-------- Original-Nachricht -------- Betreff: [isworld] Content Alert: IJBDCN Datum: Sun, 1 Mar 2009 22:59:03 -0500 Von: Varadharajan Sridhar sridhar@mdi.ac.in Antwort an: Varadharajan Sridhar sridhar@mdi.ac.in An: AISWORLD Information Systems World Network isworld@lyris.isworld.org
The contents of the latest issue of:
International Journal of Business Data Communications and Networking (IJBDCN) Official Publication of the Information Resources Management Association Volume 5, Issue 1, January-March 2009 Published: Quarterly in Print and Electronically ISSN: 1548-0631 EISSN: 1548-064X Published by IGI Publishing, Hershey-New York, USA www.igi-global.com/ijbdcn
Co-Editor-in-Chief: Debashis Saha, Indian Institute of Management (Calcutta), India
Co-Editor-in-Chief: Varadharajan Sridhar, Management Development Institute, India
EDITORIAL PREFACE:
IJBDCN 5(1)
Jairo Gutiérrez, University of Auckland, New Zealand Debashis Saha, Indian Institute of Management, India Varadharajan Sridhar, Management Development Institute, India
This first issue of 2009 marks the start of IJBDCN�s fifth year and a change of the editorial guard. Professors Debashis Saha from the Indian Institute of Management (IIM) Calcutta (India) and the Management Development Institute (India) have been Associate Editors of the journal from its inception and will assure the continued success of our publication as Co-Editors-in-Chief. There has been a huge paradigm shift in the Data communication and networking (DCN) technology from an orderly, predictable, moderate but-steady growth industry to a chaotic marketplace of disruptive technologies, rapidly changing regulations, complex mergers and acquisitions, and inorganic growth. The evolving technology trends have necessitated the development of newer tools and methodologies to analyze network behavior. As complex network systems are being deployed, there is a growing need for sophisticated analysis of network protocol behavior and network traffic.
To read the preface, please consult this issue of IJBDNC in your library.
PAPER ONE:
Fairness Analysis and Improvement of Transport Layer Protocols
D. Tegze, Budapest University of Technology and Economics, Hungry G. Hosszú, Budapest University of Technology and Economics, Hungry F. Kovács, Budapest University of Technology and Economics, Hungry
The article presents a comparison of fairness properties of different congestion control schemes. It is difficult to investigate the various protocol mechanisms implemented in transport protocols; therefore a simulator called SimCast is developed for the analysis of fairness characteristics of transport protocols, as well as a network traffic generator and measurement tool called SimTest. This article provides the operation and basic properties of these evaluation systems together with some simulation and measurement results. The article also presents a fairness based bandwidth control mechanism, called the Balancer method. The efficiency of this control method is presented through simulation results.
To obtain a copy of the entire article, click on the link below. http://www.infosci-on-demand.com/content/details.asp?ID=30838
PAPER TWO:
Rembassy: Open Source Tool For Network Monitoring
Vreixo Formoso, University of A Coruña, Spain Fidel Cacheda, University of A Coruña, Spain Víctor Carneiro, University of A Coruña, Spain Juan Valiño, University of A Coruña, Spain
Even though monitoring tools are essential to the management of communications networks, open source applications still confront their potential users with considerable problems. This article analyzes the limitations of the currently existing tools and presents the development of a new tool that solves most of those problems. The tool is based on a new architecture of objects and remote method invocation and allows both centralized and distributed monitoring. Its configuration through Web interface, support to monitoring templates, and flexibility make it particularly interesting for a large number of users in search of a strong but easily configurable system. The proposed extension system is based on plug-ins. The configuration simplicity and other essential improvements of the proposed system are tested in a real environment.
To obtain a copy of the entire article, click on the link below. http://www.infosci-on-demand.com/content/details.asp?ID=30839
PAPER THREE:
Improvement of Simulative Analysis in Ad Hoc Networks
M. Fazio, Università di Messina, Italy M. Villari, Università di Messina, Italy A. Puliafito, Università di Messina, Italy.
