New Publications are available for Computer communications
http://dl-live.theiet.org
New Publications are available now online for this publication.
Please follow the links to view the publication.Development of IEC 61850 based feeder IEDs for self-healing operation in distribution network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0801
Recently, in the context of smart grid, the usage of the I EC61850 communication standard gets broader and broader. Though IEC61850 has been used as communication standard for substation automation, the scope that it is applied becomes wider and wider into area of distributed energy resources including storages, communication between substation and control center, feeder automation and EV charging for smart consumers. In the flow of this IEC61850, KEPCO are carrying out the development of Smart Distribution Management System, and as a part of this R&D project, IEC61850 based Feeder IEDs of distribution switchgear is being developed. In this paper, IEC61850 based data model, software & hardware architecture of Feeder IEDs are presented. In addition, protection coordination and service restoration scheme by using peer to peer communication among FIEDs are also presented for self healing operation of distribution network. (4 pages)An Enterprise Service Bus (ESB) and Google gadgets based micro-injection moulding process monitoring system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0584
Wireless Sensor Networks (WSN) have been used in various industrial monitoring applications, with the latest trend being their integration and that of other devices into the “Internet of Things (IoT)” vision in which millions of devices will be interconnected online. One industrial environment which still has not had much exposure to WSNs and the IoT is the plastics industry environment particularly Injection Moulding (IM), Micro Injection Moulding (μIM) and Extrusion. In this paper a novel approach is presented for monitoring a typical plastics industry environment based on three major technologies: WSN, Service Orientated Architecture (SOA) and Google Gadgets (GG). This is applied to a heterogeneous network of WSN nodes and National Instruments (NI) high speed data acquisition (DAQ) devices. The SOA (De-facto solution in Enterprise-IT systems) enables IT resources like specific departmental applications, business partners, business processes, systems to be accessed as a service hence allowing seamless interoperability. Here we describe; architectural design, system integration and user interfaces for a prototype system developed for the Centre for Polymer Micro and Nano Technology (MNT) at the University of Bradford which makes use of the WSO2 Carbon Platform's Enterprise Service Bus (ESB) and the GG API. (6 pages)Wideband HF over-the-air test results for ARQ and networking applications
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0384
This paper begins with a brief overview of HF data transport requirements leading to waveform design and interoperability considerations for the expanded bandwidths provided with MIL-STD-188-110C Appendix D Wideband HF (WBHF). Over-the-air (OTA) performance test results of the WBHF suite of data waveforms, focusing upon shorter data bursts used in Automatic Repeat-Request (ARQ) and networking applications. Test results described in this paper are restricted to WBHF data links using the shorter interleaver options, short and ultra-short. The paper reviews HF Internet Protocol (HFIP) and Subnet Relay performance over links between different geographical locations and varying power amplifier (PA) average output power levels. Finally, the paper outlines the challenges of multi-node networking over HF sky-wave links and recommendations for optimizing multi-node sky-wave network performance when all nodes cannot utilize a single HF frequency due to geographically diverse locations. (5 pages)Optimizations for efficient and transparent use of IP applications over HF links
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0372
This paper describes the architecture of an IP Gateway system implementing various enhancements to enable efficient and transparent use of standard multimedia and data IPv6 applications over strongly varying and bandwidth-limited wireless links such as HF radio. Three optimizations are proposed : (a) an HF-oriented Performance Enhancing Proxy (PEP) to improve the Quality of Service (QoS) of TCP/IP applications (b) Robust Header Compression (RoHC) of headers and (c) Joint Quality of Service and retransmissions management. Performance results obtained in real HF conditions are also presented in this article. (5 pages)Performance triangle in digital substation architectures
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0067
In the traditional domain of teleprotection signalling, there is a recognised triangle of performance. This triangle depends upon the required speed of communication, the expected dependability of the command, and the security of receipt. These three aspects are interlinked, and the correct balance of each is required in order to offer the traditional functionality such as permissive signalling, blocking and intertripping schemes.This paper relates the traditional concepts to the application of automation schemes within digital substations. In this manner, it is anticipated that protection engineers can relate today's Ethernet technology by analogy with equivalent trusted practices. Firstly, the paper discusses aspects of speed, particularly in terms of the response required in message-based schemes, and the methods by which integrators can achieve accurate time-synchronising. Secondly, achieving adequate dependability by means of redundancy, and appropriate architectures is treated. Thirdly, security is covered, including aspects of cybersecurity and settings/configuration management. (6 pages)Modification of in-service substation based on IEC 61850
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0050
