN. However The IETF moble VPN cannot be appled to NEMO because t does not consder the moblty of a group of moble devces. Besdes the IETF soluton s based on IPsec and ISBN: SDIWC 26

4 MIPv4 so t wll ncur long hando latency and end-to-end latency. On the other hand SIP has been proposed to provde host moblty and sesson contnuty. However by adoptng SIP nto NEMO t may ncrease sgnalng cost durng network hando. So I propose archtecture and protocols to support VPN n NEMO whch s called Cost-Eectve and Secure Moblty Management Scheme [40]. The proposed SeSIP comprses SIP secure real-tme transport protocol (SRTP) [14] multmeda nternet keyng (MIKEY) [15] and a Dameter server [16] to provde VPN servces n NEMO. Fg. 3 depcts the archtecture of the proposed SeSIP. Foregn Network 2 MN Foregn Network 1 SIP-NVG AP/BS AP/BS Moble Network MN Frewall Fgure 3. System archtecture. VPN Gateway SIP Proxy 1 ALG Sgnalng trac Data trac Dameter Server Intranet SIP Proxy 2 (SIP regstrar) Fg. 3 shows a moble network n a foregn network (Internet) connectng to the CN n the home network (ntranet). The SIP NEMO VPN gateway (SIP-NVG) shown n the moble network resdng n Foregn Network 1 s the gateway of the moble network to other networks. It follows the SIP standards and manages the trac between the moble network and the outsde world. The VPN gateway conssts of SIP Proxy 1 and an applcaton level gateway (ALG). There s a frewall between the Internet and the ntranet to prevent external users from gettng drect access to the ntranet. SIP Proxy 1 s a SIP proxy server whch authentcates the ncomng SIP messages through the Dameter server. It also routes messages to SIP Proxy 2 whch s essentally a SIP regstrar. Meanwhle MIKEY s used as the key management protocol to provde securty keys for the ALG whch then oversees all data trac. CN In the proposed SeSIP SIP s the man protocol to manage the sesson between MN SIP-NVG SIP Proxy 1 SIP Proxy 2 and CN. Dameter SIP Applcaton [17] s an adaptaton of the Dameter base protocol [16] that s used to authentcate and authorze a user n the Dameter server whle resource allocaton n ALG s acheved usng Mddle box Communcaton (MIDCOM) [18]. In addton MIKEY messages are embedded nsde the messages of the Dameter base protocol and the Sesson Descrpton Protocol (SDP) [19] to carry securty nformaton. For user plane when the moble network resdes n nternet SRTP s used to secure the data transmsson between MN and ALG. SIP s an applcaton-layer sgnalng protocol. It s used to create modfy and termnate sessons n the proposed SeSIP. SIP has defned ts own securty and authentcaton schemes. In our proposed CE-SeMMS we use SIP to authentcate and dentfy the moble users. SIP also supports user moblty and termnal moblty [12] [20]. Termnal moblty s acheved by sendng new INVITE (re-invite) to the CN usng the same call ID as that n the orgnal sesson. The new INVITE contans the new contact address the MN has acqured n the new locaton. After recevng the re-invite the CN wll redrect future trac to the MNs new locaton. SRTP defnes a framework to provde encrypton and ntegrty for Real-tme Transport Protocol (RTP) [21] and RTP Control Protocol (RTCP) [21] streams. MIKEY s a key management protocol developed for multmeda real-tme applcatons runnng over RTP/SRTP. In contrast to IKE whch s wdely used as key management protocol for uncast MIKEY s desgned for peer-to-peer or small nteractve groups. MIKEY can fulfll the requrements of derent envronments. For example a MIKEY message can be embedded nsde an SDP message. A new type k has been defned n SDP to carry MIKEY message. The man purpose of MIKEY s to transport the TEK2 Generaton Key(TGK) and other related securty parameters or polces whch are used n securty transport protocols. The Dameter SIP Applcaton allows a clent of a SIP server to be authentcated and authorzed by a Dameter server. There are sx Dameter ISBN: SDIWC 27

