Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 135.00Impact Factor 2024: 0.7
This journal publishes papers on a number of topics ranging from design to practical experiences with operational high performance/speed networks.
The topics covered will include but not be limited to:
- Communication network architectures
- Evolutionary networking protocols, services and architectures
- Network Security
Authors: Bendaoud, Fayssal
Article Type: Research Article
Abstract: Nowadays, mobile users are equipped with multi-mode terminals allowing them to connect to different radio access technologies like WLAN, 3G (HSPA and HSPA+), and Long term evolution (LTE) each at a time. In this context, the challenge of the next-generation networks is to achieve the Always Best Connected (ABC) concept. To this end, solving the problem of selecting the most suitable radio access technology (RAT) from the list of available RAT is at the heart of the next-generation systems. The decision process is called access network selection and it depends on several parameters, such as quality of service, mobility, cost …of each RAT, energy consumption, battery life, etc. Several methods and approaches have been proposed to solve the network selection problem with the fundamental objective which is to offer the best QoS to the users and to maximize the usability of the networks without affecting the users’ experience. In this paper, we propose an adaptive KNN (K nearest neighbour) based algorithm to solve the network selection problem, the proposed solution has a low computation complexity with a high level of veracity is compared with the well-known MADM methods. Show more
Keywords: KNN, QoS, network selection, RAT, LTE, HSPA, MADM
DOI: 10.3233/JHS-210669
Citation: Journal of High Speed Networks, vol. 27, no. 4, pp. 305-318, 2021
Authors: Barolli, Admir | Bylykbashi, Kevin | Qafzezi, Ermioni | Sakamoto, Shinji | Barolli, Leonard | Takizawa, Makoto
Article Type: Research Article
Abstract: Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost and high robustness. Connectivity and stability directly affect the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous work, we implemented a simulation system to solve the node placement problem in WMNs considering Particle Swarm Optimization (PSO) and Distributed Genetic Algorithm (DGA), called WMN-PSODGA. In this paper, we compare chi-square and uniform distributions of mesh clients for different router replacement methods. The router replacement …methods considered are Constriction Method (CM), Random Inertia Weight Method (RIWM), Linearly Decreasing Inertia Weight Method (LDIWM), Linearly Decreasing Vmax Method (LDVM) and Rational Decrement of Vmax Method (RDVM). The simulation results show that for chi-square distribution the mesh routers cover all mesh clients for all router replacement methods. In terms of load balancing, the method that achieves the best performance is RDVM. When using the uniform distribution, the mesh routers do not cover all mesh clients, but this distribution shows good load balancing for four router replacement methods, with RIWM showing the best performance. The only method that shows poor performance for this distribution is LDIWM. However, since not all mesh clients are covered when using uniform distribution, the best scenario is chi-square distribution of mesh clients with RDVM as a router replacement method. Show more
Keywords: WMN, PSO, SA, DGA
DOI: 10.3233/JHS-210670
Citation: Journal of High Speed Networks, vol. 27, no. 4, pp. 319-334, 2021
Authors: Xu, Jie | Zhou, Wenhui | Zhang, Suzhi | Fu, Jinhua
Article Type: Research Article
Abstract: With the vigorous development of blockchain technology represented by bitcoin, blockchain technology has gradually entered the stage of blockchain 3.0 characterized by “programmable society”. And the application of blockchain technology in all walks of life has achieved actual results. Blockchain technology has typical characteristics of decentralization, Tamper-resistant data, information openness and transparency, and natural fit with the application requirements in the field of certificate tracing, which makes the development of the applications of blockchain deposit and traceability in full swing. First, this paper describes the concept, application process, key technology of blockchain deposit and traceability, the three application architectures of …blockchain deposit and traceability, and the overall architecture of its system. Then, it introduces the application of scenarios and the blockchain deposit and traceability in various fields. Next, it discusses the issues existing in the development of the application of blockchain deposit and traceability. Finally, the paper also expresses the best wishes for the future of its application. Show more
Keywords: Blockchain, deposit, traceability, bitcoin, programmable society
DOI: 10.3233/JHS-210671
Citation: Journal of High Speed Networks, vol. 27, no. 4, pp. 335-359, 2021
Authors: Althumali, Huda | Othman, Mohamed | Noordin, Nor Kamariah | Mohd Hanapi, Zurina
Article Type: Research Article