Ad hoc networks present special issues that often make classical approaches for network analysis insufficient. In this paper, the authors propose a new methodology to study communication protocols and architectures in ad hoc networks. Usually, solutions for ad hoc scenarios are analyzed and evaluated through simulative tools. This article shows limitations of the traditional simulative approach and the improvements that the discrete fourier transform analysis can produce. In this article, the authors propose methodology advantages and examine the efficiency from using simulative investigation approaches.
To obtain a copy of the entire article, click on the link below. http://www.infosci-on-demand.com/content/details.asp?ID=30840
PAPER FOUR:
On a Modified Backoff Algorithm for MAC Protocol in MANETs
Saher S. Manaseer, University of Glasgow, UK Mohamed Ould-Khaoua, University of Glasgow, UK Lewis M. Mackenzie, University of Glasgow, UK
In wireless communication environments, backoff is traditionally based on the IEEE binary exponential backoff (BEB). Using BEB results in a high delay in message transmissions, collisions, and then leads to ultimately wasting the limited available bandwidth. As each node has to obtain medium access before transmitting a message, in dense networks the collision probability in the medium access control (MAC) layer becomes very high, when a poor backoff algorithm is used. The logarithmic algorithm proposes improvements to the backoff algorithms that aim to efficiently use the channel and to reduce collisions. The algorithm under study is based on changing the incremental behavior of the backoff value. BEB uses a uniform random distribution to choose the backoff value, which often leads to reducing the effect of a window-sized increment. This paper carries out a deeper study and analysis of the logarithmic backoff algorithm that uses logarithmic increments.
To obtain a copy of the entire article, click on the link below. http://www.infosci-on-demand.com/content/details.asp?ID=30841
****************************************************************** For full copies of the above articles, check for this issue of the International Journal Business Data Communications and Networking (IJBDCN) in your institution's library. This journal is also included in the IGI Global aggregated �InfoSci-Journals� database: www.infosci-journals.com. ******************************************************************
CALL FOR PAPERS
Mission of IJBDCN:
The mission of the International Journal of Business Data Communications and Networking (IJBDCN) is to disseminate practical and theoretical information, which will enable readers to understand, manage, use, and maintain business data communication networks more effectively. IJDBCN addresses key technology, management, and policy issues for utilizing data communications and networking in business and the current best practices for aligning this important technology with the strategic goals of the organization.
Coverage of IJBDCN:
IJBDCN covers the principles of both wired and wireless communications of voice, data, images, and video and the impact of their business values on the organizations in which they are used. It includes theoretical and practical works, relevant case studies, topical surveys, and research articles that address problems faced by telecommunication service providers, equipment manufacturers, enterprises, and policy makers in the areas of data communications and networking.
Topics should be drawn from, but not limited to, the following areas:
Adoption and diffusion of networking technologies Business applications of telecommunications Business implications of public WWANs and WLANs deployment Business re-engineering issues associated with networking Cross-border network-based information systems Designing, deploying, and using networked systems in specialized sectors (i.e. health, education, manufacturing) Effects of legislation and regulation on telecommunications Emerging networking trends Frameworks for wireless security Impact of the open source movement on business data communications Management of business data communications projects Management of telecommunications in organizations Mobility and m-commerce issues Network management contingency issues Organizational impact of e-commerce connectivity Outsourcing of networking and data communication services Policy-based network management systems Policy-based security systems Quality of service issues associated with networked systems Security of interconnected systems (procedures, implementation, mechanisms, protocols, and compatibility) Standards and network interoperability issues Strategic use of networking technologies Success factors of networked systems Telecommuting, remote access, and virtual private networks Usability of business data communication networks Use of distributed services (Web services/DCOM/CORBA) over wireless networks
Interested authors should consult the journal's manuscript submission guidelines at www.igi-global.com/ijbdcn.
All inquiries and submissions should be sent to: Editors-in-Chief: Debashis Saha at ds@iimcal.ac.in or Varadharajan Sridhar at Sridhar@mdi.ac.in ============================ V. Sridhar Visiting Research Fellow Sasken Communication Technologies Bangalore, INDIA M: +919972595708 Email: c_sriv@sasken.com ============================
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann@wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.