New Publications are available for Other computer networks
http://dl-live.theiet.org
New Publications are available now online for this publication.
Please follow the links to view the publication.An Enterprise Service Bus (ESB) and Google gadgets based micro-injection moulding process monitoring system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0584
Wireless Sensor Networks (WSN) have been used in various industrial monitoring applications, with the latest trend being their integration and that of other devices into the “Internet of Things (IoT)” vision in which millions of devices will be interconnected online. One industrial environment which still has not had much exposure to WSNs and the IoT is the plastics industry environment particularly Injection Moulding (IM), Micro Injection Moulding (μIM) and Extrusion. In this paper a novel approach is presented for monitoring a typical plastics industry environment based on three major technologies: WSN, Service Orientated Architecture (SOA) and Google Gadgets (GG). This is applied to a heterogeneous network of WSN nodes and National Instruments (NI) high speed data acquisition (DAQ) devices. The SOA (De-facto solution in Enterprise-IT systems) enables IT resources like specific departmental applications, business partners, business processes, systems to be accessed as a service hence allowing seamless interoperability. Here we describe; architectural design, system integration and user interfaces for a prototype system developed for the Centre for Polymer Micro and Nano Technology (MNT) at the University of Bradford which makes use of the WSO2 Carbon Platform's Enterprise Service Bus (ESB) and the GG API. (6 pages)Performance evaluation of current differential relays over a wide area network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0060
Progress in the development of communication network technology continues apace and Ethernet technology, once limited to local area network applications, is increasingly being considered for use as the backbone technology for wide area communication networks. The technology, most commonly referred to as “Carrier Ethernet”, seems likely to become the dominant technology within wide area networks ultimately replacing earlier generation networks based upon PDH and SDH / SONET platforms. The availability of Carrier Ethernet and in particular, in terms of the testing described here, IP/MPLS-based Carrier Ethernet now enables us to consider the application of Ethernet technology to teleprotection. (6 pages)The potential of Internet of Things (IOT) for assisted living applications
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0040
Presents a collection of slides covering the following topics: m-IOT; healthcare IT; medicine; mobile healthcare; Long Term Evolution; 4G health; m-health; Internet of things; RFID; protocol; WSN; AAL systems; diabetes management system; cellular phone; assisted living; wireless medical sensors; ulPv6 and 6LoWPAN. (40 pages)DEEPAV2: A DNS monitor tool for prevention of public IP DNS rebinding attack
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0054
Domain Name Systems (DNS) play a vital role in the proper functioning of the internet Almost all internet applications rely on DNS for the name resolutions. The existing DNS infrastructure has a number of security vulnerabilities and it is prone to attacks such as DNS Cache Poisoning attack, DNS Rebinding attack. Flooding attack, etc. If a DNS server is compromised, it affects all the users of the internet, resulting in adverse effect In this paper the focus has been on the prevention of DNS Rebinding attack. The solution for detecting and preventing DNS rebinding attack has been incorporated into DEEP A1. The extended DEEPA, viz., DEEPAV2 tool, containing the enhanced packet analyzer, the traffic differentiator, and enhanced packet filter modules, detects and differentiates the abnormal group of activities in the DNS traffic caused by the public IP DNS rebinding attack which is the combination of classical DNS rebinding attack and Anti-DNS pinning attack. The DEEPAV2 effectively filters the DNS rebinding attack packets by deeply analyzing the DNS packets. As the DNS rebinding attack is prevented, the subsequent attacks such as pharming, phishing, click frauds, email spamming, etc., could be prevented.Pro-active energy management for Wide Area Networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0682
We present a methodology for achieving energy savings in excess of 30% in Wide Area Networks. The approach applies a limited set of pre-calculated network topology configurations derived via a Genetic Algorithm across the day. The GA determines the minimum set of resources required in order to support a given traffic demand. Information gleaned from SNMP trap messages, triggered by the use of a link utilization threshold, determine when to switch between configurations. The threshold employs moving average smoothing and is discretely readjusted over the course of a daily cycle based on anticipated basal load variations. By exploiting MT-OSPF this approach provides a scalable and flexible means of reconfiguring an infrastructure that avoids routing discontinuities, excessive computational effort and the exchange of considerable volumes of control information.A brief introduction to IoT gateway
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0740
Internet of Things (IoT) attracts many attentions recently and paints a beautiful picture of future life for us. This paper firstly introduces three typical networks residing in sensing domain, one of three domains of IoT architecture. Then the common features of IoT gateway, an important component bridging sensing domain and network domain, are summarized in three points, finally a reference model of IoT gateway is proposed.A privacy enhanced DNS scheme for the Internet of Things
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0758
In the environment of Internet of Things (IoT), smart devices' privacy protection is a significant issue in several security problems. When a static domain name was assigned to a specified IoT terminal smart device, the risk of the existing privacy will be raised. In this article we proposed a privacy protection enhanced DNS scheme for smart devices, which can authenticate the original user's identity, reject illegal access to the smart device. The scheme is compatible with widely used DNS and DNSSEC protocol.Resource search optimization of P2P based on ISP and resource character
