luminita scripcariu | Technical University of Iasi (original) (raw)
Papers by luminita scripcariu
2023 International Symposium on Signals, Circuits and Systems (ISSCS)
2023 International Symposium on Signals, Circuits and Systems (ISSCS)
IOP Conference Series: Materials Science and Engineering, 2020
Our research work focuses on the security techniques applied on a software-defined network (SDN),... more Our research work focuses on the security techniques applied on a software-defined network (SDN), designed for a smart city. Information security is essential for the good functionality of the applications used in a smart city. Information should be correct and complete otherwise the ‘life’ of the city can be compromised by various cyberattacks targeting, for example, the public transportation system, the traffic information on highways or location services for emergency crews and many others. Securing all devices connected to the SDN, including end-user devices, wireless sensors, smart home equipment is essential because various cyberattacks may be launched and the smart city may be disturbed. This paper presents a risk analysis, the ways to choose the security solutions according to the smart city security policy and our proposal for the SDN security system. We compare different security techniques and present some recommended solutions.
Convolutional codes are used as error-correction techniques over unreliable noisy channels in com... more Convolutional codes are used as error-correction techniques over unreliable noisy channels in communication processes that do not support message retransmission. Many communication devices, such as satellite receivers, use convolutional codes as channel coding techniques that are usually denoted as Forward-Error-Correction (FEC). In this paper, the design of a convolutional encoder with three flip-flops, in CMOS technology, with 1.2 V DC voltage source is done. This circuit is intended to be included in portable devices, powered by rechargeable batteries. A simulation of the designed circuit is presented in order to analyze its behavior in various conditions.
This research work aims at designing an application for high education students and teachers that... more This research work aims at designing an application for high education students and teachers that implements a smart school with online courses, seminars, and information technology laboratories. The teachers must have digital competencies for online teaching, appropriate hardware support and a good Internet connection. The organizing way of the course, seminar and laboratory activities allows creating the intended competencies for students and increasing their motivation for study. One goal of these online activities is to offer flexibility and adaptability to the student needs and personality. Some of them enjoy day activities while others prefer night hours to learn. So, video tutorials are a good solution for all students because any of them can follow the course at his own pace. Testing students is an important aspect to check the understanding degree of the topics taught. Teachers have to check carrying out the laboratory works and the seminars homework by all students. Therefore, all students must submit the results of the exercises, the projects and quizzes’ solutions online, within certain deadlines. The online catalog records students’ grades. We intend the smart school application to run on any device connected to the Internet, with cloud services offered by the faculty servers and secured access. The design of a smart school of electrical engineering is exemplified.
This paper performs a verification of some innovative training methods recently proposed by the a... more This paper performs a verification of some innovative training methods recently proposed by the authors for training students in Computer Networks and Network Security within the frame of current trends in Technical and Vocational Education, based on a meta-analysis conducted by researchers in Europe, Asia and North America [1]. Focus is set on research methodology, apprenticeship-like training, teaching and evaluation methods and the use of information technologies in technical and vocational education. We conclude that the analyzed innovative training methods are deducted as being representative from the point of view of both conceptual and research papers, being based on case-studies and covering a wide majority of data sources considered valid for Technical and Vocational Education. Further development of the training methods by the authors is aimed through the introduction of a new “Internet of Things” course at the “Gheorghe Asachi” Technical University of Iasi, Romania.
Data Encryption Standard (DES) was initially considered a strong symmetric encryption algorithm, ... more Data Encryption Standard (DES) was initially considered a strong symmetric encryption algorithm, resistant to all known cryptographic attacks at that time [1]. But the short key used to encrypt data is a weakness of the algorithm. Increasing the data structure size and the key length are two recommended measures that ensure the strength of the encryption algorithm. The running-time is a constraint imposed to the design of the algorithm that restricts its applicability at a moment. Triple-DES (TDES) with 128-bit key will be considered as a candidate to Advanced Encryption Standard (AES) after 2020 when the technology is estimated to be sufficiently developed to run fast enough TDES [2]. Regarding the time, DES can be a good candidate to AES if it is applied on multi-bit symbols instead of bits. We propose an extension of DES algorithm to Galois Fields (GF), with an encryption key of at least 256-bit long. The substitution boxes (S-boxes) are the non-linear component of the algorithm that is decisive for its robustness. The design of multi-bit S-boxes is done using bijective polynomials defined on Galois Fields. DES-256 running on GF (16), with 4-bit symbols, is proposed and presented with all the details.