5 commands n the Dameter SIP applcaton. In the proposed SeSIP we use User-Authorzaton- Request (UAR) / User-Authorzaton-Answer (UAA) and Multmeda-Auth-Request (MAR) / Multmeda-Auth-Answer (MAA) to process SIP REGISTER and INVITE messages. The authentcaton s done by the Dameter server rather than by delegatng to a SIP server. HOTPbased authentcaton s adopted n the proposed SeSIP to reduce authentcaton tme an element of delay tme durng hando. HOTP s an OTP creaton algorthm based on event synchronzaton and the clent and authentcaton server share the secret key K. It uses C the ncreasng counter value and HMAC-SHA-1 hash algorthm to create the password. The ncreased value (C +1) s used to create a new password (6 dgts) durng the followng authentcaton. The OTP mechansm creates the sngle user password based on three parameters: hash algorthm secret key and challenge/counter. HOTP creates the password usng the authentcaton number (counter) - whch s remembered between the authentcaton server and the user - as the nput value of OTP and the authentcaton s performed only when the counter value matches. The counter parameter has the characterstcs of synchronzaton OTP (HOTP [5]) and the clent creates a new password wthout recevng the tem beforehand from the authentcaton server. HOTP performs clent authentcaton through one handshake usng the OTP creaton algorthm based on the event synchronzaton method. As dscussed above the SIP-NVG s the moble networks gateway to other networks. When a moble network roams among derent IP subnets the SIP-NVG not only keeps ongong sessons unbroken but also transmts data n a secure manner. There are two types of nterfaces owned by SIP-NVG: egress nterface and ngress nterface. A SIP-NVG attaches to the Internet through an egress nterface. Once a moble network moves to a new IP subnet the egress nterface of the SIP-NVG wll get a new IP address. On the other hand when an MN wants to jon a moble network t attaches to the ngress nterface of the SIP-NVG. In our desgn each moble network has only one SIP-NVG whch essentally s an MR wth SIP capablty. The proposed SIP-NVG s able to route SIP messages and data trac between ts egress nterface and ngress nterface by translatng the correspondng headers. MN SIP-NVG SIP Proxy 1 REGISTER 200 OK REGISTER REGISTER 200 OK REGISTER sp:hs.vpn.com SIP/2.0 From : <sp:[email protected]> To : <sp:[email protected]> Call-ID : @hs.vpn.com Cseq : 1 REGISTER Contact : <sp:[email protected]> Content-Type : applcaton/sdp Content-Length : 0 UAR UAA Dameter Server REGISTER 200 OK MAR MAA REGISTER SIP Proxy 2 (SIP regstrar) REGISTER sp:hs.vpn.com SIP/2.0 From : <sp:[email protected]> To : <sp:[email protected]> Call-ID : @hs.vpn.com Cseq : 1 REGISTER Contact : <sp:[email protected]> Content-Type : applcaton/sdp Content-Length : 0 Fgure 4. Message flows and translaton of REGISTER when moble network resdes n foregn network. Fg. 4 depcts the flow for regstraton when the moble network s n a foregn network. When an MN enters a moble network the MN gets a new IP address and regsters t wth the SIP-NVG. As shown n Fg. 4 the MN updates ts current locaton wth the SIP regstrar resdng n the home network by sendng the REGISTER wth the newly obtaned contact address. In ths example we assume the moble network resdes n a foregn network and the new address assgned for the MN s [email protected]. In our proposed archtecture SIP Proxy 2 not only handles the sgnalng messages but also acts as the SIP regstrar. As llustrated n Fg. 4 the SIP-NVG translates the contact feld n the REGISTER from the MNs address nto the SIP-NVGs URI address whch s [email protected]. Also the SIP- NVG establshes a mappng table to record the regstraton nformaton for the MN. Hence each request targeted to the MN s redrected to the SIP-NVG. The proposed archtecture depcted n Fg. 3 adopts an ALG whch follows MIDCOM archtecture. We propose that the ALG only accepts commands from SIP Proxy 2 and provdes ISBN: SDIWC 28

6 responses for the correspondng commands. When the ALG receves a specal ncomng RTP stream from the home network to an MN n the Internet t replaces the whole IP/UDP/RTP header wth a new one transforms the new RTP packet nto SRTP format and delvers the SRTP stream to the destnaton. In the reverse drecton the ALG receves the SRTP stream from the Internet and the ALG decrypts t and verfes t to decde whether the SRTP packet s vald. If the SRTP packet s decrypted and verfed successfully the RTP payload s carred by a new RTP header. The new RTP packet s then transmtted to the home network. Each sesson n the ALG requres sucent external and nternal resources. For example the external resource may nclude an external lstenng address external lstenng port external destnaton address and external destnaton port. Destnaton addresses and ports are provded by SIP Proxy 2. Only when all resources are ready does the sesson n the ALG start. When ether the external or nternal resource s reserved successfully the ALG wll reply wth the reserved lstenng address and port to SIP Proxy 2. 4 PERFORMANCE ANALYSYS In order to support secure communcaton n VPN the proposed SeSIP sends sgnalng messages carryng securty nformaton. It also sends sgnalng messages to mantan sesson contnuty durng hando. To evaluate the performance of the proposed SeSIP t s mportant to quantfy sgnalng cost. Smlar to that n [26] [27] [28] [29] the sgnalng cost functon comprses transmsson cost and processng cost. The transmsson cost s proportonal to the dstance between the two network nodes. The processng cost ncludes the cost to process messages verfy messages and so on. In our proposed SeSIP the nter-realm roamng of a moble network ncludes three types of hando: 1) From the ntranet (home network) to a foregn network 2) From a foregn network to another foregn network and 3) From a foregn network back to the ntranet. They are represented as respectvely. N subnets H hf H and H fh 3.2 Securty Vulnerabltes SIP authentcaton: Ths secton presents the qualtatve analyss of securty vulnerabltes n the proposed SeSIP. Integrty and confdentalty of SIP authentcaton messages are not protected. Therefore malcous users may sn trac to get the plantext or place a spam call. However n the proposed SeSIP the transport of SIP messages can be easly extended to ncorporate Transport Layer Securty (TLS) [22] so the transmsson of SIP messages can be protected. SIP parser attack: The free text format of SIP message could make parsng dcult. Attackers sendng a very large messages wth unnecessary headers and bodes can exhaust the resource of SIP server. The SeSIP may suer from such attack too. To solve ths problem the parser n the SeSIP can be desgned to check message sze and dscard the one whch exceeds the sze lmt. Also a practcal mplementaton provded by [23] [24] [25] can be adopted. Moble network Moble network Moble network H fh H H hf Home Network Foregn Network A new sesson arrves or an exstng sesson departs Fgure 5. Network topology for analyss. We assume that the network topology s confgured as shown n Fg. 5 such that the moble network returns to the ntranet after t moves across N 1 foregn networks. Hence when N s larger the moble network travels far away from ts home network before t returns [40]. For example the hando sequence can be shown as H H H H H. Table 2 lsts the parameters... hf fh used n the analyss. For a moble network let fm() t be a general densty functon for the network resdence tme t M n a subnet. k ISBN: SDIWC 29