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0725
Although the exited unstructured P2P resource search algorithm can enhance the performance of resource searching, but it will generate lot of P2P traffic and will consume a huge network bandwidth. Consider the messages of Internet service provider (ISP) and the clustering of P2P networks, the article proposed an on-demand resource search algorithm which based on the ISP and the similarity of resource character. In process of searching resource, the algorithm first selects the nodes which are in the same ISP and the character similarity of which and search message are greater than a certain threshold to forward searching message, so traffic is controlled in a same ISP network maximized, thus the load of the backbone network and network egress is reduced. Simultaneously, make on-demand search in the searching process according to the numbers of user-needed resources. Experimental results show that the algorithm can effectively improve the performance of resource search and reduce the consumption of bandwidth.A presentation deadline-based cross-layer design for IPTV services over wireless networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1078
Recently, IPTV services over Internet and wireless networks have been increasing rapidly. Hence, in this paper we introduce a presentation deadline-based cross-layer design for improving the QoS of IPTV services over wireless networks. Our cross-layer design uses the presentation timestamp in the RTP packet header to derive a presentation deadline for each MAC frame. In our design, the wireless Access Point (AP) uses the presentation deadline and the number of retrys to determine whether a MAC frame can be sent or not. Moreover, the MAC fragment size can adapt to the wireless channel conditions. Numerical results demonstrate that the proposed cross-layer design can avoid a waste of wireless channel resources on serving useless MAC frames which will be dropped at the receiver due to missing their presentation deadlines. In addition, the proposed cross-layer design can achieve a lower lateness loss rate and a better application layer goodput for IPTV services. (5 pages)Research on competitive advantage mechanism of the mobile internet ecosystem
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0710
The industry convergence of mobile networks and the Internet produces the mobile Internet. The form of mobile Internet competition has changed, which is no longer a competition between individual enterprises, but a competition between the business ecosystems. This paper builds the competitive advantage model of mobile Internet ecosystem based on the user needs. Then we, using this model, analyze the three major mobile Internet ecosystems: terminal operators, service providers and network operators. We also believe that value innovation is the specific means to achieve system competitive advantage. At last we build a set of evaluation index system of system competitive advantage, and evaluate the three major ecosystems.Developing a disaster surveillance system based on wireless sensor network and cloud platform
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0770
Typically, today's WSN disaster surveillance system operates poorly in its accuracy and timeliness and can only detect a single type of disasters. This owes largely to the congestion brought about by excessive communication traffic and the processing limitation of the server which dramatically restrict the development of disaster surveillance systems. In order to solve these problems, this paper proposes a new scheme in improving the traditional disaster surveillance systems. At the data collection and transmission layer, orthogonal neural network algorithm, which is based on the wavelet transform, is introduced to promote the surveillance accuracy and reduce the network congestion. At the data storage and computing layer, cloud storage and distributed parallel computing are used to overcome the limitation of the previous storage and computation. At last, the paper gives the concrete implementation plan and verifies the superiority of the system.Distributed PMIPv6 based on the prefix aggregation
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1434
IETF has proposed a promising network-based mobility management method, called Proxy Mobile IPv6 (PMIPv6), which does not require any participation of mobile hosts in mobility-related signaling. However, it remains an open issue how to deploy the PMIPv6 while keeping optimized path route and low signaling costs. In this paper, we propose a Distributed PMIPv6 scheme based on the Prefix Aggregation, namely DPPA. In DPPA, all the LMAs in the extended home network are connected to each other via the global tunnel and announce their aggregated prefix to the Internet. Besides, by using the IP anycast routing, the signaling messages and data packets destined to any IP address that belongs to the aggregated prefix can be transmitted to the topologically closest LMA. Our analysis results show that DPPA has a more optimized path and lower location update cost and packet transmission cost when compared to PMIPv6.Adaptive multiple level mobility anchor point selection scheme in HMIPv6
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0945