This paper is focused on the weakness of the Advanced Encryption Standard (AES) provided by the s... more This paper is focused on the weakness of the Advanced Encryption Standard (AES) provided by the substitution step of the algorithm, which replaces each input data byte with a fix value provided by a static substitution box (S-box) [1]. Efficiently attacks on software programs secured by AES, are concentrated on whitening the S-box, in order to compromise the encryption key and the private information [2]. We propose an algebraic substitution method which dynamically modifies the “S-box”, based on a key sequence and a mathematic function operating on the Galois Field with 8-bit elements. The algorithm will be more robust under cryptographic attacks and the security of the system will be considerably improved.
Encryption algorithms are commonly used to ensure data confidentiality and integrity in different... more Encryption algorithms are commonly used to ensure data confidentiality and integrity in different communication systems and networks [1]. Public or private encryption keys can be used, depending on the specific of each service and application. One of the most performing public encryption algorithms is RSA (Rivest-Shamir-Adleman) [2]. Some private encryption algorithms, also called symmetric algorithms, are DES (Data Encryption Standard), TDES (Triple DES) and AES (Advanced Encryption Standard) [3]. These algorithms use different length of the encryption keys, from 64-bits up to 256-bits. Longer encryption keys increase the robustness of the algorithms against the brute force attack. The correlation between the plain-text and the cipher-text can be exploited by the attackers to deduce the encryption key or, directly, the original data. Therefore it is important to reduce the correlation between the initial message and the encoded version of it using enlarged data structures for block encryption algorithm, longer encryption key sequences and non-linear operations. The major goal of this paper is the study of correlation in different cases of modified encryption techniques.
This paper is intended to present the vulnerabilities of the sign-on methods especially those cau... more This paper is intended to present the vulnerabilities of the sign-on methods especially those caused by users when trying to access various network services using a single account and the same password for all of them. The sign-on process is more secure by the mean of two-factor authentication and different security standards but still there are some weaknesses that need to be eliminated so different solutions, new or already used, are discussed in order to increase the security level of the access to the network.
Ensuring information security is a necessity in cyberspace. A lot of information is available onl... more Ensuring information security is a necessity in cyberspace. A lot of information is available online in a visual form so, if an image must be kept private, it needs to be encrypted. But usually any image processing algorithm requires many computing resources and time, especially if the image has a high-definition. Therefore, an image encryption algorithm has to be designed differently than those used to encrypt general data. We propose an image encryption algorithm that combines all known encryption techniques (permutation, substitution and key addition), that has very good performances in comparison of traditional encryption standards and it is also fast, simple and easy to implement. The proposed algorithm, so-called Light Encryption Algorithm (LEA), is applied on standard test images and some performance metrics are computed in order to analyze its performances and to compare them to those of other well-known encryption techniques.
IOP conference series, Aug 2, 2019
The environmental parameters (temperature, relative humidity, UV factor, light intensity and othe... more The environmental parameters (temperature, relative humidity, UV factor, light intensity and others) of an indoor exhibition space must be monitored and controlled in order to ensure proper conditions for artifacts' preservation. This can be done by a monitoring, alert and control system (MACS) consisting of a sensor network, a communication infrastructure and a central processing device. Data are measured and collected by sensors, sent by the communication network and, finally, stored and processed into the central node (NC). Based on the analysis of data, decisions are made, alerts are sent to the responsible personnel, by short messages to the mobile phone or by email, and commands are sent to the actuators in order to turn on the environmental control devices (air conditioners, heating or light control devices and others). The goal of MACS is to provide efficiently and economically a stable quality of the indoor exhibition environment. A case study is done for an exhibition room from the Metropolitan Museum of Iasi.