7 Let Et 1 wrtten: M. Its Laplace transform s For smplcty we denote g * fm( ) n the rest of the paper. Let k jn q and 0 q N. Then * st fm( s) e fm( t) dt. t0 Table 2. Parameter Defntons for Each Subsystem. Parameter Defnton Number of networks a moble network vsts before t N goes back to the ntranet. Sesson arrval rate for a moble network 1 Average sesson servce tme 1 Average network resdence tme c Maxmum number of ongong sessons n a moble network Probablty densty functon of We assume that the arrval of SIP sessons to the moble network follows a Posson process wth arrval rate. The servce tme of a sesson s exponentally dstrbuted wth mean 1. Smlar to that n [30] we defne ak ( ) as the probablty that a moble network wll move across k subnets between two events whle there are ongong sessons n the moble network. An event here s a new sesson arrval or an ongong sesson departure from the moble network. We denote E t S as the nterval between two consecutve events. Durng E t S there are ongong sessons n the moble network. Based on the property of sums of two ndependent Posson process E t S can be consdered as the nter arrval tme of a new Posson process. Therefore c E ts 1 c (1) where c s the maxmum number of ongong sessons allowed n a moble network. Accordng to the above assumpton we have: * (1 fm( )) 1 k 0 a ( k) * 2 * k 1 1 fm ( ) fm ( ) k 0. (2) 2 (1 g ) N j q j q a ( jn q) ( g ) g yz x (3) g For demonstraton purpose we assume that the network resdence tme follows a Gamma dstrbuton. The Laplace transform of a Gamma random varable s expressed: f * m ( s). s Hence we obtan: g * fm ( ). (4) (5) In the proposed SeSIP when a moble network moves across networks t must perform regstraton wth the SIP Regstrar to update ts locaton. It also must send re-invite messages to the CNs f there are ongong sessons wth the MNs n the moble network. Hence the cost comprses two parts: the regstraton cost for SIPNVG and the re-invite cost for mantanng sesson contnuty. The regstraton cost s ndependent of the number of ongong sessons n the moble network because the SIP-NVG can regster wth the SIP Regstrar on behalf of the whole moble network. On the other hand the re- INVITE cost depends on the number of ongong sessons n the moble network. The cost ncreases when the number of ongong sessons ncreases. However because we desgn a URI lst embedded n one re-invite message the cost to really send a re-invite message to each ndvdual CN s nearly constant regardless of the number of ongong sessons n the moble network. Moreover clent authentcaton s performed through one handshake by usng HOTP-based authentcaton [5] when the REGISTER or INVITE s requested. Ths reduces the request/response number when the sgnalng message s processed thereby reducng the ISBN: SDIWC 30