Hierarchical Mobile IPv6 (HMIPv6) introduces a mobility anchor point (MAP) that localizes the signaling traffic and hence reduces the handoff latency. In addition to processing binding update messages from mobile nodes (MNs) on behalf of MNs' home agents (HAs), the MAP performs data traffic tunneling destined to or originated from MNs, both of which will burden the MAP substantially as the network size grow s. To provide scalable and robust mobile Internet services to a large number of visiting MNs, multiple MAPs will be deployed. In such an environment, how to select an appropriate MAP has a vital effect on the overall network performance. In this paper, we propose the adaptive multiple level MAP selection scheme in the form of binary tree structure. Then, we give the optimal threshold value calculation formula based on the total communication cost, which is used to select the MAP for MN. We compare its performance quantitatively in terms of signaling overhead. It can be shown that the adaptive multiple level MAP selection scheme is better than the furthest and the nearest MAP selection schemes in some area, since this scheme can be used to select the serving MAP depending on the MN's mobility and session activity. In addition, this MAP selection scheme is insensitive to the lower threshold value offseting.Coverage and networking analysis of TD-LTE system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0704
The development of mobile Internet and Internet of Things sharply increases needs of bandwidth and rate of mobile network. That demand for mobile data is motivating operators to pursue 4G solutions like TD-LTE to maintain the competitive edge. This paper analyzed coverage of TD-LTE system and further compared its performance with FDD LTE, studied the feasibility of intra frequency networking of TD-LTE system. At last, the paper provides suggestions on networking of TD-LTE system.Design of a distributed network address translation system architecture
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1458
Network Address Translation (NAT) is a widely used important technology to mitigate the shortage problem of IPv4 addresses in Internet nowadays. However, the performance bottleneck caused by NAT's traditional client-server structure brings the problem of low reliability. In this paper, we proposed a novel Distributed Network Address Translation (DNAT) system. DNAT designs a cooperation mechanism of multiple NAT systems through three layers architecture to improve the network access ability and reliability. The main function unit in each layer enhances the performance of NAT system for large number of network access request. DNAT outperforms traditional NAT system in reliability and expansibility.Online traffic engineering by optimizing inbound traffic in locator/identifier separation context
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1495
To cope with the scalability issue of current Internet inter-domain routing system, several proposals addressing identifier and locator separation are proposed recently. LISP is one of them. In a LISP-capable network, when end-system identifier (EID) is not routable, a mapping system must map an EID to a routing locator (RLOC). By optimizing EID-RLOC Mapping Assignment (ERMA) for an AS, inbound traffic can be optimally distributed in the AS. In this paper, ERMA optimization problem is studied. We introduced an online ERMAO scheme based on delay information of probe packets. Simulation results show that online optimizing ERMA can achieve better network performance, e.g., lower packet delay and maximum link utilization.Identifier/locator separation: a worm detection and prevention perspective
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1417
Identifier/locator separation is widely recognized as a promising solution to the routing scalability issue of the Internet routing architecture. Although it is believed that networks with identifier/locator separation are more secure than networks without identifier/locator separation, identifier/locator separation cannot evade the damage of worms either. In this paper, we argue that identifier/locator separation can help detect and prevent worms by analyzing and evaluating the worm detection probability and the number of infected machines. The results show that the worm detection in networks with identifier/locator separation is easier than in networks without identifier/locator separation and identifier/locator separation is more resistive to worm propagation. To the best of our knowledge, this is the first attempt on understanding the worm detection and prevention in networks with identifier/locator separation.CIDMS: a security connection identifier mapping system for universal network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1435
The identifier split is a design principle for new Internet architectures such as Universal Network, Lisp, which make Internet more scalable, reliable and security. One important form of identifier split in Universal Network is connection identifier/access identifier (CID/AID) split which is introduced to improve security isolation during communication. Using CID/AID split, terminals communicate with each other without knowledge of the opponent's access identifier, so as to eliminate targeted attacks such as denial-of-service attack. This spit relies on a mapping system to resolve a flat connection identifier that identifies a session to one or several appropriate access identifiers in response to mapping requests for specific connection identifier. In this paper we present a secure CID/AID split mechanism and its corresponding mapping system: CIDMS. We also present simulations of mapping system's performance, evaluate its resolution delay and scalability.The design and implementation of VoIP flow monitoring system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1496
This paper mainly introduces the design and the function structure of VoIP Flow Monitoring System, providing a complete set of monitoring solution. Different with other system, in the process of design, the system focuses on the web based flow analysis module, and illustrates the solution aiming at monitoring and controlling flow. With plenty of search conditions, the web module is flex and users can find out their interested information easily. Finally, with the data in the present network, the system will display how it works on providing information and controlling VoIP flow.A novel heuristic for overlay mapping with enhanced resilience and QoS
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0727