The standard IEC 61850 contributes the manufacturers and the end users. But it also makes many obstacles to the modification of the conventional substation. This paper presents a scheme which modifies an in-service conventional substation gradually to a modern substation which conforms to IEC 61850 standards. The procedure of the modification is divided into three stages. During the first stage, all the preparations have been finished. All the configurations and joint tests have been done before shipment. The secondary stage is to construct the substation network. New Human Machine Interface (HMI) and communication gateway will replace the old ones. They simultaneously support protocol of the existing system and IEC 61850 standards. The third stage is the modification of the bay level devices. The old cabinets and the cables out of the cabinets are kept. The inner IEDs are replaced. The connections between the IEDs and the cabinets also need to be re-arranged. The modification of bay can be done one by one according to the overhaul plan. The process is stable and secure, and it won't affect the normal operation of the substation. (5 pages)Performance evaluation of current differential relays over a wide area network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0060
Progress in the development of communication network technology continues apace and Ethernet technology, once limited to local area network applications, is increasingly being considered for use as the backbone technology for wide area communication networks. The technology, most commonly referred to as “Carrier Ethernet”, seems likely to become the dominant technology within wide area networks ultimately replacing earlier generation networks based upon PDH and SDH / SONET platforms. The availability of Carrier Ethernet and in particular, in terms of the testing described here, IP/MPLS-based Carrier Ethernet now enables us to consider the application of Ethernet technology to teleprotection. (6 pages)Communication networks for domestic photovoltaic based microgrid protection
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0007
Domestic photovoltaic (PV) based microgrid refers to a distributed group of small solar PV systems installed at each household in a residential area. The distributed systems may be integrated to form a meshed microgrid structure which can operate in both islanded and grid-connected modes. Grid-connected microgrids of domestic solar PV systems can supplement energy needs of homeowners. They are a potentially viable option for implementing demand side management programs for curbing peak demand. Nevertheless, PV based microgrids like other microgrid technologies are notorious of destabilising the national grid when running in grid-connected mode. They introduce current transient problems, voltage and frequency mismatch, etc. Hence solid control and protection scheme is necessary. The backbone of any control and protection scheme is a communication network. Thus the principal aim of this paper is to investigate feasibility of using wireless fidelity (Wi-Fi) for a metropolitan area network (MAN) of intelligent electronic devices (IEDs) used in meshed network architecture of a microgrid. Supervisory control and data acquisition applications were traditionally based on power-line carrier (PLC) networks. Due to the meshed structure of the proposed network, this approach would dearly complicate the network as devices such as signal traps and PLC modules would need to be installed on the many buses of the network. Thus a wireless network such as Wi-Fi is a flexible and simpler solution. As an added advantage, Wi-Fi will allow fault location identification through use of triangulation methods. However, issues such as security and interference proneness of the Wi-Fi protocol need to be considered. (6 pages)Design and operation of the IEC61850 9-2 process bus used for the protection system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0058
The digital substation and the implementation of IEC61850 are fundamental to the future of protection relays. The IBC61850 standard, "Communication Networks and Systems in Substation", provides the basis for the communication system for the digital sub-station's protection and control schemes. Section 9-2 defines the Ethernet based communication network providing data transfer between primary equipment and bay level IEDs, the process bus. This paper describes the background for the choice of bus architecture for the process bus for use in an EHV transmission sub-station. It reports on the results of performance tests on a feeder protection scheme using both an IEC 61850 and a conventional relay. Further tests have examined the performance of the IEC 61850 relay when the data transfer traffic on the process bus exceeds its capability and data packets are therefore lost. (6 pages)Recent developments in standards and industry solutions for cyber security and secure remote access to electrical substations
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0064
This paper discusses real world examples of utility initiatives to address the issue of substation cyber security in the context of both industry best practices and the global standards organizations seeking to provide a blueprint for security implantation. The authors provide an overview of existing technologies for securing IP and Ethernet communications networks and end devices. One of the aspects helping secure access to utility networks are centralized secure access management systems that facilitate authentication and authorization of users and devices while increasing productivity by reducing manually repetitive tasks. A commercial implementation of such a system is described. The authors also provide a brief overview of the latest industry efforts in standardization and describe selected focus groups, initiatives and institutions that are developing cyber security guidance for the electric power industry. Finally the authors describe practical experience from deploying a secure remote access management system at a large transmission utility in the United Kingdom. Key challenges, issues and experience from system design and implementation are presented. (8 pages)Migration paths for IEC 61850 substation communication networks towards superb redundancy based on hybrid PRP and HSR topologies
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0055