The RSA algorithm proposed by Rivest, Shamir and Adleman as a public key cryptosystem is used in ... more The RSA algorithm proposed by Rivest, Shamir and Adleman as a public key cryptosystem is used in different communication networks in order to ensure data confidentiality. Different weaknesses of this algorithm could be observed and many attacks against it are developed successfully. Improving this algorithm was performed in this paper in order to ensure a higher data security and an
Advanced Encryption Standard (AES) is a widely used encryption algorithm considered to be the mos... more Advanced Encryption Standard (AES) is a widely used encryption algorithm considered to be the most safe and robust algorithm, recommended for governmental and military applications. It is a secret-key encryption algorithm that can use a 128-bit, 192-bit or 256-bit key. The goal of cryptanalysis is to find the encryption key and/or read the information. A detailed analysis of the AES mathematical algorithm and some vulnerabilities identification represent the purpose of this paper. The linearity, identity element for addition or identity element for multiplication are checked for each stage of the algorithm. Particular weak values that can be inserted in the data stream by an attacker in order to get the encryption key are found.
IOP conference series, Jun 1, 2018
Exhibited textile-materials-based artefacts can be affected by the environmental conditions. A sm... more Exhibited textile-materials-based artefacts can be affected by the environmental conditions. A smart monitoring system that commands an adaptive automatic environment control system is proposed for indoor exhibition spaces containing various textile artefacts. All exhibited objects are monitored by many multi-sensor nodes containing temperature, relative humidity and light sensors. Data collected periodically from the entire sensor network is stored in a database and statistically processed in order to identify and classify the environment risk. Risk consequences are analyzed depending on the risk class and the smart system commands different control measures in order to stabilize the indoor environment conditions to the recommended values and prevent material degradation.
MATEC web of conferences, 2017
Our paper presents a short overview of the educational methods used in the learning process in te... more Our paper presents a short overview of the educational methods used in the learning process in telecommunication domain, targeting skills and competences students acquire and develop during the semester and focusing on the ones that are most valuable and appreciated on the labor market after graduation. Our research of the market shows that besides basic engineering knowledge, skills like initiative, team-playing, business analysis, decision-making, marketing and creative project presentation are considered very valuable assets by HR recruiters. We implement and test an improved method that combines classic techniques with the use of modern digital tools, emphasizing on specific tasks that coach the student how to deal with real markets, extract valuable data through analysis, design up-to-date computer-networks, make correlated decisions based also on economic arguments, team working and assume responsibilities. This is achieved through a real-case study and project themes for computer-networks that involve real situations with technical and budgetary challenges, market analysis and research through online facilities and dealing with specialized software for network design and simulation with a creative presentation. The presented approach is intended to prepare faculty staff to implement innovative and self-improving teaching methods in engineering educational process and thus make an educational reform happen [1].
In this paper we describe an assessment quiz tool and how it has been integrated in our lecture c... more In this paper we describe an assessment quiz tool and how it has been integrated in our lecture courses of physics in a powerful way. Our experience demonstrates that this computational method appears to be one of the most preferred modes of instruction. The topics within the quizzes make them an efficient tool. The web-design and database are elaborated using PHPTriad and MySQL programs. PHPTriad is a powerful program that contains the main modulus composed by a server running in Apache, the connection with the database which is elaborated in MySQL and, also, the connection with the web-design through PHP-html. MySQL is recognized for superior ease of use, performance, and reliability. It is a program designed for the creation and administration of databases. It provides security to the online quizzes which are password protected with Java Script. The online quizzes are designed to remedy some of the students' deficiencies and help them to their homework. The online test is a reliable tool for the content and structure of students' knowledge of physics.
