Universite Pierre et Marie Curie

Displaying 1-16 of 16 results

  • White Papers // Jan 2011

    CROMA - A Slotted Mac Protocol for MANETs with Multislot Communications

    TDMA based MAC protocols can provide a very good utilization of the shared radio resources, especially at high input loads, in synchronized Mobile Ad hoc NETworks (MANETs). Global positioning systems like GPS or GALLILEO should provide a very good timing accuracy for synchronization of nodes. This paper presents a medium...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jan 2011

    Interaction Between Hidden Node Collisions and Congestions in Multihop Wireless Ad-Hoc Networks

    In this paper, the authors study the performance of the IEEE 802.11 MAC protocol and its impact on the transport layer performance in multi-hop wireless ad-hoc networks. They focus on the hidden node problem that effects heavily the end-to-end delay and the packet loss probability. Through a mathematical analysis, they...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jan 2011

    On Hybrid Collision Control for IEEE 802.11 Ad-Hoc Networks

    The authors present in this work a new mechanism based on an innovative hybrid approach for traffic and collision control in wireless ad hoc networks. They combine the well known equation based technique with the measurement based one in a way to obtain a predictive state of the network. Combining...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Mar 2010

    A Secure and Efficient Authenticated Diffie-Hellman Protocol

    The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. The authors propose a complementary analysis of these schemes; on the basis of this analysis they show how impersonation and man in the middle attacks can be mounted against...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jun 2009

    Dimensioning WiMAX Mesh Networks With Multiple Channels

    The IEEE 802.16 standard defines two modes of operation: Point-to-Multi-Point (PMP) and MESH mode. In the PMP mode, Subscriber Stations (SS) connect to the Base Station (BS) in single hop transmissions. Mesh mode, however, allows SSs to communicate with each other, thus forming a wireless multihop mesh network. The standard...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Apr 2009

    Measurement of eDonkey Activity With Distributed Honeypots

    Collecting information about user activity in peer-to-peer systems is a key but challenging task. The authors describe here a distributed platform for doing so on the eDonkey network, relying on a group of honeypot peers which claim to have certain files and log queries they receive for these files. They...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Apr 2009

    Detection, Understanding, and Prevention of Traceroute Measurement Artifacts

    Traceroute is widely used, from the diagnosis of network problems to the assemblage of internet maps. Unfortunately, there are a number of problems with traceroute methodology, which lead to the inference of erroneous routes. This paper studies particular structures arising in nearly all traceroute measurements. The authors characterize them as...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Apr 2009

    Dimensioning Methodology for OFDMA Networks

    In this paper, the authors present a comprehensive methodology to dimension an OFDMA (Orthogonal Frequency Division Multiple Access) network. They divide the dimensioning task into sub-blocks and present implementation details of each block. The first block has the objective of determining the spatial SINR (Signal to Interference plus Noise Ratio)...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Apr 2009

    Incentives for Resource Sharing in Ad Hoc Networks Going Beyond Rationality

    The goal of this paper is to analyze the incentive issues that arise in multi-hop ad hoc networks when their nodes are potentially mobile devices controlled by independent self-interested end-users. The author decomposes the problem into its economic and technological dimensions according to which the author categorizes the numerous proposed...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Apr 2009

    Graph-Based Approach for Enhancing Capacity and Fairness in Wireless Mesh Networks

    Wireless Mesh Networks have been an emerging technology in the past years. They are mainly used for providing last-mile broadband wireless access. It is then highly recommended to ensure fairness among different users regardless of their physical locations while increasing their throughput. In this paper, the authors construct weighted contention...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Mar 2009

    An Efficient Analytical Model for the Dimensioning of WiMAX Networks

    This paper tackles the challenging task of developing a simple and accurate analytical model for performance evaluation of WiMAX networks. The need for accurate and fast-computing tools is of primary importance to face complex and exhaustive dimensioning issues for this promising access technology. In this paper, they present a generic...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Feb 2009

    A Few Remarks About Formal Development of Secure Systems

    Formal methods provide remarkable tools allowing for high levels of confidence in the correctness of developments. Their use is therefore encouraged, when not required, for the development of systems in which safety or security is mandatory. But effectively specifying a secure system or deriving a secure implementation can be tricky....

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jan 2009

    A Novel Hybrid CDN-P2P Mechanism for Effective Real-Time Media Streaming

    In the early years, with the help of high-speed and broadband networking, the content delivery service has been grown up widely. There are a lot of providers for online streaming via Content Delivery Network (CDN), P2P network or hybrid CDN-P2P system. In this paper, the authors introduce one of new...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jan 2009

    Investigating Depth-Fanout Trade-O in WiMAX Mesh Networks

    Wireless Mesh Networks (WMNs) have been an emerging technology for providing cost/effective broadband Internet access. The research done insofar usually assumes that the wireless backbone of a WMN is built using IEEE 802.11 technologies. Such an approach has the drawback of leading to dense and sub-optimal deployments, due to the...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Oct 2008

    Correlating Wireless Link Cost Metrics to Capacity

    In wireless mesh routing, it is common to use periodic estimation of link quality to identify high throughput paths. While extensive work has been devoted to the design and static throughput evaluation of path metrics, evaluating the accuracy of the underlying link cost metrics under dynamic conditions has not received...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Oct 2008

    RFID Tags: Positioning Principles and Localization Techniques

    RFID is an automatic identification technology that enables tracking of people and objects. Both identity and location are generally key information for indoor services. An obvious and interesting method to obtain these two types of data is to localize RFID tags attached to devices or objects or carried by people....