This paper provides an overview of recent developments in high availability networks and new redundancy protocols designed to guarantee seamless failover and proper functioning of the most critical substation automation applications such as tripping via GOOSE (Generic Object Oriented Substation Event) messages and IEC 61850 Process Bus based on switched Ethernet. The authors describe most common redundancy methods such as Rapid Spanning Tree Protocol and the latest redundancy protocols such as PRP (Parallel Redundancy Protocol) and HSR (High Availability Seamless Redundancy). In addition the authors elaborate on possible migration strategies of existing networks, provide a vision of hybrid PRP-HSR networks for HV (High Voltage) and EHV (Extra High Voltage) installations and propose HSR as a switch redundancy solution for future replacement of RSTP. (6 pages)Improving real time video surveillance performance using inter-frame retransmission
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0102
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are common transport layer protocols used in the IP based networks. However, both protocols have disadvantages for wireless video transmission. TCP yields high delay, while UDP experiences high packet loss. Lost packet retransmission is one of the solutions in video transmission to enhance video quality. This paper proposes inter-frame retransmission method to enhance the performance of video surveillance over WiMAX. The method outperforms the existing retransmission protocols. (5 pages)The potential of Internet of Things (IOT) for assisted living applications
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0040
Presents a collection of slides covering the following topics: m-IOT; healthcare IT; medicine; mobile healthcare; Long Term Evolution; 4G health; m-health; Internet of things; RFID; protocol; WSN; AAL systems; diabetes management system; cellular phone; assisted living; wireless medical sensors; ulPv6 and 6LoWPAN. (40 pages)A study on network intrusion detection and prevention system current status and challenging issues
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0075
A network based Intrusion Prevention System sits in-line on the network, monitoring the incoming packets based on certain prescribed rules and if any bad traffic is detected, the same is dropped in real-time. A signature based detection system was developed to perform TCP port scans, Trace route scan, ping scan and packet sniffing to monitor network. This paper is going to enhance the signature based system to monitor network traffic, creation of per-flow packet traces and adaptive learning of intrusion. The existing Hawkeye solutions are used for the network intrusion detection and prevention system. In this paper we have proposed new model which will combine the three technique such as Adaptive weighted sampling algorithm, packet count flow classifier and Adaptive learning algorithms to the existing system.Trends and issues in community telecare in the United Kingdom
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0031
With an increasing elderly population putting a strain on the cost of care, and the social, health and cost benefits of using community social care and telecare services, telecare is experiencing growth. This paper discusses trends in demand for telecare and issues with service provision and mainstreaming services and evaluates access, service reliability, the market, standards, interoperability and technology developments. (5 pages)Interoperability and standardisation in community telecare: a review
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0027
Interoperability and standardisation issues in community telecare differ from those pertaining to telemedicine and are examined with reference to older persons care. Issues discussed include devices, network transition, data characterisation, communication, data exchange, presentation, standards, protocols and certification (including IEEE 1107, ZigBee health Care, paSOS and the Continua Alliance). Standard requirements are reviewed and recommendations made, and FuTuRE, an open source telecare framework, is proposed. (6 pages)Performance analysis of coded-OFDM with ICI due to frequency offset
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0049
In wireless communication, parallel transmission of symbols using multi carriers is applied to achieve high efficiency in terms of throughput and better transmission quality. Orthogonal Frequency Division Multiplexing (OFDM) is one of the techniques for parallel transmission, hi multipath environment the performance of orthogonal frequency division multiplexing (OFDM) is improved by introducing some kind of channel coding. Coded OFDM (COFDM) is the new candidate for application such as DAB and DVB-T due to its better performance in fading environment. However due to lack of synchronization in transmitter and receiver, there may be a offset in transmitted and receiver frequencies which leads to degradation of orthogonality between transmit and receive pulse. Frequency offset causes inter carrier interference (ICI). In this paper our aim is to evaluate the performance of COFDM system in presence of frequency offset. COFDM is generated as per IEEE 802.11a specifications and Reed Solomon (RS) codes along with convolution codes are used for channel coding purpose. Channel used for consideration is AWGN. The performance is evaluated m terms of ICI value and BER.DEEPAV2: A DNS monitor tool for prevention of public IP DNS rebinding attack
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0054
Domain Name Systems (DNS) play a vital role in the proper functioning of the internet Almost all internet applications rely on DNS for the name resolutions. The existing DNS infrastructure has a number of security vulnerabilities and it is prone to attacks such as DNS Cache Poisoning attack, DNS Rebinding attack. Flooding attack, etc. If a DNS server is compromised, it affects all the users of the internet, resulting in adverse effect In this paper the focus has been on the prevention of DNS Rebinding attack. The solution for detecting and preventing DNS rebinding attack has been incorporated into DEEP A1. The extended DEEPA, viz., DEEPAV2 tool, containing the enhanced packet analyzer, the traffic differentiator, and enhanced packet filter modules, detects and differentiates the abnormal group of activities in the DNS traffic caused by the public IP DNS rebinding attack which is the combination of classical DNS rebinding attack and Anti-DNS pinning attack. The DEEPAV2 effectively filters the DNS rebinding attack packets by deeply analyzing the DNS packets. As the DNS rebinding attack is prevented, the subsequent attacks such as pharming, phishing, click frauds, email spamming, etc., could be prevented.Internet of M-health Things 'm-IOT'