8 processng cost of the sgnalng. Table 3 lsts the parameters for hando sgnalng cost. Therefore we can denote the sgnalng cost for hando: S R L I hf f hf hf S R L I f S R L I fh h fh fh. (6) Durng E t S we assume that the moble network crosses k subnets as shown n Fg. 5. We defne as the number of subnets the moble network moved across from the tme t vsted the ntranet untl the tme the last event occurred. When 0 < < N the total sgnalng cost n the moble network durng E t S can be derved as: Table 3. Parameters for Hando Sgnallng Cost. Param Defnton eter S hf S S fh R h R f L hf L L fh I hf I I fh Average hando cost when a moble network moves from the home network to a foregn network wth ongong sessons. Average hando cost when a moble network moves from a foregn network to another foregn network wth ongong sessons. Average hando cost when a moble network moves from a foregn network to the home network wth ongong sessons. Average regstraton cost of a moble network (sent by SIP- NVG) when the moble network enters ts home network. Average regstraton cost of a moble network (sent by SIP- NVG) when the moble network enters a foregn network. Average cost for the frst part of re-invite when a moble network moves from ts home network to a foregn network. Average cost for the frst part of re-invite when a moble network moves from a foregn network to another foregn network. Average cost for the frst part of re-invite when a moble network moves from a foregn network to ts home network. Average cost for the second part of re-invite of a sesson when a moble network moves from ts home network to a foregn network. Average cost for the second part of re-invite of a sesson when a moble network moves from a foregn network to another foregn network. Average cost for the second part of re-invite of a sesson when a moble network moves from a foregn network to ts home network. C( N ) k 1 k Shf Sfh k 0 N N k 1 k S k a ( k) N N S ( S g S g S S )(1 g ) g. (7) g g N 1 hf fh N (1 ) If s exponentally dstrbuted the p.d.f of s: ( N 1)/ e e N 1 e e 2 (8) ( N 1)/2 1 ( N ) 1 2e e N 1 e N e 2 Therefore C _ exponental ( N ) N 1 C ( N ) S 0 (1 g ) (1 g ) N 12e e (1 e )( S g S g S S ) g 1 N 1 (1 e )( Shf S ( S fh S ) g ) ( N 1) N 1 hf fh ( N 1) e e e e (9) g g N1 2 N 1 N 1 N 1 2 As dscussed above the arrval of sessons to a moble network follows a Posson process and the sesson servce tme s exponentally dstrbuted. In addton there s a lmt c for the maxmum number of ongong sessons allowed n the moble network. Therefore we can model the number of ongong sessons n a moble network as an M/M/ c/c queung system. The steady state probablty that there are ongong sessons n the moble network s then gven by [31]: 1 c x P x (10)! x0 x! As a result the average hando-sgnalng cost per unt tme can be derved as: c C _ exponental P. (11) 0 ISBN: SDIWC 31

9 The varables and P can be obtaned from (1) and (10). Further we consder the eect of the varance of the moblty pattern. We assume the average resdence tme s gamma dstrbuted [32] [33]. Therefore the varance s: 1 Var (12) 2 Table 4. Parameters for SeSIP Sgnallng Cost. Parameter Defnton a The processng cost for SIP regstraton at Node x x b x A xy B xy U M The processng cost for SIP INVITE message at Node x The transmsson cost of SIP regstraton between Node x and Node y The transmsson cost of a SIP INVITE message between Node x and Node y The total cost for SIP Proxy 1 to process and transmt UAR/UAA messages to the Dameter server The total cost for SIP Proxy 2 to process and transmt MAR/MAA messages to the Dameter server To evaluate the performance of the proposed SeSIP Table 4 lsts the parameters used n SeSIP Sgnalng Cost. where x and y can be mn; nvg; pro; reg; alg; or cn whch denote MN SIP-NVG SIP Proxy 1 SIP Proxy 2 (SIP Regstrar) ALG and CN respectvely. The costs can be calculated: R a a 2 A M h nvg reg nvg reg R a 2a a 2A 2 A U M f nvg pro reg nvg pro pro reg L 2b 3b 4b 2b 3B 3B hf nvg pro reg al g nvg pro pro reg 4 B B M reg alg reg cn L 2b 3b 2b b 3B 3B nvg pro reg alg nvg pro pro reg 2Bre M L 2b 3b b 3B 2B B fh nvg reg alg nvg reg reg alg reg cn M g alg I b b b b 2B 2 B hf mn nvg reg cn mn nvg reg cn I b b 2 B mn nvg mn nvg I b b 2B b b 2 B ; fh mn nvg mn nvg reg cn reg cn To compare the sgnalng cost to that of IETF MVPN we assume the Dameter MIPv4 applcaton [34] s used to authentcate the x-mip. Also we assume MN s n collocated mode. Analyss of an FA mode s not presented here because t has almost the same results. The subscrpts mn;mg; vpn; xha; and ha refer to MN Moble Gateway IPsec-based VPN gateway x- HA and -HA respectvely. Also the followng parameters are defned: Based on the sgnalng message flow shown n Fg. 2 the above cost can be calculated: M 2d 2d 2W 2W 2 H x mg xha mn mg mg xha M 2d 2d 2d d 2W o mg xha vpn ha mn mg 2W 2W 2W 2 H mg xha xha vpn vpn ha M d 2W 2 W ha mn mg mg ha T 2e 6e 6e 3e 6Z est mn mg xha vpn mn mg 6Zmg xha 6Zx ha vpn T Z Z e ter mn mg mg vpn vpn The hando cost of IETF MVPN when a moble network moves between networks s derved as D M M T D hf x o est M D M T x fh ter.. (13) In the archtecture we propose SIP-NVG manages the overall network moblty regsterng the whole moble network n the SIP Regstrar when t moves to a new subnet. If there s no SIP- NVG all MNs n the same moble network must update ther locatons separately. Ths ncreases sgnalng cost. We can re-defne the costs (6) when there s no SIP-NVG as follows. S mr L I hf f hf hf S mr L I f fh S mr L I fh h hh fh. (14) where m s the number of MNs connected to the moble network. In addton the HOTP authentcaton method [5] used n the proposed archtecture s an event synchronzaton method that performs clent authentcaton through a sngle handshake. In contrast the HTTP dgest authentcaton method adopted by many other securty protocols s based on the challenge- ISBN: SDIWC 32

