Interdisciplinary and Multidimensional Perspectives in Telecommunications and Networking
Latest Publications


TOTAL DOCUMENTS

16
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781609605056, 9781609605063

Author(s):  
Dimitar Radev ◽  
Izabella Lokshina ◽  
Svetla Radeva

The paper examines self-similar properties of real telecommunications network traffic data over a wide range of time scales. These self-similar properties are very different from the properties of traditional models based on Poisson and Markov-modulated Poisson processes. Simulation with stochastic and long range dependent traffic source models is performed, and the algorithms for buffer overflow simulation for finite buffer single server model under self-similar traffic load SSM/M/1/B are explained. The algorithms for modeling fixed-length sequence generators that are used to simulate self-similar behavior of wireless IP network traffic are developed and applied. Numerical examples are provided, and simulation results are analyzed.


Author(s):  
Zhaomin Mo ◽  
Hao Zhu ◽  
Kia Makki ◽  
Niki Pissinou ◽  
Masoumeh Karimi

Vehicular ad-hoc networks (VANETs) have been gained importance for the inter-vehicle communication that supports local communication between vehicles without any expensive infrastructure and considerable configuration efforts. How to provide light-weight and scalable location management service which facilitates geographic routing in VANETs remains a fundamental issue. In this paper we will present a novel peer-to-peer location management protocol, called PLM, to provide location management service in VANETs. PLM makes use of high mobility in VANETs to disseminate vehicles’ historical location information over the network. A vehicle is able to predict current location of other vehicles with Kalman filtering technique. Our theoretical analysis shows that PLM is able to achieve high location information availability with a low protocol overhead and latency. The simulation results indicate that PLM can provide fairly accurate location information with quite low communication overhead in VANETs.. [Article copies are available for purchase from InfoSci-on-Demand.com]


Author(s):  
Tong Zhou ◽  
Lein Harn

A traditional service provider of telecommunications is recognized as an authority which is trusted by the subscribers and the public. Ad hoc and Peer to Peer (P2P) networks have demonstrated advantages that service provider controlled networks lack, and they also exhibit self-organizing behaviors. A pure self-organizing network does not rely on any hierarchical management. Instead, it utilizes a web of trust for security. Its trust management is complicated and varies from node to node. In this article, we discuss a hybrid trust structure that leverages the involvement of an authority in a self-organizing network to increase trust levels between disconnected small-worlds. The new model will help service providers design more robust and innovative solutions for next generation networks and applications. [Article copies are available for purchase from InfoSci-on-Demand.com]


Author(s):  
Hannu Verkasalo

This article studies the emergence of the mobile Internet business from six strategic perspectives, highlighting the ongoing transformations of the mobile industry. The article suggests that companies of the mobile industry can reconstruct their business models with six different kinds of choices: 1. Positioning differently in the value network, involving both vertical and horizontal movements. 2. Acquiring and developing critical assets and competencies to build sustaining and dynamic competitive strategies. 3. Inventing new mobile business models by utilizing the lessons from the Internet. 4. Integrating end-users in making and redefining services, optimizing pricing logic, introducing new business models with end-user originated content creation in mind, and making services easy to adopt by end-users. 5. Leveraging and focusing on disruptive, winning technologies that are changing the rules of the business. 6. Adapting to relevant policy schemes, and proactively planning and reconsidering business decisions under a dynamic regulatory environment.


Author(s):  
Vassiliki Cossiavelou ◽  
Philemon Bantimaroudis

Mediation in news industries has received significant attention by researchers for more than half a century. Gatekeepers decide which information should be delivered to different audiences. The Shoemaker/Reese Gatekeeping Model identifies five different filters of content processing: individual influences, professional routines, the organization, extra-media influences and ideology. Journalism practices, intra-organization and extra-media-related procedures and strategic alliances, including culture and ideology, add more complexity in the contemporary globalized media landscape. Gatekeeping is being processed through out all the above mentioned pillars. ICT technologies related to the media have influenced the interactivity among the pillars and wireless technologies have influenced the digital media landscape. The European Union has experienced dramatic changes in its regulation environment and spectrum resources allocation. In this paper, the authors examine the impact of wireless technology on gatekeeping practices in the context of EU news markets.