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0036
Internet of Things (IoT) is a new and evolving concept that provides connectivity to the Internet via sensing devices to achieve intelligent identification and management in a heterogeneous connectivity environment. From the assisted living perspective, this emerging concept will enable new communication connectivity routes between elderly disabled patient and care services through innovative networking architectures in AAL environments. M-health is defined as "mobile computing, medical sensor, and communications technologies for health care" [1]. This evolutionary concept provides both mobility and 'always connected' functionalities for different healthcare applications. In this paper we introduce a new amalgamated concept of Internet of m-health Things (m-IoT). m-IoT is a new concept that matches the functionalities of m-health and IoT for a new and innovative future (4G health) applications. In principle m-IoT introduce a new healthcare connectivity paradigm that interconnects IP-based communication technologies such as 6LoWPAN with emerging 4G networks for future Internet based healthcare services. In this paper we will present a general m-IoT architecture based on 6LoWPAN technology for measurement of body temperature as an example for healthcare application. (3 pages)Implementation of Internet browsing on set top box using ARM-LINUX
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0084
There is a need to integrate Internet browsing feature on Set Top Box (STB) as an additional feature to provide value to interactive television services. Even though there are ways to perform such a task, but providing a good design with a capable processor and operating system which are capable of handling more present and futuristic with cost effective looks to be challenging. ARM core processors and Linux operating system (OS) may be employed in implementation of interactive television. ARM is one of the most licensed and thus widespread processor cores in the world and used especially in portable devices due to low power consumption and reasonable performance (MIPS / watt) and Linux is an open source operating system with good flexibility and secured file system. Present paper presents an implementation of Internet browsing embedded in STB using ARM processors and Linux OS.Pro-active energy management for Wide Area Networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0682
We present a methodology for achieving energy savings in excess of 30% in Wide Area Networks. The approach applies a limited set of pre-calculated network topology configurations derived via a Genetic Algorithm across the day. The GA determines the minimum set of resources required in order to support a given traffic demand. Information gleaned from SNMP trap messages, triggered by the use of a link utilization threshold, determine when to switch between configurations. The threshold employs moving average smoothing and is discretely readjusted over the course of a daily cycle based on anticipated basal load variations. By exploiting MT-OSPF this approach provides a scalable and flexible means of reconfiguring an infrastructure that avoids routing discontinuities, excessive computational effort and the exchange of considerable volumes of control information.Integration of IOT with smart grid
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0763
In this paper, we studied the basic requirements of the smart grid. By applying Internet of Things (IoT) technologies, various intelligent services can be created. The development of most aspects of the smart grid would be enhanced by the applying IoT. Three-layer architecture of IoT for the smart grid in China is proposed. Various information and communication techniques of IoT applied on smart grid are discussed. Particularly, the IoT application solutions are provided in detail for power transmission line monitoring, smart patrol, smart home and electric vehicle management.The measurement of universal network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1436
The network measurement is an effective way to understand and acquaint the performance and the operational state of the network. We present some methods to measure the identifier mapping, mobility and security of the Universal Network that some important characteristics are the separation of identifier and locator, authentication, and so on. In identifier mapping measurement, we propose a new indictor named mapping rate, which weighs the mapping ability of ASR. We build up three topologies for these aspects of Universal Network. Our measurement results indicate that comparing with the directly routing and forwarding of traditional network, the optimized performance of mobility and security could make up the defects of mapping in Universal Network.Traffic localization for video service on intelligent optical network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0722
The demand for high-quality video has been posing remarkable new challenges on achieving efficiency and fair utilization of network resources. High-quality IPTV and VoD has high-bandwidth requirements. Another trend is the popularity of p2p systems and it could severely strain broadband networks. In particular, without the ability to explicitly communicate with network providers, P2P applications mainly depend on inefficient network inference and network- oblivious peering, leading to potential inefficiencies for both P2P applications and network providers. In this paper, we propose a multi-domain resource management for super high-definition video delivery service which can effectively reduce the backbone network traffic. The Resource scheduling mechanism is discussed. The reduction of network traffic is measured.Moderate prefetching strategy based on video slicing mechanism for P2P VoD streaming system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1006
In peer-to-peer video-on-demand (VoD) streaming systems, each peer contributes a fixed amount of hard disk storage (usually 2GB) to store viewed videos and then uploads them to requesting peers. However, the daily hits (namely popularity) of different segments of the same video is highly diverse, which means that taking the whole video as the basic storage unit may lead to redundancy of unpopular segment replicas and scarcity of popular segment replicas in the P2P network. To address this issue, we propose a video slicing mechanism (VSM) where the whole video is sliced into small blocks (20 MB, for instance). Under VSM, peers can moderately remove unpopular blocks from and accordingly add popular blocks into their contributed hard disk storage, which increases the usage of peers' storage space. To reasonably assign bandwidth among peers with different download capacity, we propose a moderate prefetching strategy (MPS) based on VSM. Under MPS, when the amount of prefetched content reaches the predefined threshold, peers immediately stop prefetching content and then release bandwidth for other peers. We apply the MPS to PPLive VoD system and measurement results demonstrate that low server load and perfect user satisfaction can be achieved.A brief introduction to IoT gateway
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0740
Internet of Things (IoT) attracts many attentions recently and paints a beautiful picture of future life for us. This paper firstly introduces three typical networks residing in sensing domain, one of three domains of IoT architecture. Then the common features of IoT gateway, an important component bridging sensing domain and network domain, are summarized in three points, finally a reference model of IoT gateway is proposed.A privacy enhanced DNS scheme for the Internet of Things
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0758
In the environment of Internet of Things (IoT), smart devices' privacy protection is a significant issue in several security problems. When a static domain name was assigned to a specified IoT terminal smart device, the risk of the existing privacy will be raised. In this article we proposed a privacy protection enhanced DNS scheme for smart devices, which can authenticate the original user's identity, reject illegal access to the smart device. The scheme is compatible with widely used DNS and DNSSEC protocol.Resource search optimization of P2P based on ISP and resource character
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0725
Although the exited unstructured P2P resource search algorithm can enhance the performance of resource searching, but it will generate lot of P2P traffic and will consume a huge network bandwidth. Consider the messages of Internet service provider (ISP) and the clustering of P2P networks, the article proposed an on-demand resource search algorithm which based on the ISP and the similarity of resource character. In process of searching resource, the algorithm first selects the nodes which are in the same ISP and the character similarity of which and search message are greater than a certain threshold to forward searching message, so traffic is controlled in a same ISP network maximized, thus the load of the backbone network and network egress is reduced. Simultaneously, make on-demand search in the searching process according to the numbers of user-needed resources. Experimental results show that the algorithm can effectively improve the performance of resource search and reduce the consumption of bandwidth.A presentation deadline-based cross-layer design for IPTV services over wireless networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1078
Recently, IPTV services over Internet and wireless networks have been increasing rapidly. Hence, in this paper we introduce a presentation deadline-based cross-layer design for improving the QoS of IPTV services over wireless networks. Our cross-layer design uses the presentation timestamp in the RTP packet header to derive a presentation deadline for each MAC frame. In our design, the wireless Access Point (AP) uses the presentation deadline and the number of retrys to determine whether a MAC frame can be sent or not. Moreover, the MAC fragment size can adapt to the wireless channel conditions. Numerical results demonstrate that the proposed cross-layer design can avoid a waste of wireless channel resources on serving useless MAC frames which will be dropped at the receiver due to missing their presentation deadlines. In addition, the proposed cross-layer design can achieve a lower lateness loss rate and a better application layer goodput for IPTV services. (5 pages)Research on competitive advantage mechanism of the mobile internet ecosystem
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0710
The industry convergence of mobile networks and the Internet produces the mobile Internet. The form of mobile Internet competition has changed, which is no longer a competition between individual enterprises, but a competition between the business ecosystems. This paper builds the competitive advantage model of mobile Internet ecosystem based on the user needs. Then we, using this model, analyze the three major mobile Internet ecosystems: terminal operators, service providers and network operators. We also believe that value innovation is the specific means to achieve system competitive advantage. At last we build a set of evaluation index system of system competitive advantage, and evaluate the three major ecosystems.Mapping the virtual networks with stochastic bandwidth resource request in multi-datacenters
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1464
Network virtualization allows the design of multiple diverse virtual overlay network architectures over a common physical infrastructure. A key issue in designing such virtual networks (VN) is the mapping of the VN onto the underlying substrate network. Accordingly, many research works have focused on the VN mapping problem. However, these works only consider the case where the VNs require deterministic amount of network resources. Some other works even deal with the dynamic resource demand by using over provisioning, which is simple but inefficient. In this paper, we investigate the online stochastic VN mapping (StoVNM) problem in multi-datacenters, in which the VN requests follow a Poisson distribution and the associate VN bandwidth demands follow a Normal distribution. We formulate the StoVNM problem as an optimization problem with the objective of minimizing mapping cost and load-balancing. Since the VN mapping problem is NP-hard we devise a sliding window technique based on heuristic algorithm w-StoVNM for tackling this NP-hard problem efficiently. Through extensive simulations we demonstrate the effectiveness of the proposed approach compared to traditional VN mapping solutions in terms of VN mapping cost, blocking ratio and total net revenue in the long term.Developing a disaster surveillance system based on wireless sensor network and cloud platform