Abstract: Machine-to-machine (M2M) communications on Long-term evolution (LTE) networks form a substantial part for the Internet-of-things (IoT). The random access procedure is the first step for M2M devices to access network resources. Many researchers have attempted to improve the efficiency of the random access procedure. This work revisits the performance of the hybrid random access protocols which combine congestion control techniques with collision resolution techniques. In particular, we investigate two hybrid protocols. The first one combines the pre-backoff (PBO) with tree random access (TRA), and the second one combines dynamic access barring (DAB) with TRA. The probability analysis is presented for …both protocols. The performance is evaluated based on the access success rate, the mean throughput, the mean delay, the collision rate and the mean retransmissions. The simulation results show that the hybrid protocols achieve the highest success rate and throughput with moderate delay and low collision rates with a lower mean number of retransmissions compared to three benchmarks that apply either a congestion control or a collision resolution. The opportunities of future developments of hybrid protocols are listed at the end of this paper to highlight the issues that could be investigated to improve the performance of hybrid random access protocols. Show more
Keywords: LTE/LTE-A networks, machine-to-machine, massive access, random access control
DOI: 10.3233/JHS-210672
Citation: Journal of High Speed Networks, vol. 27, no. 4, pp. 361-380, 2021
Authors: Whaiduzzaman, Md | Farjana, Nishat | Barros, Alistair | Mahi, Md. Julkar Nayeen | Satu, Md. Shahriare | Roy, Shanto | Fidge, Colin
Article Type: Research Article
Abstract: Fog computing complemented cloud computing integration services in the Internet of Things (IoT) and the web of real-time interactivity. Fog offers faster computing and other services facilities sitting close to user applications. However, secure data transfer in the fog is still a challenging issue requiring attention and efficient deployment of a secure data security scheme. We present an Identity Based Encryption (IBE) scheme to secure data security and transmission in fog clouds and IoT ecosystems. We devise and develop a four-level Hierarchical Identity Based Architecture for Fog Computing (HIBAF) data security scheme to enhance data security. We also analyze the …system’s performance regarding response time, CPU utilization, run-time encryption-decryption, and key generation time in the fog computing paradigm to an increasing number of users data-loads. Moreover, we evaluate our scheme and compare the outcomes with different cryptography structures to discern our scheme’s effectiveness. Furthermore, we also evaluate secret key updating time, re-encrypted key updating time, and file revoking time by launching DDoS attacks both in the cloud and fog computing environment to compare improvements of HIBAF in the fog computing paradigm. Finally, through this overall evaluation, we have found that the developed HIBAF scheme provides a 33% performance enhancement in a fog environment in terms of data processing, provision, and management compared to the cloud environment. Show more
Keywords: Fog computing, cloud computing, data security, identity based integration, cryptographic scheme
DOI: 10.3233/JHS-210673
Citation: Journal of High Speed Networks, vol. 27, no. 4, pp. 381-402, 2021
Authors: Srivatsan, K.
Article Type: Research Article
Abstract: Signal filtering acts as one of the basic requirement of communication networks for the removal of unwanted features from the signal. The design of appropriate digital filter requires the selection of optimal filter coefficients for the generation of desired frequency response with reduced hardware complexity. This paper proposes a hybrid optimization algorithm named as Brain Storm- Grey Wolf Optimizer (BSGWO) algorithm for the selection of filter coefficients in the design of factored truncated cascade FIR filter. The proposed algorithm is the hybridization of the optimization algorithms, namely Brain Storm Optimization (BSO) and Grey Wolf Optimizer (GWO). The input signal is …interpolated initially for the formation of an intermediate signal using the FIR filter. Then, the factored truncated cascade filter is developed for the interpolation of the signal. After designing the filter coefficients, the optimal selection of the filter coefficients is performed using the proposed BSGWO algorithm. The original filter is developed with the use of the least square estimation and the new filter is developed using the proposed algorithm that tunes the filter coefficients. The performance of the proposed system is analyzed using the metrics, such as fitness, Mean Absolute Error (MAE), magnitude, and the number of components. The proposed method produces minimum fitness, MAE, magnitude and number of components of 0.05, 0.0155, − 96.0 dB and 3372, respectively that shows the effectiveness of the proposed method. Show more
Keywords: FIR filter, filter coefficients, frequency response, cascade filter, and least square estimation
DOI: 10.3233/JHS-210674
Citation: Journal of High Speed Networks, vol. 27, no. 4, pp. 403-420, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl