scholarly journals NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications

2004 ◽  
2020 ◽  
Author(s):  
Marco Chiesa ◽  
Andrzej Kamisiński ◽  
Jacek Rak ◽  
Gábor Rétvári ◽  
Stefan Schmid

<div>In order to meet their stringent dependability requirements, most modern communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This tutorial presents a systematic overview of packet-based fast-recovery mechanisms in the data plane, focusing on concepts but structured around different networking technologies, from traditional link-layer and IP-based mechanisms, over BGP and MPLS to emerging software-defined networks and programmable dataplanes. We examine the evolution of fast-recovery standards and mechanisms over time, and identify and discuss the fundamental principles and algorithms underlying different mechanisms. We then present a taxonomy of the state-of-the-art and compile open research</div><div>questions.</div>


2014 ◽  
Vol 31 (2) ◽  
pp. 317-330 ◽  
Author(s):  
Young-Long Chen ◽  
Chung-Ming Cheng

Purpose – Wu et al.'s scheme has a security problem that is related to anonymity: attackers can determine by interception the identity of a legal user. This paper aims to propose a new secure authentication which combines a chaos system with an Arnold cat map. The scheme improves upon that of the Wu et al.'s scheme. The scheme proposed herein provides for full anonymity and improves the security of authentication messages for wireless communications. Design/methodology/approach – A novel scheme that integrates a chaos sequence is used with an Arnold cat map for authentication messages. Authentication messages are shuffled using an Arnold cat map to improve the security of authentication in wireless communications. An analytic approach based on a chaos sequence with an Arnold cat map is developed to secure authentication. The proposed scheme is presented in this study to overcome the inherent drawbacks of existing designs. Findings – The integrated scheme involves two steps. First, a chaos map is used to generate a set of chaos sequences that is added to the authentication messages. Second, the authentication messages are shuffled using an Arnold cat map. The main feature of the proposed design is such that the chaos systems are sensitive to the initial values of conditions. Sensitivity will lead to long-term behavior unpredictability to reflect the non-linear dynamic systems. Furthermore, to increase the complexity of the authentication message, the authors also use an Arnold cat map. Originality/value – The proposed scheme provides functions that include full anonymity properties, protection of the real identity of the user, one-time password properties, timestamp benefits and sufficient complexity of the password. The analysis shows that the proposed scheme exhibits the advantages of the chaos system and is more secure than previous schemes. Notably, the proposed scheme is effective for wireless communications.


2020 ◽  
Author(s):  
Marco Chiesa ◽  
Andrzej Kamisiński ◽  
Jacek Rak ◽  
Gábor Rétvári ◽  
Stefan Schmid

In order to meet their stringent dependability requirements, most modern communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic, tutorial-like overview of packet-based fast-recovery mechanisms in the data plane, focusing on concepts but structured around different networking technologies, from traditional link-layer and IP-based mechanisms, over BGP and MPLS to emerging software-defined networks and programmable data planes. We examine the evolution of fast-recovery standards and mechanisms over time, and identify and discuss the fundamental principles and algorithms underlying different mechanisms. We then present a taxonomy of the state of the art and compile open research questions.<br>


2021 ◽  
Vol 69 (4) ◽  
pp. 941-962
Author(s):  
Zoran Miličević ◽  
Zoran Bojković

Introduction/purpose: This paper provides an overview of Unmanned Aerial Vehicles (UAVs) from their early days to their integration into modern wireless networks. Methods: It analyzes, synthesizes and compares the UAVs development technologies throughout their history with significant aspects of their integration in wireless communication networks. Results: Important aspects of wireless communications as one of the key technologies for UAVs are presented. Next, energy efficiency as a research path for UAVs is considered. The paper also emphasizes the present state in this area as well as what the future of UAVs in communications will be. Conclusion: UAVs are important not only for widespread military usage in various combat operations and warfare environment, but also for other purposes such as their integration in 5G networks.


Author(s):  
Christos Bouras ◽  
Apostolos Gkamas ◽  
Georgios Kioumourtzis

Over the last years a number of new protocols have been developed for multimedia applications in the whole OSI layer’s scale. In addition wireless communications and networking fast occupy centre stage in research and development activity in the area of communication networks. In order to better support wireless user the cross layer design paradigm has been proposed. This chapter presents the challenges in design and implementation of cross layer adaptation schemes for multimedia transmission over wireless networks. In addition, this chapter presents the most important parameters and constrains that should be taken into consideration when attempting cross layer adaptation in wireless networks that involves different protocols in the overall protocol stack.


2018 ◽  
Vol 56 (9) ◽  
pp. 94-95
Author(s):  
Ejaz Ahmed ◽  
Muhammad Imran ◽  
Albert Y. Zomaya ◽  
Ammar Rayes ◽  
Joel J. P. C. Rodrigues ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document