Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 135.00Impact Factor 2024: 0.7
This journal publishes papers on a number of topics ranging from design to practical experiences with operational high performance/speed networks.
The topics covered will include but not be limited to:
- Communication network architectures
- Evolutionary networking protocols, services and architectures
- Network Security
Authors: Ahmadi, Mahmood | Zadkhosh, Ehsan
Article Type: Research Article
Abstract: The bandwidth growth of networks increased almost exponentially in the recent years and is expected to continue so for years to come. This has been fuelled by emerging new technologies that are capable of achieving higher bandwidths. Consequently, new applications are being developed that take advantage of the new capabilities. These complex applications and heavier traffic have emerged demands on more powerful devices. Furthermore, due to dynamic nature of network traffic, totally scalable methods for packet processing and implementation platforms that are able to cope with this dynamicity are needed. Field-Programmable Gate Arrays (FPGAs) are efficient candidates as they contain …hardware programmable logic units that can be reconfigured based on the application requirements. ρ -VEX is a reconfigurable soft-core Very Long Instruction Word (VLIW) processor on an FPGA and it is able to use the inherit Instruction Level Parallelism (ILP) of applications. ρ -VEX has all the requirements of processing network applications. For the purpose of scalability and economical reasonability, in this paper, an implementation of CRC called one-clock CRC (OC-CRC) as a customized instruction in ρ -VEX is presented. Using this customization, one of packet classification algorithms that have taken advantage of Bloom filter e.g. tuple pruning using Bloom filter is implemented. CRC is selected as a custom instruction because of its importance in Bloom filter as hashing function and error detection in the most of the layer of common protocol stacks. The results show the huge performance gap between General Purpose (GPP) processors and our customized ρ -VEX such that our customized ρ -VEX provided on average approximately 8× speedup. Show more
Keywords: Very long instruction word, one-clock CRC, Bloom filter, packet classification
DOI: 10.3233/JHS-160541
Citation: Journal of High Speed Networks, vol. 22, no. 3, pp. 177-192, 2016
Authors: Liu, Fagui | Deng, Dacheng
Article Type: Research Article
Abstract: With the growing application of services on the basis of physical networks and Internet of Things devices, service composition based on quality of service (QoS) has attracted wide attention. However, QoS-aware service composition with multiple QoS constraints is time consuming work. Given the evident user preference for QoS, we propose a service composition framework and a QoS-aware method incorporating local and global optimization models. Candidate services are preprocessed and assigned different priority levels based on local optimization. The priority weight of quality attributes is obtained by a fuzzy analytic hierarchy process and the approximate optimal composite service is derived by …global optimization for multiple QoS constraints. Simulations verify the proposed method outperforms traditional integer programming (IP) and genetic algorithm, particularly for large scale datasets, providing near optimal solutions with significantly less time cost. Show more
Keywords: Network service, service composition, user preference, quality of service, multiple constraints
DOI: 10.3233/JHS-160542
Citation: Journal of High Speed Networks, vol. 22, no. 3, pp. 193-204, 2016
Authors: Tandjaoui, Amel F. | Kaddour, Mejdi
Article Type: Research Article
Abstract: Despite the abundance of the optimization models proposed so far in the literature to improve the performance or to reduce the deployment costs of wireless mesh networks, only a few works have addressed explicitly the minimization of spectrum utilization in these networks. Considering the scarcity of this critical resource mainly caused by the tremendous recent developments in wireless technologies, we address in this paper the problem of minimizing the number of used radio channels while satisfying a set of end-to-end traffic demands. We formulate to this end a mixed-integer linear program as a cross-layer optimization approach acting on various aspects, …such as channel assignment, power control, medium access and flow routing. Due to the expensive computational costs required to find exact solutions, we propose various approximation schemes that provide near-optimal results in a reasonable amount of time. We illustrate the impact of various parameters such as radio patterns, requested traffic loads, network density on the total required spectrum. Results show how a knowledgeable exploitation of spatial reuse can save significantly spectrum utilization. Show more
Keywords: Wireless mesh networks, channel assignment, spectrum usage, physical interference model, SINR, power control, MILP
DOI: 10.3233/JHS-160543
Citation: Journal of High Speed Networks, vol. 22, no. 3, pp. 205-221, 2016
Authors: Yang, Wei-Dong | Gao, Ze-Ming | Wang, Ke | Liu, Hong-Yue
Article Type: Research Article
Abstract: It has been envisioned that vehicular ad hoc networks (VANETs) would play an important role in future traffic monitoring applications. This paper investigates how VANETs can overcome the strictly limited bandwidth and privacy issues. Firstly, an aggregation scheme is presented to minimize the required overall bandwidth. Subsequently, a privacy algorithm capable of ensuring user privacy in applications is proposed. This proposed mechanism can not only protect the private data of each individual against the adversaries with arbitrary auxiliary information, but also achieve the optimal accuracy of aggregates. Through simulations, the viability of this approach is confirmed.
Keywords: VANETs, data aggregation, differentially private
DOI: 10.3233/JHS-160544
Citation: Journal of High Speed Networks, vol. 22, no. 3, pp. 223-230, 2016
Authors: Guerar, Meriem | Benmohammed, Mohamed | Alimi, Vincent
Article Type: Research Article
Abstract: We are witnessing a growing demand for ATM authentication solutions that overcome the limitations of the de facto standard mechanism based on magnetic card and numeric PIN, that has revealed to be weak against ATM-specific attacks (e.g., skimming and recording attacks). An emerging trend is relying on smartphones as a carrier for authentication. However, authentication mechanisms based on the use of a smartphone requires the same mechanisms to be resilient to new, smartphone-specific threats like device theft and common attacks like shoulder-surfing attacks and spyware. In this paper, we propose a new ATM authentication mechanism called Color Wheel Pin …which combines a usable ATM authentication mechanism with robustness against both generic and smartphone and ATM specific security threats. Show more
Keywords: ATM, authentication, mobile security
DOI: 10.3233/JHS-160545
Citation: Journal of High Speed Networks, vol. 22, no. 3, pp. 231-240, 2016
Authors: Xiao, Xian-cui | Zheng, Xiang-wei
Article Type: Research Article
Abstract: People heavily depend on Internet in their daily lives and propose diversified requirements, such as security and privacy. Network virtualization is considered a promising approach to overcome the disadvantages of the current networks. Therefore, how to reduce the node or link failures resulting from network outages and achieve high-quality network services should be the goal for Internet service providers to improve network security and quality of service. For network survivability, a failure protection mechanism that reserves secondary resources before any failure occurs is presented in this paper. In this study, network link resources are divided into primary and secondary flow …resources. Primary flow resources are used under normal network operation, whereas secondary flow resources are used as backup resources when the network fails. When a VN request arrives, a survivable VN embedding algorithm based on a group search optimizer (GSVNE) is employed to search for optimal embedding solutions. The resource allocation proportions of the primary and secondary flow resources can be dynamically adjusted. Simulation results show that GSVNE outperforms the conventional greedy algorithm, which reflects desirable results in authoritative papers, in terms of cost and acceptance rate. Show more
Keywords: Security, survivability, Group Search Optimizer (GSO), primary and secondary resource flow
DOI: 10.3233/JHS-160546
Citation: Journal of High Speed Networks, vol. 22, no. 3, pp. 241-251, 2016
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]