10 Sgnalng Cost(per unt Tme) response paradgm and requres two handshakes between the clent of the SIP server and the Dameter server. Ths s because the SIP Regstrar uses UAR/UAA and MAR/MAA commands for the Dameter server for user authentcaton and authorzaton when the clent of the SIP server transmts SIP REGISTER and INVITE messages. Therefore the cost ncurred n the use of HTTP dgest authentcaton can be calculated as follows. R 2a 2a 4A 2 M h nvg reg nvg reg R 2a 4a 2a 4A 4A f nvg pro reg reg pro pro reg 2U 2 M L 3b 5b 5b 2b 5B 5B hf nvg pro reg alg reg pro pro reg 4B B 2 M reg alg reg cn L 3b 5b 3b b 5B 5B nvg pro reg alg reg pro pro reg 2B 2 M reg alg L 3b 4b b 5B 2B B fh nvg reg alg nvg reg reg alg reg cn 2 M I b b b b 2B 2 B hf mn nvg reg cn mn nvg reg cn I b b 2 B mn nvg mn nvg I b b b b 2B 2 B. fh mn nvg reg cn mn nvg reg cn major objectves n the proposed SeSIP s to reduce the sgnalng cost for hando whle supportng the VPN. Table 5. Parameters for Performance Analyss. Parameter Defnton M The x-mip regstraton cost. x The -MIP regstraton cost when MN s located M o outsde the ntranet. The -MIP regstraton cost when MN s located nsde M the ntranet. T est The establshment cost of IPsec tunnel. T The termnaton cost of IPsec tunnel. ter d The processng cost for MIP regstraton at Node x. x e x The processng cost for IPsec message at Node x. The transmsson cost of MIP regstraton between W xy Node x and Node y. The transmsson cost of IPsec message between Node Z xy x and Node y. The total cost for x-ha to process and transmt H HAR/HAA and AMR/AMA messages to AAAF and AAAH IETF-MVPN Wth SIP-NVG(use HTTP) Wthout SIP-NVG(use HTTP) 5 NUMERICAL RESULTS Ths secton provdes the numercal results for the analyss presented n Secton 4. The analyss was valdated by extensve smulatons usng ns-2 [35]. As dscussed n Secton 4 the sgnalng cost functon conssts of the transmsson cost and the processng cost. We assume that the transmsson cost s proportonal to the dstance between the source and destnaton nodes and the processng cost ncludes the processng and verfyng SIP messages [36] [37] [38] [39]. Also the transmsson cost of a wreless lnk s hgher than that of a wre lne. To llustrate performance reasonable values were chosen for the parameters as lsted n Table 5. Addtonally to compare our desgns sgnalng cost wth that of IETF MVPN we assumed the x-ha was optmally collocated wth the VPN gateway and AAAF and the -HA was collocated wth the SIP Proxy 2/Regstrar. Also the AAAH n IETF MVPN as collocated wth the Dameter server n the SeSIP. One of the Average Resdence Tme Fgure 6. Comparson of varous sgnallng costs versus resdence tme(1). Fg. 6 presents a comparson among the sgnalng costs wth IETF MVPN wth and wthout SIP-NVG usng HTTP. Also Fg. 7 presents a comparson among the sgnalng costs wth SIP-NVG usng HTTP and usng HOTP. As defned above m s the number of MNs attached to the moble network. In addton we assume N 7 m 5 c 10 and 5. In the SIPbased protocol SIP re-invites and SIPs regstraton must be performed durng each hando. Therefore the sgnalng cost for a SIPbased protocol mght be hgher than for MIP. However Fg. 6 shows that a method wth SIP- NVG has lower sgnalng costs for hando than n ISBN: SDIWC 33

11 Sgnalng Cost(per unt tme) Sgnalng Cost(per unt Tme) Sgnalng Cost(per unt tme) IETF MVPN. Ths s because IETF MVPN requres tme to establsh the three tunnels. Compared to the moble network wthout SIP- NVG the method wth SIP-NVG reduces hando sgnalng cost sgnfcantly snce SIP-NVG performs regstraton n the SIP Regstrar on behalf of the entre moble network when t moves to a new subnet whereas wthout SIP-NVG all MNs must update ther locatons ndvdually. technque reaches the maxmum number allowed n the moble network. Comparng c 10 and c 15 n the SIP-based technques more sessons exst n the moble network when c 10. Hence greater sgnalng cost occurs for a re-invite. Because movng from home network to foregn network causes hgher sgnalng cost than other types of handos revstng the home network frequently results n hgher sgnalng cost Wth SIP-NVG and use HTTP SeSIP(Wth SIP-NVG and HOTP) C=10 Wthout SIP-NVG (use HOTP) C=10 Wth SIP-NVG (use HTTP) C=10 Wth SIP-NVG (use HOTP) Average Resdence Tme Fgure 7. Comparson of varous sgnallng costs versus resdence tme(2) Average Resdence Tme(1/gamma) Fgure 8. Comparson of sgnallng cost wth and wthout SIP-NVG and usng HTTP or HOTP Method (C=10). And Fg. 7 shows that SeSIP(wth SIP-NVG usng HOTP) has lower sgnalng costs for hando than n SIP-NVG usng HTTP. Further our results show that the HOTP authentcaton method reduces sgnalng cost compared to the HTTP dgest authentcaton method by reducng the requred handshakes from two to one. Hando sgnalng cost decreases when the average network duraton tme ncreases.e. when the moble network has relatvely low moblty. Fg. 8 9 demonstrates the average sgnalng cost for hando versus the number of sessons n the moble network. The parameters are set as n Fg. 6 7 except that 0.1. Smlar to Fg. 6 7 the proposed SeSIP has less sgnalng cost for hando than wthout SIP-NVG usng HOTP or wth SIP- NVG usng the HTTP dgest method. We also that when ncreases the average cost for SIPbased solutons ncreases too. The reason s that wth more ongong sessons more re-invites are needed to mantan sesson contnuty. Besdes when s larger than 20 the costs of all technques presented n Fg. 8 9 reman almost constant. Ths s because when approaches 20 the number of ongong sessons wth each C=15 Wthout SIP-NVG (use HOTP) C=15 Wth SIP-NVG (use HTTP) C=15 Wth SIP-NVG (use HOTP) 1 10 Average Resdence Tme(1/gamma) Fgure 9. Comparson of sgnallng cost wth and wthout SIP-NVG and usng HTTP or HOTP Method (C=15). 6 CONCLUSIONS Although the IETF standard has proposed a moble VPN archtecture t s desgned for the movement of a sgnal node only. In addton IETF MVPN has large overhead for transmttng realtme packets because t requres one IPsec tunnel and two MIP tunnels. On the other hand there has been no ecent way to support moble VPN n NEMO even though NEMO supports network moblty. Ths paper presents a novel method for ISBN: SDIWC 34

12 supportng MVPN n NEMO that ensures that the sesson s mantaned contnuously when the whole network moves and t proposes usng the HOTP-based authentcaton method to shorten the processng tme of the sgnalng that contnuously occurs to mantan the sesson. In addton securty s enhanced n our desgn through the ntegraton of NEMO and VPN. We analyzed the desgn and performance of our proposed desgn and results ndcate that the proposed SeSIP based on SIP s well suted to real-tme servce. Although SIP-based moblty management can easly support routng optmzaton there may be an upswng n the hando sgnalng costs because many sgnalng messages are transmtted to mantan the sesson n progress wth SIP n NEMO. In the proposed SeSIP a URI lst s used to sgnfy the SIP proxy server nstead of transmttng sgnalng messages ndvdually to each node. Therefore the sgnalng cost s reduced. User authentcaton usng the exstng HTTP dgest authentcaton method requres many handshakes ncreasng the sgnalng cost. In contrast the proposed SeSIP usng HOTP-based authentcaton consderably reduces the number of handshakes needed wth the authentcaton server thus reducng the sgnalng cost. The SIP proxy server and the Dameter server are responsble for authentcaton and authorzaton. Also the ALG receves a command from the SIP proxy server to process the securty nformaton for the data transmsson dependng on MIDCOM archtecture. ALG s responsble for convertng and relayng the protected and unprotected data. Thus unauthorzed data cannot pass the ALG n the Internet. Ths paper examned a method for ecent management of group moblty and cost savngs for real-tme servces through the ntegraton of moble VPN and NEMO. NEMO currently n the early stage of research s expected to be further realzed through the convergence of varous technologes polces and methods such as the path optmzaton method for ecent servces mult-homng technology and methods for servces n the nclusve moblty network. These need to be researched n the perod ahead. For commercal servce research should also be conducted to develop technology to enable fast detecton of movement. 7 ACKNOWLEDGMENTS Ths research was supported by Next-Generaton Informaton Computng Development Program through the Natonal Research Foundaton of Korea (NRF) funded by the Mnstry of Scence ICT & Future Plannng (No ) and Basc Scence Research Program through the Natonal Research Foundaton of Korea (NRF ). Also ths research was supported by the Mnstry of Trade Industry and Energy(MOTIE) KOREA through the Educaton Support program for Creatve and Industral Convergence (Grant Number N ). Correspondng author: Jongpl Jeong. 8 REFERENCES [1] V. Schena and G. Losquadro FIFTH Project Solutons Demonstratng New Satellte Broadband Communcaton System for Hgh Speed Tran Proc. IEEE Vehcular Technology Conf. pp May [2] WrelessCabn Project [3] V. Devarapall R. Wakkawa A. Petrescu and P. Thubert Network Moblty (NEMO) Basc Support Protocol IETF RFC 3963 Jan [4] S. Kent and R. Atknson Securty Archtecture for the Internet Protocol IETF RFC 2401 Nov [5] D. MRah M. Bellare F. Hoornaert D. Naccache and O. RanenHOTP: An HMAC-Based One-Tme Password AlgorthmRFC 4226 December [6] S. Vaarala and E. Klovnng Moble IPv4 Traversal Across IPsec-Based VPN Gateways IETF RFC 5265 June [7] D. Harkns and D. Carrel The Internet Key Exchange (IKE)IETF RFC 2409 Nov [8] J.-C. Chen Y.-W. Lu and L.-W. Ln Moble Vrtual Prvate Networks wth Dynamc MIP Home Agent Assgnment Wreless Comm. and Moble Computng vol. 6 no. 5 pp Aug [9] J.-C. Chen J.-C. Lang S.-T. Wang S.-Y. Pan Y.-S. Chen and Y.-Y. Chen Fast Hando n Moble Vrtual Prvate Networks Proc. IEEE Intl Symp. World of Wreless Moble and Multmeda Networks (WoWMoM 06) pp June [10] S.-C. Huang Z.-H. Lu and J.-C. Chen SIP-Based Moble VPN for Real-Tme Applcatons Proc. IEEE Wreless Comm. And Networkng Conf. (WCNC 05) pp Mar [11] Z.-H. Lu J.-C. Chen and T.-C. Chen Desgn and Analyss of SIP-Based Moble VPN for Real-Tme Applcatons IEEE Trans. Wreless Comm. vol. 8 no. 11 pp Nov [12] A. Dutta F. Vakl J.-C. Chen M. Taul S. Baba N. Nakajma and H. Schulzrnne Applcaton Layer Moblty Management Scheme for Wreless Internet ISBN: SDIWC 35

13 Proc. IEEE Intl Conf. Thrd Generaton Wreless and beyond (3G Wreless) pp May [13] D. Val S. Paskals A. Kaloxylos and L. Merakos An Ecent Mcro-Moblty Soluton for SIP Networks Proc. IEEE GLOBECOM pp Dec [14] M. Baugher D. McGrew M. Naslund E. Carrara and K. Norrman The Secure Real-Tme Transport Protocol (SRTP)IETF RFC 3711 Mar [15] J. Arkko E. Carrara F. Lndholm M. Naslund and K. Norrman MIKEY: Multmeda Internet KEYng IETF RFC 3830 Aug [16] P. Calhoun J. Loughney E. Guttman G. Zorn and J. ArkkoDameter Base Protocol IETF RFC 3588 Sept [17] M. Garca-Martn M. Belnchon M. Pallares-Lopez C. Canales and K. Tamm Dameter Sesson Intaton Protocol (SIP) Applcaton IETF RFC 4740 Nov [18] P. Srsuresh J. Kuthan J. Rosenberg A. Moltor and A. Rayhan Mddlebox Communcaton Archtecture and Framework IETF RFC 3303 Aug [19] M. Handley and V. Jacobson SDP: Sesson Descrpton Protocol IETF RFC 2327 Apr [20] J.-C. Chen and T. Zhang IP-Based Next-Generaton Wreless Networks. John Wley and Sons Jan [21] H. Schulzrnne S. Casner R. Frederck and V. Jacobson RTP: A Transport Protocol for Real-Tme Applcatons IETF RFC 3550 July [22] E. Rescorla SSL and TLS: Desgnng and Buldng Secure Systems. Addson Wesley [23] D. Geneataks G. Kambouraks C. Lambrnoudaks T. Daguklas and S. Grtzals A Framework for Protectng a SIP-Based Infrastructure aganst Malformed Message Attacks Computer Networks vol. 51 no. 10 pp July [24] D. Geneataks and C. Lambrnoudaks An Ontology Descrpton for SIP Securty Flaws Computer Comm. vol. 30 no. 6 pp Mar [25] D. Geneataks G. Kambouraks and T. Daguklas A Framework for Detectng Malformed Messages n SIP Networks Proc. 14th IEEE Workshop Local and Metropoltan Area Networks Sept [26] J. Xe and I.F. Akyldz A Novel Dstrbuted Dynamc Locaton Management Scheme for Mnmzng Sgnalng Costs n Moble IP IEEE Trans. Moble Computng vol. 1 no. 3 pp July-Sep [27] W. Ma and Y. Fang Dynamc Herarchcal Moblty Management Strategy for Moble IP Networks IEEE J. Selected Areas Comm. vol. 22 no. 4 pp May [28] R. Rummler Y.W. Chung and A.H. Aghvam Modelng and Analyss of an Ecent Multcast Mechansm for UMTS IEEE Trans. Vehcular Technology vol. 54 no. 1 pp Jan [29] S. Fu M. Atquzzaman L. Ma and Y.-J. Lee Sgnalng Cost and Performance of SIGMA: A Seamless Handover Scheme for Data Networks Wreless Communcatons and Moble Computng vol. 5 no. 7 pp Nov [30] Y.-B. Ln Reducng Locaton Update Cost IEEE/ACM Trans. Networks vol. 5 no. 1 pp Feb [31] D. Gross and C.M. Harrs Fundmentals of Queueng Theory. John Wley and Sons [32] M.M. Zonooz and P. Dassanayake User Moblty Modelng and Characterzaton of Moblty Patterns IEEE J. Selected Areas Comm. vol. 15 no. 7 pp Sept [33] Y. Fang and I. Chlamtac Teletrac Analyss and Moblty Modelng of PCS Networks IEEE Trans. Comm. vol. 47 no. 7 pp July [34] P. Calhoun T. Johansson C. Perkns T. Hller and P. McCann Dameter Moble IPv4 Applcaton RFC 4004 Aug [35] The Network Smulator- ns [36] J. Xe and I.F. Akyldz A Novel Dstrbuted Dynamc Locaton Management Scheme for Mnmzng Sgnalng Costs n Moble IP IEEE Trans. Moble Computng vol. 1 no. 3 pp July-Sep [37] W. Ma and Y. Fang Dynamc Herarchcal Moblty Management Strategy for Moble IP Networks IEEE J. Selected Areas Comm. vol. 22 no. 4 pp May [38] R. Rummler Y.W. Chung and A.H. Aghvam Modelng and Analyss of an Ecent Multcast Mechansm for UMTS IEEE Trans. Vehcular Technology vol. 54 no. 1 pp Jan [39] S. Fu M. Atquzzaman L. Ma and Y.-J. Lee Sgnalng Cost and Performance of SIGMA: A Seamless Handover Scheme for Data Networks Wreless Communcatons and Moble Computng vol. 5 no. 7 pp Nov [40] T.C. Chen J.C. Chen Z.H. Lu Secure Network Moblty (SeNEMO) for Real-Tme Applcatons IEEE Trans. Moble Computng vol. 10 no. 8 Aug ISBN: SDIWC 36