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jan 2009

    Investigating Depth-Fanout Trade-O in WiMAX Mesh Networks

    Wireless Mesh Networks (WMNs) have been an emerging technology for providing cost/effective broadband Internet access. The research done insofar usually assumes that the wireless backbone of a WMN is built using IEEE 802.11 technologies. Such an approach has the drawback of leading to dense and sub-optimal deployments, due to the...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Oct 2008

    RFID Tags: Positioning Principles and Localization Techniques

    RFID is an automatic identification technology that enables tracking of people and objects. Both identity and location are generally key information for indoor services. An obvious and interesting method to obtain these two types of data is to localize RFID tags attached to devices or objects or carried by people....

    Provided By Universite Pierre et Marie Curie

  • White Papers // Feb 2009

    A Few Remarks About Formal Development of Secure Systems

    Formal methods provide remarkable tools allowing for high levels of confidence in the correctness of developments. Their use is therefore encouraged, when not required, for the development of systems in which safety or security is mandatory. But effectively specifying a secure system or deriving a secure implementation can be tricky....

    Provided By Universite Pierre et Marie Curie

  • White Papers // Apr 2009

    Detection, Understanding, and Prevention of Traceroute Measurement Artifacts

    Traceroute is widely used, from the diagnosis of network problems to the assemblage of internet maps. Unfortunately, there are a number of problems with traceroute methodology, which lead to the inference of erroneous routes. This paper studies particular structures arising in nearly all traceroute measurements. The authors characterize them as...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Apr 2009

    Measurement of eDonkey Activity With Distributed Honeypots

    Collecting information about user activity in peer-to-peer systems is a key but challenging task. The authors describe here a distributed platform for doing so on the eDonkey network, relying on a group of honeypot peers which claim to have certain files and log queries they receive for these files. They...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Mar 2010

    A Secure and Efficient Authenticated Diffie-Hellman Protocol

    The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. The authors propose a complementary analysis of these schemes; on the basis of this analysis they show how impersonation and man in the middle attacks can be mounted against...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jan 2009

    A Novel Hybrid CDN-P2P Mechanism for Effective Real-Time Media Streaming

    In the early years, with the help of high-speed and broadband networking, the content delivery service has been grown up widely. There are a lot of providers for online streaming via Content Delivery Network (CDN), P2P network or hybrid CDN-P2P system. In this paper, the authors introduce one of new...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Mar 2009

    An Efficient Analytical Model for the Dimensioning of WiMAX Networks

    This paper tackles the challenging task of developing a simple and accurate analytical model for performance evaluation of WiMAX networks. The need for accurate and fast-computing tools is of primary importance to face complex and exhaustive dimensioning issues for this promising access technology. In this paper, they present a generic...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Apr 2009

    Dimensioning Methodology for OFDMA Networks

    In this paper, the authors present a comprehensive methodology to dimension an OFDMA (Orthogonal Frequency Division Multiple Access) network. They divide the dimensioning task into sub-blocks and present implementation details of each block. The first block has the objective of determining the spatial SINR (Signal to Interference plus Noise Ratio)...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jan 2011

    CROMA - A Slotted Mac Protocol for MANETs with Multislot Communications

    TDMA based MAC protocols can provide a very good utilization of the shared radio resources, especially at high input loads, in synchronized Mobile Ad hoc NETworks (MANETs). Global positioning systems like GPS or GALLILEO should provide a very good timing accuracy for synchronization of nodes. This paper presents a medium...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jan 2011

    Interaction Between Hidden Node Collisions and Congestions in Multihop Wireless Ad-Hoc Networks

    In this paper, the authors study the performance of the IEEE 802.11 MAC protocol and its impact on the transport layer performance in multi-hop wireless ad-hoc networks. They focus on the hidden node problem that effects heavily the end-to-end delay and the packet loss probability. Through a mathematical analysis, they...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jan 2011

    On Hybrid Collision Control for IEEE 802.11 Ad-Hoc Networks

    The authors present in this work a new mechanism based on an innovative hybrid approach for traffic and collision control in wireless ad hoc networks. They combine the well known equation based technique with the measurement based one in a way to obtain a predictive state of the network. Combining...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Apr 2009

    Graph-Based Approach for Enhancing Capacity and Fairness in Wireless Mesh Networks

    Wireless Mesh Networks have been an emerging technology in the past years. They are mainly used for providing last-mile broadband wireless access. It is then highly recommended to ensure fairness among different users regardless of their physical locations while increasing their throughput. In this paper, the authors construct weighted contention...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Jun 2009

    Dimensioning WiMAX Mesh Networks With Multiple Channels

    The IEEE 802.16 standard defines two modes of operation: Point-to-Multi-Point (PMP) and MESH mode. In the PMP mode, Subscriber Stations (SS) connect to the Base Station (BS) in single hop transmissions. Mesh mode, however, allows SSs to communicate with each other, thus forming a wireless multihop mesh network. The standard...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Apr 2009

    Incentives for Resource Sharing in Ad Hoc Networks Going Beyond Rationality

    The goal of this paper is to analyze the incentive issues that arise in multi-hop ad hoc networks when their nodes are potentially mobile devices controlled by independent self-interested end-users. The author decomposes the problem into its economic and technological dimensions according to which the author categorizes the numerous proposed...

    Provided By Universite Pierre et Marie Curie

  • White Papers // Oct 2008

    Correlating Wireless Link Cost Metrics to Capacity

    In wireless mesh routing, it is common to use periodic estimation of link quality to identify high throughput paths. While extensive work has been devoted to the design and static throughput evaluation of path metrics, evaluating the accuracy of the underlying link cost metrics under dynamic conditions has not received...

    Provided By Universite Pierre et Marie Curie