ABSTRACT Nowadays the need for wireless communication services and networks is continuously incre... more ABSTRACT Nowadays the need for wireless communication services and networks is continuously increasing for different kind of mobile applications (commercial, entertainment, military, aeronautics, navigation, etc.) Bandwidth management is an important task of the administrative tool to provide quality of service (QoS) for real time applications (voice, video and so on). IEEE 802.11 standard is widely used in the unlicensed 2.4 GHz frequency band and we will refer to it as a wireless communication network. TCP/IP (Transmission Control Protocol/Internet Protocol) does not offer any guaranties for QoS, so a special procedure is needed for resource reservation, especially for bandwidth prior allocation for real-time traffic. A different method to ensure the QoS of differentiated services is presented and some scenarios are analyzed.
This paper is adding recent trends and follow-ups on a previous overview on QoS for Satellite IP ... more This paper is adding recent trends and follow-ups on a previous overview on QoS for Satellite IP networks [1]. QoS classes defined by QoS functions and QoS parameters of the satellite network components can be mapped with IP QoS from the bottom to the top level. IP Multimedia System - IMS is considered as the core of the Next Generation Networks (NGN), the process of satellite access to IMS, including the transmission delay has been simulated [14]. A new QoS architecture that introduces optimization paths between layers and supplies advanced support for end-to-end QoS in IP satellite systems is analyzed [15]. A new software-defined architecture for next-generation satellite networks called SoftSpace [16] exploits concepts like network virtualization and software-defined radio in order to ease embedding of new services, apps or satellite communications technologies. A fuzzy satellite routing strategy for Non-Geo-stationary Earth Orbit satellite IP networks in order to meet multiple classes QoS requirements is being highlighted [17]. Design of a new algorithm for Radio Resource Management (RRM) with the purpose of increasing efficiency in multicast multimedia content transmission management over a satellite network is presented [18].
2023 International Symposium on Signals, Circuits and Systems (ISSCS)
2023 International Symposium on Signals, Circuits and Systems (ISSCS)
IOP Conference Series: Materials Science and Engineering, 2020
Our research work focuses on the security techniques applied on a software-defined network (SDN),... more Our research work focuses on the security techniques applied on a software-defined network (SDN), designed for a smart city. Information security is essential for the good functionality of the applications used in a smart city. Information should be correct and complete otherwise the ‘life’ of the city can be compromised by various cyberattacks targeting, for example, the public transportation system, the traffic information on highways or location services for emergency crews and many others. Securing all devices connected to the SDN, including end-user devices, wireless sensors, smart home equipment is essential because various cyberattacks may be launched and the smart city may be disturbed. This paper presents a risk analysis, the ways to choose the security solutions according to the smart city security policy and our proposal for the SDN security system. We compare different security techniques and present some recommended solutions.
Convolutional codes are used as error-correction techniques over unreliable noisy channels in com... more Convolutional codes are used as error-correction techniques over unreliable noisy channels in communication processes that do not support message retransmission. Many communication devices, such as satellite receivers, use convolutional codes as channel coding techniques that are usually denoted as Forward-Error-Correction (FEC). In this paper, the design of a convolutional encoder with three flip-flops, in CMOS technology, with 1.2 V DC voltage source is done. This circuit is intended to be included in portable devices, powered by rechargeable batteries. A simulation of the designed circuit is presented in order to analyze its behavior in various conditions.
This research work aims at designing an application for high education students and teachers that... more This research work aims at designing an application for high education students and teachers that implements a smart school with online courses, seminars, and information technology laboratories. The teachers must have digital competencies for online teaching, appropriate hardware support and a good Internet connection. The organizing way of the course, seminar and laboratory activities allows creating the intended competencies for students and increasing their motivation for study. One goal of these online activities is to offer flexibility and adaptability to the student needs and personality. Some of them enjoy day activities while others prefer night hours to learn. So, video tutorials are a good solution for all students because any of them can follow the course at his own pace. Testing students is an important aspect to check the understanding degree of the topics taught. Teachers have to check carrying out the laboratory works and the seminars homework by all students. Therefore, all students must submit the results of the exercises, the projects and quizzes’ solutions online, within certain deadlines. The online catalog records students’ grades. We intend the smart school application to run on any device connected to the Internet, with cloud services offered by the faculty servers and secured access. The design of a smart school of electrical engineering is exemplified.