The problem of overlay mapping with enhanced resilience and QoS is NP-hard and previous heuristics are oblivious to substrate topology information and thus cannot provide effective protection. This is because diversity of the working and backup paths is essential to ensure resilience since a single link failure in the lower layer can result in failures of all the upper-layer links that go through it for applications involving multiple layers. In this paper, a novel and effective heuristic that considers the substrate network topology information is proposed. The effectiveness of the new heuristic is verified through extensive simulations. As confirmed by the evaluation, the proposed heuristic can ensure that physical paths are diversified though additional substrate nodes are involved in the overlay mapping solution. Moreover, the robustness of the proposed heuristic with incomplete substrate network information is also examined.The design and research of improved JFKi protocol based on mobile IPv6
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1428
IPv6 as the trend of next generation Internet has increasingly implemented in the mobile Internet. The security of mobile IPv6 has become the key factor of restricting its development. The Internet Protocol Security (IPsec) protocol protects the exchange information between the Mobile Node (MN) and Home Agent (HA) through establishing the security association (SA). However, the IKEvl as the popular security protocol has the defects not to adapt the mobile Internet such as low efficiency and poor reliability. The Just Fast Keying (JFK) protocol is composed of JFKi and JFKr, and they are very similar in many respects. In this paper, we propose an improved mobile JFKi protocol based on IPv6. We simplify the complex of JFKi to improve the efficiency of establishing SA so that it reduces the load of mobile devices and improve feasibility of JFKi. We propose a model of mobility application based on mobile IPv6 to ensure JFKi adapt the mobility application. Through simulation, we prove correctness of the approach proposed by us.Packet-delay invariance to scheduling under congestion
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0684
Class-of-Service enabled networking relies on non FIFO schedulers in order to achieve differentiated performance, e.g. delay, for different traffic classes. The delay performance of all stable packet schedulers is characterised by a Dominant Decay Rate (DDR) in the presence of bursty traffic. Poisson traffic only results in a "classical", or Short Buffer Decay Rate (SBDR) which is not the same as the DDR. This paper presents novel experimental results which indicate that, for widely different FIFO and non-FIFO schedulers, the low delay SBDRs are very dissimilar yet the DDRs are virtually identical. We also analytically predict the "knee-point" where the DDR takes over from the SBDR: this is the point at which schedulers become equivalent.A security enhanced network architecture for future networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1456
Security is one of the most urgent problems in today's Internet. For the lack of a clear definition of identifier of entity we seek to manage in the Internet, existing security mechanisms are not well integrated into the Internet architecture. These security mechanisms are designed as separate extensions and their effectiveness are limited. In this paper, we present a new network architecture, Security Enhanced Network Architecture (SENA), to provide a "built-in" security. In SENA, there are four identifiers, including service identifier, connection identifier, endpoint identifier and routing identifier. With a reinforced control plane, the architecture allows network administrators directly manage the mappings between different identifiers and provides security as an integrated solution.Study of architecture of Power Internet of Things
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0762
It has been widely recognized that smart grid is one of the most important applications of Internet of Things. Bases on the construction and development characteristics of smart grid, this paper concludes the architecture of Power Internet of Things (PIoT), advanced technologies of PIoT, and the applications of PIoT in smart grid power generation, transmission, transformation, distribution and utilization.A middleware of Internet of Things (IoT) based on ZigBee and RFID
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0765
A middleware for the Internet of Things (IoT) diverse application protocol is proposed in this paper, which is based on a system - intelligent work scene "SmartScene" using RFID and ZigBee protocols. With the proposed middleware, this system shields the difference between ZigBee and RFID data processing by defining the protocol conversion and mapping model. A common service interface for upper applications is also provided, which allows the upper applications to focus on the service level development and reduce the coupling with the underlying hardware and protocol. Moreover, it reduces the development effort greatly, and enhances the upper application versatility and reusability. Thus, this method can serve as a reference to other multi-protocol IoT applications.Solid end-to-end probing and analysis method for estimating network loss
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1481
Overlay network monitoring is one of the most important issues in the design and operation of overlay networks. It faced with increasing demand for better throughput and response time performance. Given an overlay network with n end hosts, existing systems either require O(n<sup xmlns="http://pub2web.metastore.ingenta.com/ns/">2</sup>) measurements, and thus lack scalability, or can only estimate the latency but not failures or congestion. We propose a scalable deterministic network monitoring scheme that selectively monitors k linearly independent paths which can fully describe all the O(n<sup xmlns="http://pub2web.metastore.ingenta.com/ns/">2</sup>) paths. We use the loss rates and latency of the collected k path to deduce the loss rate and latency of the rest paths. Our method only assumes knowledge of the underlying IP topology, with links dynamically varying between normal and lossy. In this paper, we propose a novel path loss rate inference algorithm which improves, implements and extensively estimates such a monitoring method. We carry out our experiments in two different scenarios and the results from the experiments demonstrate that our approach increases accuracy in monitoring congested paths compared to other representative schemas'. Especially in a router-level topology, our approach can deliver almost a 12.5% increase.N-PreTG: a network-based approach to optimize handoff performance of universal network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1422