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0770
Typically, today's WSN disaster surveillance system operates poorly in its accuracy and timeliness and can only detect a single type of disasters. This owes largely to the congestion brought about by excessive communication traffic and the processing limitation of the server which dramatically restrict the development of disaster surveillance systems. In order to solve these problems, this paper proposes a new scheme in improving the traditional disaster surveillance systems. At the data collection and transmission layer, orthogonal neural network algorithm, which is based on the wavelet transform, is introduced to promote the surveillance accuracy and reduce the network congestion. At the data storage and computing layer, cloud storage and distributed parallel computing are used to overcome the limitation of the previous storage and computation. At last, the paper gives the concrete implementation plan and verifies the superiority of the system.Distributed PMIPv6 based on the prefix aggregation
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1434
IETF has proposed a promising network-based mobility management method, called Proxy Mobile IPv6 (PMIPv6), which does not require any participation of mobile hosts in mobility-related signaling. However, it remains an open issue how to deploy the PMIPv6 while keeping optimized path route and low signaling costs. In this paper, we propose a Distributed PMIPv6 scheme based on the Prefix Aggregation, namely DPPA. In DPPA, all the LMAs in the extended home network are connected to each other via the global tunnel and announce their aggregated prefix to the Internet. Besides, by using the IP anycast routing, the signaling messages and data packets destined to any IP address that belongs to the aggregated prefix can be transmitted to the topologically closest LMA. Our analysis results show that DPPA has a more optimized path and lower location update cost and packet transmission cost when compared to PMIPv6.Adaptive multiple level mobility anchor point selection scheme in HMIPv6
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0945
Hierarchical Mobile IPv6 (HMIPv6) introduces a mobility anchor point (MAP) that localizes the signaling traffic and hence reduces the handoff latency. In addition to processing binding update messages from mobile nodes (MNs) on behalf of MNs' home agents (HAs), the MAP performs data traffic tunneling destined to or originated from MNs, both of which will burden the MAP substantially as the network size grow s. To provide scalable and robust mobile Internet services to a large number of visiting MNs, multiple MAPs will be deployed. In such an environment, how to select an appropriate MAP has a vital effect on the overall network performance. In this paper, we propose the adaptive multiple level MAP selection scheme in the form of binary tree structure. Then, we give the optimal threshold value calculation formula based on the total communication cost, which is used to select the MAP for MN. We compare its performance quantitatively in terms of signaling overhead. It can be shown that the adaptive multiple level MAP selection scheme is better than the furthest and the nearest MAP selection schemes in some area, since this scheme can be used to select the serving MAP depending on the MN's mobility and session activity. In addition, this MAP selection scheme is insensitive to the lower threshold value offseting.Coverage and networking analysis of TD-LTE system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0704
The development of mobile Internet and Internet of Things sharply increases needs of bandwidth and rate of mobile network. That demand for mobile data is motivating operators to pursue 4G solutions like TD-LTE to maintain the competitive edge. This paper analyzed coverage of TD-LTE system and further compared its performance with FDD LTE, studied the feasibility of intra frequency networking of TD-LTE system. At last, the paper provides suggestions on networking of TD-LTE system.QoS adaptive framework for WiMAX broadband wireless access networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0494
Broadband Wireless Access (BWA) offers effective, economic and secure high-speed wireless communications solutions to Telecom service providers, Internet services provider, Governments, Institutes, Healthcare, and Enterprises. The demand is not only from operators rolling our new networks; there is a growing need for more broadband capacity within mature networks, which cannot easily be met with an existing systems. Broadband Wireless Access brings out voice and high speed data services to every user within the range of base station. The broad-based acceptance of the Broadband Wireless Access technology is due to huge benefits it offers in terms of fast, easy and cost effective deployment. This is a complex task in the heterogeneous Next Generation Wireless environments, and hence, diverse Quality of Service (QoS) requirements of different applications that these systems support. Therefore, QoS provisioning is crucial for the success of such wireless access systems. In this work, a novel downlink packet scheduling scheme for QoS provisioning in B WASs is proposed and experimented.Design of a distributed network address translation system architecture
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1458
Network Address Translation (NAT) is a widely used important technology to mitigate the shortage problem of IPv4 addresses in Internet nowadays. However, the performance bottleneck caused by NAT's traditional client-server structure brings the problem of low reliability. In this paper, we proposed a novel Distributed Network Address Translation (DNAT) system. DNAT designs a cooperation mechanism of multiple NAT systems through three layers architecture to improve the network access ability and reliability. The main function unit in each layer enhances the performance of NAT system for large number of network access request. DNAT outperforms traditional NAT system in reliability and expansibility.Design of WAP based application for mobile security
