E-Book, Englisch, Band 26, 111 Seiten
Bond Communications and Networking in China
1. Auflage 2009
ISBN: 978-3-642-00205-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
1st International Business Conference, Chinacombiz 2008, Hangzhou China, August 2008, Revised Selected Papers
E-Book, Englisch, Band 26, 111 Seiten
Reihe: Communications in Computer and Information Science
ISBN: 978-3-642-00205-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the refereed proceedings of the 1st International Business Conference on Communications and Networking in China, ChinacomBiz 2008, held in Hongzu, China, in August 2008. The 11 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers address all current issues on transport networks and infrastructures, video distribution systems and methods and the associated software systems.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;5
2;Table of Contents;6
3;Undetectable Manipulation of CRC Checksums for Communication and Data Storage;7
3.1;1 Introduction;7
3.2;2 Functionality of CRC;8
3.3;3 Implementation of CRC;9
3.4;4 Modeling of Errors;10
3.5;5 Manipulation and Consistency Check;10
3.6;6 Manipulation and Consistent Identical Checksum;12
3.7;7 Example;13
3.8;8 Conclusions;15
3.9;References;15
4;Survey of PHY and LINK Layer Functions of Cognitive Radio Networks for Opportunistic Spectrum Sharing;16
4.1;1 Introduction;16
4.2;2 Definitions in the Context of Cognitive Radio Network;17
4.3;3 Overview of Physical and Link Layer Functions in Cognitive Radio Networks;17
4.4;4 Review of Physical Layer Functions;20
4.5;5 Review of Link Layer Functions;24
4.6;6 Conclusion;28
4.7;References;28
5;Optimizing TCP Performance over UMTS with Split TCP Proxy;31
5.1;1 Introduction;31
5.2;2 Overview of UMTS Network;32
5.3;3 Split TCP Proxy for UMTS;34
5.4;4 Simulation Settings;35
5.5;5 Simulation Results;37
5.6;6 Conclusion;40
5.7;References;40
6;Use of Photonic Networks in Digital Cinema Postproduction Dailies Workflow;42
6.1;1 Introduction;42
6.2;2 Demonstration Objective and Concept;43
6.3;3 Approach, Strategy and Basic Technology;43
6.4;4 Challenges and Results;44
6.5;5 Conclusions;45
7;Visualizing TCP/IP Network Flows to Control Congestion and Bottlenecks;46
7.1;1 Introduction;46
7.2;2 TCP/IP Networks and Existing Simulators;47
7.3;3 Innovative Features of VINS;48
7.4;4 Scenario 1: IP-Networking;48
7.5;5 Scenario 2: TCP Performance Evaluation;50
7.6;6 Conclusion;52
7.7;References;53
8;ZBMF: Zone Based Message Ferrying for Disruption Tolerant Networks;54
8.1;1 Introduction;54
8.2;2 Zone Based Message Ferrying;55
8.3;3 Evaluation;58
8.4;4 Zone Setup for ZBMF;63
8.5;5 Conclusion;64
8.6;6 Future Work;64
8.7;References;64
9;Improving Query Mechanisms for Unstructured Peer- to- Peer Networks;66
9.1;1 Introduction;66
9.2;2 Related Work;67
9.3;3 Problem Descriptions;68
9.4;4 Algorithm Design;68
9.5;5 Simulations and Performance Analysis;71
9.6;6 Conclusion and Future Work;72
9.7;References;73
10;Layer 3 Initialization Procedures Recommendation in Next Generation Heterogeneous Mobile Networks;74
10.1;1 Introduction;74
10.2;2 IEEE 802.11i Authentication and Handover Delay;76
10.3;3 Connection Procedures on IPV4 Networks;77
10.4;4 Connection Procedures on IPV6 Networks;79
10.5;5 Conclusion;80
10.6;References;81
11;Broadcast Data Scheduling in Wireless Environment;82
11.1;1 Introduction;82
11.2;2 Related Work;83
11.3;3 Preliminary;83
11.4;4 Designing Algorithms of MP+ P Scheduling;85
11.5;5 Simulation Results;87
11.6;6 Conclusion;88
11.7;References;89
12;Analysis on Imai-Shin’s LR-AKE Protocol for Wireless Network Security;90
12.1;1 Introduction;90
12.2;2 Review of Imai-Shin’s Protocol [1];91
12.3;3 Cryptanalysis of Imai-Shin’s Protocol;93
12.4;4 Conclusion;94
12.5;References;95
13;Surveys on the Intrusion Tolerance System;96
13.1;1 Introduction;96
13.2;2 Preliminaries;97
13.3;3 Intrusion Tolerance Mechanisms;98
13.4;4 Intrusion Tolerance Strategies;100
13.5;5 Some Example Systems;102
13.6;6 Conclusions;102
13.7;References;102
14;Study on the DS/CDMA-CSMA Multi-user Communication Systems;104
14.1;1 Introduction;104
14.2;2 DS/CDMA Time-Slot Nonpersistent CSMA Multi-user Random Access Model;105
14.3;3 Simulation and Analysis of DS/CDMA Time-Slot Nonpersistent CSMA Multi- user Communication Systems;108
14.4;4 Conclusions;110
14.5;References;110
15;Author Index;111