Universal Network is a new Internet architecture which can provide the better mobility support by splitting the identifier and location of traditional IP address. However, the current mobility support is triggered by communicating data, which may increase handover delay if there is no packets transmission after the handover. In this paper, we analyze the mobility management proposals for traditional IP networks and the Universal Network, and propose a novel approach, named by N-PreTG (Network-based Pre-Trigger) to optimize handoff performance N-PreTG considers two important factors. First, it is a network-based approach which means any mobile terminal running standard protocol stacks needs not to do any changes. Second, it uses Pre-Trigger, which detects the attachment status via Layer 2 frames and notifies related entities to update mapping relationship earlier, to decrease the handoff latency. To evaluate its performance, we implement the proposed approach in our test-bed, and test its performance under different mobile devices to verify the compatibility of this approach. The experimental results show that N-PreTG reduces handoff delay by an average of 500ms, has a good stability and improves the quality of communication for mobile users.Noise reduction based on spectral entropy in MP3 compressed domain
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0899
The compressed format of MP3 is a popular way to store on the personal computers and transmit on internet, but very few algorithms run directly in the compressed domain for noise reduction and it is rather time-consuming to employ traditional methods due to the processing of decompression-noise reduction-compression. In this paper, a novel approach combining with MP3 coding and MDCT coefficients (MDCTs) spectral entropy is proposed to remove directly noise in compressed domain. MDCTs can be extracted from the partial decompression of MP3 audio signal, and then the MDCTs' entropy is calculated in each granule for noise power spectrum estimation. Experimental results show that the proposed method remove the noise effectively in the compressed domain and improve the efficiency of noise reduction for MP3 audio.Improved chord algorithm in mobile peer-to-peer network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1465
With the rapid increase in the number of devices, mobile P2P network (MP2P) is emerged as a state-of-the-art technology for large-scale resources sharing in wireless networks. Chord is a typical P2P network structure and widely used in the Internet. However, with the characteristics of the limited bandwidth and dynamic characters of mobile environment, the wired-based Chord algorithm can not adapt to MP2P network. In this paper we proposed a novel optimized Chord (opChord) algorithm. By adding second level successor node's information to finger table structure and designing a two-hops query method, opChord can decrease the number of forwarding messages between nodes and satisfy the efficient search requirements of mobile P2P networks, then can improve the overall performance of Chord network.The solution of an IOT application: smart vehicle
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0746
Smart vehicle is an important issue when the automobile industry and ICT industry fuse. After introducing the application of smart vehicle, we analyze the limitation and deficiency of application at present and bring forward the corresponding suggestions. Meanwhile, the necessary framework which support the applications put in practice are presented in this paper, which includes the platform which connect with other peripheral systems, the communication networks and the smart vehicle terminal. This paper also describes the service process and transaction flow in detail according to the sponsor and assignments of the applications in the end.Analysis of traffic model and self-similarity for QQ in 3G mobile networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1442
Data service traffic model is playing more and more important role in many fields of 3G (Third Generation) mobile networks such as traffic forecasting, resource allocation, network optimization and so on. QQ as one of the most popular Internet service in China also developed very rapidly in mobile networks. By analyzing the communication mechanism and format of QQ packet, a novel QQ message model is put forward and the characteristics of the parameters and distributions are given based on the real QQ data collected on the UMTS networks. Extensive researches of the network traffic show the packet data traffic has the characteristics of self-similarity and long range dependence. The self-similarity of QQ traffic is investigated and the Hurst parameters are estimated with different methods.A fast handover management scheme for mobile identifier/locator separation networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1476
Several researches propose the identifier/locator separation architecture to address the scaling problems of today's Internet routing and addressing system. And scalable and seamless mobility support is an important task in mobile identifier/locator separation networks. In this paper, by analyzing the features, such as direct separation, flexible mapping and identifier replacement, we show that the new architecture delivers data packets more efficiently and protects location privacy better than traditional mobile IP networks, and is convenient to implement soft handover. Then we present a fast handover management scheme for the new architecture, which improves the reactive handover mode of FMIPv6 and eliminates the duplicate address detection (DAD) and return routability (RR) processes in MIPv6. The numerical results show that the scheme has good scalability and low handover latency, and has great advantages in the signaling cost and fast mobility support.Link performance based neighbor selection mechanism in BitTorrent for the wireless networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1005
