Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 135.00Impact Factor 2024: 0.7
This journal publishes papers on a number of topics ranging from design to practical experiences with operational high performance/speed networks.
The topics covered will include but not be limited to:
- Communication network architectures
- Evolutionary networking protocols, services and architectures
- Network Security
Authors: Narayan, D.G. | Mudenagudi, Uma
Article Type: Research Article
Abstract: In this paper, we address a joint problem of routing and application-aware rate adaptation for multi-radio Wireless Mesh Networks (WMNs). WMNs are emerging as wireless backhaul technology to connect wired and wireless networks to the internet in a cost-effective way. These networks use multi-radio capabilities of mesh routers to achieve high performance. However supporting the quality of service (QoS) of real-time multimedia applications is still an important research issue as there is need for the cross-layer optimization strategies involving application, routing, MAC and physical layers. Towards this, we analytically derive our routing metric by using 802.11 Distributed Coordination Function (DCF) …basis access mechanism. Using this model, we design a novel cross-layer routing metric called Interference and Contention Aware (ICA) metric by considering delay, channel utilization, inter-flow interference and intra-flow interference to find the optimal path. We extend the work by adapting the traffic rate at the application layer of a source node by using the statistics provided by the routing metric. We implement this joint approach using Optimized Link State Routing (OLSR) in NS2. The results reveal that ICA routing metric performs better in terms of throughput and delay compared to Metric for Channel Diversity (MIND), Contention-Aware Transmission Time (CATT) and Interference Aware Routing (iAWARE). Further, cross-layer approach of routing and rate adaptation helps the applications to adapt the transmission rate based on the congestion at the network layer. Show more
Keywords: Wireless mesh networks, multi-radio, routing metric, cross layer design, rate adaptation
DOI: 10.3233/JHS-170559
Citation: Journal of High Speed Networks, vol. 23, no. 2, pp. 93-108, 2017
Authors: Munkhdorj, Baatarsuren | Yuji, Sekiya
Article Type: Research Article
Abstract: The most common methods used in cyber attack detection are signature scan and anomaly detection. In the case of applying these approaches, a countermeasure against an upcoming cyber attack is made only if a signature of cyber attack or an anomaly is detected. That means cyber defense systems encounter cyber attacks with no preparation, and our study focuses on this problem. This time, we attempt to discover the useful social data for the prediction of cyber attack motivation and opportunity. For the prediction of cyber attack motivation, the news articles were used as the dataset. As a result, using Artificial …Neural Networks and the core keywords extracted from the news articles directly correlated to a cyber attack or the news articles not correlated to cyber attack brought better precision/recall. For the prediction of cyber attack opportunity, the security vulnerability feeds were used as the dataset. The precision/recall of the prediction result was better when using the core keywords as the feature and Artificial Neural Networks as the prediction algorithm. Show more
Keywords: Cyber attack prediction, social data analysis, natural language processing, news article analysis, Twitter analysis, security vulnerability feeds analysis, SVM classification, artificial neural networks, convolutional neural networks
DOI: 10.3233/JHS-170560
Citation: Journal of High Speed Networks, vol. 23, no. 2, pp. 109-135, 2017
Authors: Yang, Shuxin | Wang, Xi | Liu, Chenghui
Article Type: Research Article
Abstract: Nowadays personalized influence maximization has become a new branch of influence maximization in social network. The existed methods mainly focus on independent cascade model and linear threshold model, in those two models, nodes’ influence forecast depends on the Monte-Carlo simulation. In order to simulate the propagation of influence more efficiently, we introduce heat diffusion model to the study of personalized influence maximization in this paper. The diffusion process of heat is adopted to simulate the influence of information among users. Furthermore, we propose a target’s heat greedy algorithm based on the analysis of the laws of the heat propagation. Experimental …results on real datasets show that our proposed algorithm is effective. Show more