Author(s):  
Floriano De Rango

Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this work, a well-known routing protocol, called SAODV, has been considered. To improve its performance and offer more resilience to attack from malicious nodes authenticated by the network, some additional features are added. A preventive approach based on a cryptographic mechanism and a reactive approach to detect anomalous and malicious nodes are considered. An extension of SAODV offering an Intrusion Detection Mechanism (IDM) and a Trust-based Mechanism (TBM) to promote the collaboration of the cooperating nodes and penalize the selfish nodes are proposed. Simulation results were performed under a NS-2 simulator to show the effectiveness of our proposal compared with AODV and SAODV. Simulation parameters, such as Normalized Routing Overhead, Data Packet Delivery Ratio, average number of signatures and throughput of collaborating and malicious nodes, have been considered.


Author(s):  
Hak Ju Kim ◽  
Martin B.H. Weiss ◽  
Benoit Morel

The major U.S. wireless operators already have announced their plans for the evolution of their networks towards 3G, but some uncertainties remain, such as emergence of new technologies (WiMAX and WLAN) and the consolidation among operators (AT&T Mobile and Sprint Nextel). The article discusses a real option based model for technology decisionsand applies it to the U.S. wireless industry as a case study. We also discuss what decisions must be made, what the outcomes are, and how the options model is validated. The preliminary results show that the evolution of wireless network technologies between generations (inter-generations migration scenario) is desirable (a positive net option value), but not desirable (a negative net option value) within generations (intra-generation migration scenario), in the U.S.


Author(s):  
William Webb

Much of the rationale for the launch of 3G networks from 2000 onwards was to promote the expected rise in wireless data usage. Consumers were predicted to make widespread use of mobile internet and mobile TV but it was felt that the data rates offered by 2G networks were insufficiently fast to give them the experience that they expected. But more recently success has been achieved with different types of phone such as the iPhone and with new applications rather than higher data rates. This article takes a look at predictions of the future, considers whether they need to be modified in the light of events and makes its own suggestions as to where things might go from here.


Author(s):  
Steven R. Powell

The interdisciplinary approach can be beneficial to researchers, educators, and practitioners for solving complex problems and synthesizing knowledge. While a great deal has been written about interdisciplinary activity in relation to the humanities and the natural and social sciences, it has been important in the telecommunications and networking field as well. This article investigates the subject of interdisciplinarity, especially as it relates to telecommunications and networking research and education. Among the questions examined are: What exactly is meant by “interdisciplinary”? Why is the interdisciplinary approach important in telecommunications and networking research and education and what are some examples of how is it being utilized? How does the International Journal of Interdisciplinary Telecommunications & Networking differ from other telecommunications and networking publications in its treatment of interdisciplinary research and what does the journal hope to accomplish?


Author(s):  
Qunwei Zheng ◽  
Xiaoyan Hong ◽  
Jun Liu ◽  
Lei Tang

A multi-hop wireless network with highly dynamic members and mobility is vulnerable to many attacks. To address this problem, we propose a novel time-based approach that exploits mobility. In our scheme, the source sends shares at different times. Due to node mobility, these shares will be routed through different intermediate nodes. It is highly unlikely that a particular intermediate node is able to be on many of these routes and to collect enough shares to reconstruct the original message. The scheme is particularly suitable for applications that can tolerate long message delays, as studied in Delay Tolerant Networks. The article focuses on analyzing the feasibility of this scheme. We describe a general approach to calculate the probability of intercepting enough shares by arbitrary nodes, together with simulations. The results show that the probability is small. The scheme provides a valuable alternative for delay tolerant applications to enhance message confidentiality.


Sign in / Sign up

Export Citation Format

Share Document