BitTorrent is one of the most efficient file sharing application on the Internet today. However, the variability of link layer delay and the bandwidth distribution among different wireless devices are significant, thus the peer-to-peer applications like BitTorrent system may suffer the impact on performance in wireless networks. In this paper, we propose a link performance index λ that expresses the bandwidth and link delay of each peer, and then we propose a link performance based (LPB) neighbor selection mechanism, in which a node with a higher index value can more likely be chosen as neighbors and served by other peers in BitTorrent. The LPB mechanism can improve the bandwidth utilization and reduce the overall file download time. Simulation results show that our proposed LPB neighbor selection mechanism in BitTorrent can reduce the average download completion time up to 12% compared to the standard BitTorrent neighbor selection mechanism in wireless networks.User-oriented seamless service handoff in hybrid wireless-optical broadband access network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0753
This paper has proposed a user-oriented seamless service handoff scheme in ubiquitous computing environment. In this scenario, users can maintain their access to their personalized service uninterrupted even while moving or changing terminals. As the combination of optical fiber-based technology and wireless technology, hybrid Wireless-Optical Broadband Access Network (WOBAN), can provide ubiquitous broadband access. With the development of Internet of Things (IoT) technologies, Location-Based Services (LBS) have emerged in many fields. And wireless sensors have become considerably popular with ubiquitous computing and have provided a sound solution for location-aware system. A platform is constructed to evaluate the effectiveness of the proposed service handoff scheme. Test results show that our platform is able to provide precise user positioning information and seamless service handoff with low handoff delay.Case study: Application of wide-area, communications-assisted remedial action schemes improves transmission reliability
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0511
At Southern California Edison (SCE), remedial action schemes (RASs) are implemented to ensure reliable power system performance following outages on a transmission grid network. They include fast, automatic telecontrol actions (wide-area teleprotection) to mitigate thermal overloads and system instability upon the loss of one or more transmission lines. These communications-assisted RAS systems are intended to be used throughout the SCE area of operation, as well as at all interties to neighboring utilities to facilitate dynamic load shedding, generation tripping, and improved load management. With appropriately fast and deterministic communications, RAS systems are used in place of expensive alternative measures, which include reconductoring transmission lines, building new lines, and/or adding new transformers. Testing six years ago at SCE demonstrated the successful use of IEC 61850 Generic Object-Oriented Substation Event (GOOSE) messages over a distance up to 460 miles to collect analysis and arming data and transfer status and telecontrol. Devices designed to carefully manage teleprotection and GOOSE telecommunications are unaffected by the additional traffic of in-service installations with multiple devices networked together. However, subsequent research has shown that shared bandwidth Ethernet with typical substation traffic degrades the performance of GOOSE telecontrol within poorly designed IEDs from milliseconds to minutes. This paper focuses on the negative impact of Ethernet and Internet Protocol (IP) methods on mission-critical applications, why they are not widely recognized, and how to mitigate them. Research results and best practice recommendations of using Ethernet and time-division multiplexing (TDM) methods for telecontrol to solve transmission corridor stability issues are presented. (6 pages)Bandwidth allocation algorithms in the short video sharing system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1010
A great number of short video sharing websites such as YouTube and Tudou are established for users to create, share, and distribute contents. It has enabled the development of video accelerator for increasing the downloading speed from those websites and achieving better user experience. The number of videos and peers in the short video sharing system is by orders of magnitude many times larger than which in traditional P2P VoD system. As a result, even though the resource is sufficient, due to unfairness assignment, the quality of service can hardly satisfy all users. In this paper, we concentrate on the assignment of user's upload bandwidth which is one of the fundamental resource in the short video sharing system. We formulate the problem of optimal bandwidth allocation considering the fairness between videos. The heuristic algorithms of allocating upload bandwidth in centralized or distributed fashion are proposed and evaluated against a widely used strategy (equal allocation) with respect to the balance among videos. Simulation results demonstrate that both algorithms can lead to significant performance improvement.A novel secure and scalable resource/service acquisition scheme for future internet
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1437
Because of the mostly needless information about the resource providers, service-oriented resource acquisition is becoming a research hotspot of network service technology. However, it is very difficult for today's internet evolved from its original design to realize this mission. (1) The users must know which host should be connected. Actually, that is precisely what the user doesn't care about. (2) The ongoing streaming cannot be automatically transferred to another server that can provide the same service. (3) Traditional network architecture is lack of the uniform description to a variety of resource and services. Meanwhile, there are still some serious problems such as security, scalability, mobility. Therefore, some novel network and service architectures are proposed, one representative of which is the identifier and mapping network architecture. Based on the identifier and mapping network architecture, this paper proposes a Service-Oriented Resource/service Acquisition (SORA) scheme, which gives a clean-state redesign of Internet resource/service acquisition. The analysis and evaluation show that the scheme has good security and scalability, besides the basic capability to support service-oriented resource/service acquisition.Understanding IPv6 user performance on private BT system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1008