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Hosted Voice Self Service Installation Guide

Hosted Voice Self Service Installation Guide Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 [email protected] www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 [email protected]

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

sscada: securing SCADA infrastructure communications

sscada: securing SCADA infrastructure communications Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 [email protected]

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty [email protected], [email protected] ABSTRACT Voce over IP (VoIP) s one of

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He [email protected] Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

GR-303 Solution For Access Gateways

GR-303 Solution For Access Gateways GR-303 Soluton for Access Gateways GR-303 Soluton For Access Gateways Verson 1.0 October 2003 Page 1 of 18 GR-303 Soluton for Access Gateways COPYRIGHT Ths materal s the propretary property of and confdental

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

Towards a Light-weight Bag-of-tasks Grid Architecture

Towards a Light-weight Bag-of-tasks Grid Architecture Telfor Journal, Vol. 7, No. 1, 215. 49 Towards a Lght-weght Bag-of-tasks Grd Archtecture Ila Baščevć, Member, IEEE, Nenad Četć, Mroslav Popovć, Member, IEEE, and Momčlo Krunć 1 Abstract The paper presents

More information

Dimming Cellular Networks

Dimming Cellular Networks Dmmng Cellular Networks Davd Tpper, Abdelmounaam Rezgu, Prashant Krshnamurthy, and Peera Pacharntanakul Graduate Telecommuncatons and Networkng Program, Unversty of Pttsburgh, Pttsburgh, PA 1526, Unted

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

A High-confidence Cyber-Physical Alarm System: Design and Implementation

A High-confidence Cyber-Physical Alarm System: Design and Implementation A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

Proceedings of the Annual Meeting of the American Statistical Association, August 5-9, 2001

Proceedings of the Annual Meeting of the American Statistical Association, August 5-9, 2001 Proceedngs of the Annual Meetng of the Amercan Statstcal Assocaton, August 5-9, 2001 LIST-ASSISTED SAMPLING: THE EFFECT OF TELEPHONE SYSTEM CHANGES ON DESIGN 1 Clyde Tucker, Bureau of Labor Statstcs James

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Chapter 3: Dual-bandwidth Data Path and BOCP Design

Chapter 3: Dual-bandwidth Data Path and BOCP Design Chater 3: Dual-bandwdth Data Path and BOCP Desgn 3. Introducton The focus of ths thess s on the 4G wreless moble Internet networks to rovde data servces wthn the overlang areas of CDA2000-WLA networks.

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: [email protected]

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea [email protected] 45 The con-tap test has the

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Oservce Vs. Sannet - Which One is Better?

Oservce Vs. Sannet - Which One is Better? o rcng n Compettve Telephony Markets Yung-Mng L nsttute of nformaton Management Natonal Chao Tung Unversty, Tawan 886-3-57111 Ext 57414 [email protected] Shh-Wen Chu nsttute of nformaton Management Natonal

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information