Applied Mechanics and Materials
Vol. 421
Vol. 421
Applied Mechanics and Materials
Vol. 420
Vol. 420
Applied Mechanics and Materials
Vol. 419
Vol. 419
Applied Mechanics and Materials
Vol. 418
Vol. 418
Applied Mechanics and Materials
Vols. 416-417
Vols. 416-417
Applied Mechanics and Materials
Vol. 415
Vol. 415
Applied Mechanics and Materials
Vols. 411-414
Vols. 411-414
Applied Mechanics and Materials
Vols. 409-410
Vols. 409-410
Applied Mechanics and Materials
Vols. 405-408
Vols. 405-408
Applied Mechanics and Materials
Vol. 404
Vol. 404
Applied Mechanics and Materials
Vols. 401-403
Vols. 401-403
Applied Mechanics and Materials
Vols. 397-400
Vols. 397-400
Applied Mechanics and Materials
Vols. 395-396
Vols. 395-396
Applied Mechanics and Materials Vols. 411-414
Paper Title Page
Abstract: Wireless sensor networks with highly dynamic characteristics and limited resources, this paper presents a simple service level management protocol. It realizes service deployment management across different clusters, the request and the response of wireless sensor is simple that based on the protocol data format of XML WSNXML between the clusters. It provides an effective method for the management of shared resources of wireless sensor network and service expansion and realizes service release and deployment management difficulties between various wireless sensor network management based on different management cluster.
643
Abstract: The trustworthiness of data transmission is a very important parameter in the future network. In this paper, considering the optimal ability of population adaptive immune and the trustworthiness demand of the network, a trustworthy QoS routing algorithm is proposed. The interval is used to describe the user requirement in order to adapt to the fuzziness of the user QoS and trust demand, and the sliding window is adopted to implement the trust evaluation and control mechanism. With satisfaction degree function introduced, it tries to find the optimal path which satisfies the user requirement based on population adaptive immune algorithm. The simulation results show that the proposed algorithm is both feasible and effective.
647
Abstract: With the rapid development of the Internet, the de facto inter-domain routing protocol, Border Gateway Protocol (BGP), has become very vulnerable to many attacks. For this, several secure inter-domain protocols have been proposed, most of which are focus on addressing the issue of faking AS path, but cannot address other issues, such as violating routing policies, reachability attacks and so on. Based on the concept of identifier/locator split and routing isolation, we have proposed a secure identifier-based inter-domain Routing, SIR [, which can provide control plane security without using the high overhead mechanism. Then, we here optimize SIR and propose another secure inter-domain routing, Optimized SIR (O-SIR), which introduces a checked path table and records the path which has been checked before in each AS. We present the simulations based on the real world datasets CAIDA and compare the performance between SIR and O-SIR by different deployments and different position of attacks. The results show that O-SIR can reduce 18%-45% communication cost of verifying paths with additional below 0.1% routing table size.
653
Abstract: the paper introduces Cisco AAA certification, through the simulation practical the certification, it is a set of mechanisms using on the existing network, which can use user’s identifications, the net types, and the network equipment security comprehensively into providing the flexible delegated strategy for users, also taking the user operating records into ACS server. So as to the management of network safety by setting configuration password and using RADIUS or TACACS+server, besides these it is necessary to turn on the router managing users essential protocols. And the safety IP sub-net is sure to visit and record acting. The purpose in paper is blending the certification into campus security network management, to identify and manage different users for award corresponding permissions, then makes campuses network much more Systematic and safe.
662
Abstract: Mobility Model has drawn more and more attentions since its critical role in Mobile Wireless Networks performance evaluation. In the simulation of the mobile scenario using mobility models, the distribution of the node’s location will converge to the stationary distribution after a long time running. Random Waypoint with Base Point (RWPBP) mobility model proposed in [1] aims to model the movement characteristics in catastrophe rescue scenario. In this paper, we study the Node Spatial Distribution of the RWPBP mobility model using simulation to estimate the convergence time. The simulation results show that, when we use the two dimensional RWPBP mobility model for simulation, the results of more than 21000 seconds of the initial simulation time should be discarded to guarantee the stationary distribution.
667
Abstract: In the current wireless network technology, the most important research is Ad-hoc, and the most promising is the WSN. Ad-hoc which develops on the basis of packet radio network is a wireless mobile network with self-organizing, peer to peer and multi-hop. WSN combines Ad-hoc and sensor technology to collaboratively perceive, collect and process the message of sensing objects in the coverage area of network, and send to the viewer.
671
Abstract: Mobility models are drawing increasing attention since it plays an indispensable role in delay tolerant networks performance evaluation (e.g., routing performance evaluation). Random Waypoint with Base Point (RWPBP) mobility model aims to model the movement characteristics in catastrophe rescue scenario. RWPBP mobility model can represent different movement styles according to different parameters. In this paper, we consider the traffic scenario that all the data generated by the nodes need to be sent to the base point, and evaluate the performance of the five DTN routing protocols (i.e., DirectDelivery, Epidemic, PROPHET, SpayAndWait and FirstContact) under the RWPBP mobility model with different parameters. Epidemic performs best in our experiment, since the traffic is not heavy in catastrophe rescue scenario.
676
Abstract: The thesis firstly analyzes challenges and opportunities of mobile internet: the business model will be subverted; the core business will be alternated and the value of network resource will be lowered. In addition to that, operators can enhance pipeline intelligence and rebuild the correlation of traffic growth and revenue growth. Secondly the thesis gives the advice of enhancing network capabilities and improving the value of pipeline. Operators should vigorously develop the network resource, enhance core competitiveness and create core values. Thirdly, operators can create content and applications platform: To establish mobile SNS platform, which will become the most important type of business, because it has more accurate simulation of social relations. To develop App Store, which is of strategic significance to china operators, because the new software applications can reach consumers in the fastest pace To develop new network communications and explore innovative services such as voice messaging, video calls and so on
680
Abstract: We propose an optimization approach to EoS (Ethernet over SDH) buffer control which the objective is to dynamically adjust the EoS buffer management registers. We will present the improved model of the traffic buffer management based on embedded MCU to control the SDRAM of the EoS chip, and setup the end-to-end system to illustrate the feasibility and advantage of the solution in buffer management when the data transport rate suddenly exceed the bandwidth of Ethernet port.
684
Abstract: This paper describes the use of VMM, Verification IP, and several of the new VMM Applications to quickly develop a verification environment for an AHB-Based system. VIP such as Synopsys DesignWare AHB Master and Monitor transactors enabled generation of valid transaction and ensured AHB protocol compliance. VMM sub-environment were used to encapsulate these components and simplify their reuse in higher level test environment.
688