The Internet continually evolves in scope and complexity, with wide deployment of backbone links of large capacity, application of IPv6, the emergence of streaming applications, and even the rapid change on nature of the same applications. These changes lead us to question whether users' performance on the most popular Internet applications such as Bittorrent(BT) under the IPv6 real environment reflect changes or not, and how about the evolution trend of IPv6. To answer these questions, we conduct measurement on a private BT System, which is deployed over a campus network serving more than 25,000 users with three external links connecting to Telecom, CERNET, and CERNET2 (IPv6). With packet traces collected from external links and the 10-month log files from the private tracker, we first analyze the amount and components of IPv6 traffic, we then present in depth measurement and analysis from users group evolution, each group's status, and level of activity. Furthermore, we find there is gap among performances of users, and figure out such inconsistency is mainly from tracker's operating mechanism and diversity in users' network environment, rather than difference in IP protocol.The cognitive mobility management based on the identifier/location split mechanism
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1423
The mobility management of the traditional Internet consists of the location management and handover management to support movement of space and time. While with the introduction of the cognitive radio technology, the mobility management has to consider the location management, handover management, and spectrum management to deal with the mobility of space, time and spectrum. Furthermore, the cognitive radio allows the cognitive user can access to different frequencies and networks, which results in the interconnection problems due to the different network architectures. In this paper, we investigate the recent development of the new Internet architecture and mobility management, and propose a mobility management scheme in the cognitive Internet based on the Identity/Location Split (ILS) mechanism. The proposed scheme takes the cognitive mobility management as the single-interface heterogeneous handover problem, and adopts the AID (Accessing Identifier) and RID (Routing Identifier) to separate the identity and location of the traditional IP, and introduces the global mapping mechanism to maintain the relationship between the AID and RID to realize the mobility support for space, time and spectrum.Multi-dimensional design of the exhibition
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1454
Based on the characteristic of technical exhibitions, we systematically analyze the location, function, audience and meaning of these exhibitions in this paper. Moreover, we discuss on the technical exhibition's exhibit planning, exhibit design and exhibit scheme. Specifically in the exhibit scheme, we discuss the advantages of Internet of things and sensing technology when using in the technical exhibitions. Finally, we will show a successful example of technical exhibition which has introduced in a multi-dimensional exhibition scheme.Obtain IP database based on BGP
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1473
For the demand of analyzing network traffic flows from operators at present, this paper introduces a method of obtaining IP database based on BGP protocol and describes the details of the system deployment. Through analyzing the obtained data, it was found that the IP database obtained this way has a high accuracy. And furthermore it has an advantage that is not available in the traditional way based on APNIC + WHOIS - to analyze the transit traffic.SPSA: shortest path selection algorithm to solve the unnecessary hop problem in LISP-DHT
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1472
LISP-DHT is a mapping system to support LISP. It is based on widely used DHT. LISP-DHT takes full advantage of the benefits of DHTs such as robustness, scalability and security etc. However, it achieves poor lookup efficiency due to the "Unnecessary Hop" problem. The unnecessary hop problem leads to a query message may traverse the same physical node multiple times, thus it heavily weakens the throughput and lookup efficiency of the mapping system. In this paper, we identify the issues with LISP-DHT which leads to "UH" problem and poor lookup efficiency. We propose the shortest path selection algorithm to solve the UH problem. The theory analysis and simulation results show that the SPSA can solve the Unnecessary Hop problem so as to improve the lookup efficiency of LISP-DHT.Intelligent tourist attractions recommendation system based on cases
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1490
This paper describes how to meet the tourists' demands by using web crawlers, perceptual hashing, decision tree modeling and other technologies in city tourist attractions recommendation. The system makes the intelligent suggestions by using web crawlers to capture weather conditions for the next few days, and builds a decision tree according to the data base of users' feedbacks. It analyses the result of the model and updates the algorithms. To solve the tourist picture reviews issue, we design and implement a hashing algorithm base on digital image sense technology and give out the test and analysis results.IP traceback in GPRS
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1474