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0443
This paper discusses how secure is your data in the mobile and the steps that can be taken to make it secure to a certain level. The major theme running through this paper is Mobile system security/ privacy. There are many Well-known problems here, particularly in Ubiquitous/pervasive/ad-hoc, computing scenarios.Simulation study of buffering mechanism in P2P live streaming system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1003
In pull-based peer-to-peer (P2P) live streaming systems, peers contribute a fixed amount of memory space to buffer the multimedia content downloaded from their neighbor peers; at the same time, the peers periodically notify neighbor peers of buffered content by exchanging buffer maps. However, the relationship between buffer size (BS) and buffer map exchange period (BMEP) is still not clearly revealed. Towards this issue, we develop a simulator to evaluate the impact of BS and BMEP on system performance, such as startup delay and playback fluency. It is observed that the system performance can be improved by increasing BS only when BS is in certain range; however, shortening the BMEP can continuously improve the system performance. Further, we compare the system performance of PPLive and PPStream in the flash crowd scenario by this simulator. Though these two systems have different BS and BMEP, the playback continuity of these two systems is almost the same but the startup delay of PPStream is much smaller than that of PPLive. Shortening BMEP is effective to improve system performance but causes much additional signaling overhead. Towards this issue, we introduce Run-Length Encoding to compress the buffer map and the compression ratio can be as high as 11:1. What we have done is benefit to not only the optimization but also the modeling of P2P live streaming protocols.Online traffic engineering by optimizing inbound traffic in locator/identifier separation context
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1495
To cope with the scalability issue of current Internet inter-domain routing system, several proposals addressing identifier and locator separation are proposed recently. LISP is one of them. In a LISP-capable network, when end-system identifier (EID) is not routable, a mapping system must map an EID to a routing locator (RLOC). By optimizing EID-RLOC Mapping Assignment (ERMA) for an AS, inbound traffic can be optimally distributed in the AS. In this paper, ERMA optimization problem is studied. We introduced an online ERMAO scheme based on delay information of probe packets. Simulation results show that online optimizing ERMA can achieve better network performance, e.g., lower packet delay and maximum link utilization.Identifier/locator separation: a worm detection and prevention perspective
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1417
Identifier/locator separation is widely recognized as a promising solution to the routing scalability issue of the Internet routing architecture. Although it is believed that networks with identifier/locator separation are more secure than networks without identifier/locator separation, identifier/locator separation cannot evade the damage of worms either. In this paper, we argue that identifier/locator separation can help detect and prevent worms by analyzing and evaluating the worm detection probability and the number of infected machines. The results show that the worm detection in networks with identifier/locator separation is easier than in networks without identifier/locator separation and identifier/locator separation is more resistive to worm propagation. To the best of our knowledge, this is the first attempt on understanding the worm detection and prevention in networks with identifier/locator separation.CIDMS: a security connection identifier mapping system for universal network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1435
The identifier split is a design principle for new Internet architectures such as Universal Network, Lisp, which make Internet more scalable, reliable and security. One important form of identifier split in Universal Network is connection identifier/access identifier (CID/AID) split which is introduced to improve security isolation during communication. Using CID/AID split, terminals communicate with each other without knowledge of the opponent's access identifier, so as to eliminate targeted attacks such as denial-of-service attack. This spit relies on a mapping system to resolve a flat connection identifier that identifies a session to one or several appropriate access identifiers in response to mapping requests for specific connection identifier. In this paper we present a secure CID/AID split mechanism and its corresponding mapping system: CIDMS. We also present simulations of mapping system's performance, evaluate its resolution delay and scalability.The design and implementation of VoIP flow monitoring system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1496
This paper mainly introduces the design and the function structure of VoIP Flow Monitoring System, providing a complete set of monitoring solution. Different with other system, in the process of design, the system focuses on the web based flow analysis module, and illustrates the solution aiming at monitoring and controlling flow. With plenty of search conditions, the web module is flex and users can find out their interested information easily. Finally, with the data in the present network, the system will display how it works on providing information and controlling VoIP flow.An identified transport layer mechanism in the locator/identifier separation context
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1418
The traditional network design puts little emphasis on security and management of the transport layer mechanisms. However, new applications requiring security such as on-line bank and on-line shopping emerge sharply. Besides, various new applications induce the problem of management for pricing, reliability and resource distribution. Hence, a secure and manageable transport layer mechanism is significant and urgent under these occasions. In this paper, we propose an identified transport layer mechanism (ITM) in the locator/identifier separation protocol (LISP) context. ITM employs mapping cache to manage the packet transmitting process and separates host identifiers from the port numbers in the transport layer. Based on this mechanism, we can achieve enhanced security and management of the network transport layer.Soft MIMO: A software radio implementation of 802.1 In based on Sora platform
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0981
MIMO has been widely used in many wireless communication systems. Due to the high computational and real time processing requirements, many MIMO systems are implemented in ASIC, FPGA and DSP. But they are fixed and cannot be easily modified or upgraded. To deliver a high performance programmable and flexible MIMO system, this paper presents a 2x2 MIMO system based on 802.11n. The system has implemented on multi-core CPU based software radio platform. With parallel processing, both the transmitter and receiver satisfy the real time processing requirements.A novel heuristic for overlay mapping with enhanced resilience and QoS
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0727
The problem of overlay mapping with enhanced resilience and QoS is NP-hard and previous heuristics are oblivious to substrate topology information and thus cannot provide effective protection. This is because diversity of the working and backup paths is essential to ensure resilience since a single link failure in the lower layer can result in failures of all the upper-layer links that go through it for applications involving multiple layers. In this paper, a novel and effective heuristic that considers the substrate network topology information is proposed. The effectiveness of the new heuristic is verified through extensive simulations. As confirmed by the evaluation, the proposed heuristic can ensure that physical paths are diversified though additional substrate nodes are involved in the overlay mapping solution. Moreover, the robustness of the proposed heuristic with incomplete substrate network information is also examined.The design and research of improved JFKi protocol based on mobile IPv6
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1428
IPv6 as the trend of next generation Internet has increasingly implemented in the mobile Internet. The security of mobile IPv6 has become the key factor of restricting its development. The Internet Protocol Security (IPsec) protocol protects the exchange information between the Mobile Node (MN) and Home Agent (HA) through establishing the security association (SA). However, the IKEvl as the popular security protocol has the defects not to adapt the mobile Internet such as low efficiency and poor reliability. The Just Fast Keying (JFK) protocol is composed of JFKi and JFKr, and they are very similar in many respects. In this paper, we propose an improved mobile JFKi protocol based on IPv6. We simplify the complex of JFKi to improve the efficiency of establishing SA so that it reduces the load of mobile devices and improve feasibility of JFKi. We propose a model of mobility application based on mobile IPv6 to ensure JFKi adapt the mobility application. Through simulation, we prove correctness of the approach proposed by us.Packet-delay invariance to scheduling under congestion
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0684
Class-of-Service enabled networking relies on non FIFO schedulers in order to achieve differentiated performance, e.g. delay, for different traffic classes. The delay performance of all stable packet schedulers is characterised by a Dominant Decay Rate (DDR) in the presence of bursty traffic. Poisson traffic only results in a "classical", or Short Buffer Decay Rate (SBDR) which is not the same as the DDR. This paper presents novel experimental results which indicate that, for widely different FIFO and non-FIFO schedulers, the low delay SBDRs are very dissimilar yet the DDRs are virtually identical. We also analytically predict the "knee-point" where the DDR takes over from the SBDR: this is the point at which schedulers become equivalent.A security enhanced network architecture for future networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1456
Security is one of the most urgent problems in today's Internet. For the lack of a clear definition of identifier of entity we seek to manage in the Internet, existing security mechanisms are not well integrated into the Internet architecture. These security mechanisms are designed as separate extensions and their effectiveness are limited. In this paper, we present a new network architecture, Security Enhanced Network Architecture (SENA), to provide a "built-in" security. In SENA, there are four identifiers, including service identifier, connection identifier, endpoint identifier and routing identifier. With a reinforced control plane, the architecture allows network administrators directly manage the mappings between different identifiers and provides security as an integrated solution.Adaptive initial ranging resource allocation algorithm in IEEE802.16 system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0977
In IEEE802.16 system, the initial ranging uses the random access mode. The standards [1] [2] define the size of initial ranging resource(IRR-size) as a fixed and large value, but the large size of ranging resource can cause the waste. To solve the above problem, this paper proposes an adaptive initial ranging resource allocation algorithm. It makes use of the trend of the ratio between the calculated number of the initial ranging triggering users(IRTU-num) and the actually allocated size of the initial ranging resource(AIRR-size) which are gained from the previous two frames to adaptively adjusts IRR-size in the next frame. By comparing with the fixed allocation algorithm, the simulation results verify the proposed algorithm can significantly improve the system performances at the aspects of the average success rate per ranging slot(AS), the average occupation rate per ranging slot(AO) and average access delay(AD). The simulation results math the theory analysis very well. The proposed algorithm can be put into practical application.