Keywords: Social network, personalization, influence maximization, heat diffusion model
DOI: 10.3233/JHS-170561
Citation: Journal of High Speed Networks, vol. 23, no. 2, pp. 137-147, 2017
Authors: Corrente, Giuseppe
Article Type: Research Article
Abstract: In this paper we consider a set of heterogeneous terminals in a urban area that are interested in collecting the information originated from several sources. This set includes mobile nodes (pedestrian and vehicles) and fixed terminals. In particular, each terminal aims at retrieving the data items in a limited region of interest (ROI) centered around the node position. Since data items may change over time all nodes must strive for having access to the latest version. The goal of the paper is to evaluate the amount of information each node is able to gather (coverage) resorting to simple distributed …data collection and sharing through local broadcast communications. We study the diffusion of information updates in the whole area, evaluate the impact of energy saving policies in the protocol version run by pedestrian devices, and the impact of contextual awareness about location and motion of nodes in the forwarding policies. The study we present in this paper has been carried out through simulation. To this end we develop a discrete event simulator working on top of mobility and radio propagation traces obtained from the UDelModels tools that allow to obtain realistic traces of mobility and radio propagation. Show more
Keywords: Opportunistic networking, urban mobility, data gathering, content dissemination
DOI: 10.3233/JHS-170562
Citation: Journal of High Speed Networks, vol. 23, no. 2, pp. 149-162, 2017
Authors: Shinko, Ilir | Kolici, Vladi | Barolli, Admir | Oda, Tetsuya | Barolli, Leonard | Xhafa, Fatos
Article Type: Research Article
Abstract: In this paper, we evaluate the performance of two Wireless Mesh Networks (WMNs) architectures considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3, Distributed Coordination Function (DCF) and Optimized Link State Routing (OLSR). We compare the performance of WMN for different Transmission Control Protocol (TCP): Tahoe, Reno and NewReno considering normal and uniform distributions of mesh clients by sending multiple Constant Bit Rate (CBR) flows in the network. The simulation results show that for normal and uniform distributions and both WMN architectures, the PDR values are almost the same. For Hybrid WMN, the throughput of TCP …NewReno is good, but for I/B WMN, the throughput of TCP Tahoe is higher than other algorithms. For normal distribution, the delay and jitter of I/B WMN are lower compared with Hybrid WMN, while for uniform distribution, the delay and jitter of TCP NewReno are a little bit lower compared with other algorithms. The fairness index of normal distribution is higher than uniform distribution. Show more
Keywords: Genetic algorithms, wireless mesh networks, NS-3, network architecture, OLSR, multiple flows, TCP congestion-avoidance algorithm, SGC, NCMC, client distributions
DOI: 10.3233/JHS-170563
Citation: Journal of High Speed Networks, vol. 23, no. 2, pp. 163-173, 2017
Authors: Gentile, Ugo | Bernardi, Simona | Marrone, Stefano | Merseguer, José | Vittorini, Valeria
Article Type: Research Article
Abstract: Critical infrastructures are complex networked systems. They must be able to provide essential services, even when they are compromised by intentional or accidental threats. Guaranteeing essential services means to ensure survivability with an adequate Quality of Service (QoS). This paper proposes a model-driven approach for the assessment of survivability requirements. In particular, we propose a graphical Survivability Assessment Model (SAM), based on UML. It is automatically derived from a UML specification that encompasses essential services, service modes, threats and survivability strategies. Furthermore, model-driven techniques are used to assess the SAM. Then, we propose some preliminary property verifications to discover flaws …in the specification. The model driven paradigm is used to ensure high level of usability and abstraction of the artifacts that are key issues in communication among stakeholders. The approach has been applied to a scaled-down model of a smart grid, an evolution of traditional power grids based on high performance and dependable computer networks. Show more
Keywords: Security requirement elicitation, UML misuse case, service survivability, model transformations, networked systems security
DOI: 10.3233/JHS-170564
Citation: Journal of High Speed Networks, vol. 23, no. 2, pp. 175-186, 2017
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]