Recently, more and more crimes occur in computer network, such as DoS attacks, DDoS attacks, dissemination of pornographic contents and so on. However, due to the issues of network protocol's design, IP addresses can be forged, which makes it difficult to track the real source address. And that is why cybercrimes occur frequently. Mobile network crimes have also shown a growing trend together with the development of mobile network. In this article, we introduce the current state of the art in IP traceback. We also describe the meaning of IP traceback in GPRS and introduce a scheme for IP traceback in GPRS.Research on architecture of reconfigurable and flexible network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1457
Next generation internet should be a network which can satisfy users' personalized needs. Reconfigurable technology has a good performance in meeting the needs of system adaptability to environment and changes of application objects. Therefore, this paper brings forward the concepts of the flexible reconfigurable network and has a formalization description of reference models in flexible and reconfigurable network. At last, it introduces the application prospects and advantages of flexible and reconfigurable network.A scalable and backwards compatible transition solution for ID/locator separation architecture
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1426
The scalability of the Internet routing system suffers from the overloaded semantics of lP addresses. The IP address of a node means not only the identifier but also the locator. Many researchers propose the idea of separating the Internet into two independent evolving spaces, the identifier space and the locator space. However, this architecture is quite different from the Internet we are using, so a good transition plan is crucial for the further deployment of the ID/Locator separation architecture. In this paper, we propose a new compatible method, in which the nodes in the traditional network and the nodes in the access network of the ID/Locator separation architecture can communicate with each other. And we give a detailed analysis of the method. We show that, besides that the method supports the communication between the end node in the traditional network and the end node in the ID/Locator separation architecture, the method does not take extra delay and has good scalability. Using this method, the architecture can be incrementally deployed, and offers security, multi-homing, and mobility benefits even to early adopters.IDP-VRMA: an intelligent and distributed virtual resource management architecture based on prediction for future networks
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1468
For the dynamic virtual environment in future network, varying and abundant service demands on future network requires intelligent resource management capabilities to ensure service delivery to customers, motivating the need to develop a novel virtual resource management architecture for this purpose. In the paper, we propose an intelligent and distributed virtual resource management architecture based on prediction for future network (IDP-VRMA), consist of a Control System, a Knowledge Processing Element and Intelligent Substrate Nodes. Combined with monitoring and prediction capabilities, the IDP-VRMA can perform intelligent virtual resource management in the dynamic virtual environment. Furthermore, we demonstrate the advantages of the proposed architecture by means of functional descriptions.Algorithm for virtual nodes reconfiguration on network virtualization
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1484
Recently, network virtualization is an emerging trend to address the ossification of the Internet. The key idea of network virtualization is to run multiple architectures simultaneously on a shared substrate. A major challenge in network virtualization is how to assign substrate resources among multiple Virtual Networks (VN) requests efficiently. VN assignment with reconfiguration should be used to accomplish such challenge. Since reconfiguration is much expensive, this paper focuses on reconfiguration with critical virtual nodes by linear programming. Simulation experiments show that the proposed algorithm increases the acceptance ratio by 10% and about 70% of reconfiguration time cost can be spared.Characterisation of energy consumption in domestic households
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0169
The UK is currently entering an energy crisis. The mass consumer market has resulted in significantly increased energy usage. Also due to increasing scarcity the cost of extracting and refining petroleum and coal is rising. For savings to be achieved consumers and employers need to be aware of where savings can be achieved with relatively little effort. Regular monitoring of energy patterns can indicate areas of unnecessary consumption. Reporting of power usage can provide savings of up to 20 percent. This paper presents a characterisation of energy consumption. The study has been conducted over a period of three years. During that time we monitored power consumption in two households and an office using wireless sensors. Once collected the data samples were transmitted to a web server for real time reporting. Our conclusions are that savings can be made through behavioural changes in domestic and commercial organisations supported by a modest investment in monitoring technology. (8 pages)Design and implementation of a solution to smooth IPv6 transition
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0743
With the rapid development of Internet, IPv4 protocol can no longer meet the needs of users. This is mainly due to the limitations of IPv4 in terms of addresses, routing and security. Correspondingly, IPv6 has the advantage of large address space, security, mobility, quality of service and so on. So IPv6 protocol has become the inevitable trend of network development. However IPv4 and IPv6 are incompatible protocols, so a solution to transition is required. In order to achieve smooth and stepwise transition, IETF recommends three kinds of transition mechanisms: dual stack, tunneling and translation technology. This paper introduces the principle of these transition mechanisms, emphatically proposes a solution to smooth IPv6 transition based on tunneling and translation technology. Finally, we implement two kinds of tunnel and deploy a IVI transition system. The experiment results show that the proposed solution is feasible.