This paper performs a verification of some innovative training methods recently proposed by the a... more This paper performs a verification of some innovative training methods recently proposed by the authors for training students in Computer Networks and Network Security within the frame of current trends in Technical and Vocational Education, based on a meta-analysis conducted by researchers in Europe, Asia and North America [1]. Focus is set on research methodology, apprenticeship-like training, teaching and evaluation methods and the use of information technologies in technical and vocational education. We conclude that the analyzed innovative training methods are deducted as being representative from the point of view of both conceptual and research papers, being based on case-studies and covering a wide majority of data sources considered valid for Technical and Vocational Education. Further development of the training methods by the authors is aimed through the introduction of a new “Internet of Things” course at the “Gheorghe Asachi” Technical University of Iasi, Romania.
Data Encryption Standard (DES) was initially considered a strong symmetric encryption algorithm, ... more Data Encryption Standard (DES) was initially considered a strong symmetric encryption algorithm, resistant to all known cryptographic attacks at that time [1]. But the short key used to encrypt data is a weakness of the algorithm. Increasing the data structure size and the key length are two recommended measures that ensure the strength of the encryption algorithm. The running-time is a constraint imposed to the design of the algorithm that restricts its applicability at a moment. Triple-DES (TDES) with 128-bit key will be considered as a candidate to Advanced Encryption Standard (AES) after 2020 when the technology is estimated to be sufficiently developed to run fast enough TDES [2]. Regarding the time, DES can be a good candidate to AES if it is applied on multi-bit symbols instead of bits. We propose an extension of DES algorithm to Galois Fields (GF), with an encryption key of at least 256-bit long. The substitution boxes (S-boxes) are the non-linear component of the algorithm that is decisive for its robustness. The design of multi-bit S-boxes is done using bijective polynomials defined on Galois Fields. DES-256 running on GF (16), with 4-bit symbols, is proposed and presented with all the details.
This paper is focused on the weakness of the Advanced Encryption Standard (AES) provided by the s... more This paper is focused on the weakness of the Advanced Encryption Standard (AES) provided by the substitution step of the algorithm, which replaces each input data byte with a fix value provided by a static substitution box (S-box) [1]. Efficiently attacks on software programs secured by AES, are concentrated on whitening the S-box, in order to compromise the encryption key and the private information [2]. We propose an algebraic substitution method which dynamically modifies the “S-box”, based on a key sequence and a mathematic function operating on the Galois Field with 8-bit elements. The algorithm will be more robust under cryptographic attacks and the security of the system will be considerably improved.
Encryption algorithms are commonly used to ensure data confidentiality and integrity in different... more Encryption algorithms are commonly used to ensure data confidentiality and integrity in different communication systems and networks [1]. Public or private encryption keys can be used, depending on the specific of each service and application. One of the most performing public encryption algorithms is RSA (Rivest-Shamir-Adleman) [2]. Some private encryption algorithms, also called symmetric algorithms, are DES (Data Encryption Standard), TDES (Triple DES) and AES (Advanced Encryption Standard) [3]. These algorithms use different length of the encryption keys, from 64-bits up to 256-bits. Longer encryption keys increase the robustness of the algorithms against the brute force attack. The correlation between the plain-text and the cipher-text can be exploited by the attackers to deduce the encryption key or, directly, the original data. Therefore it is important to reduce the correlation between the initial message and the encoded version of it using enlarged data structures for block encryption algorithm, longer encryption key sequences and non-linear operations. The major goal of this paper is the study of correlation in different cases of modified encryption techniques.
This paper is intended to present the vulnerabilities of the sign-on methods especially those cau... more This paper is intended to present the vulnerabilities of the sign-on methods especially those caused by users when trying to access various network services using a single account and the same password for all of them. The sign-on process is more secure by the mean of two-factor authentication and different security standards but still there are some weaknesses that need to be eliminated so different solutions, new or already used, are discussed in order to increase the security level of the access to the network.
Ensuring information security is a necessity in cyberspace. A lot of information is available onl... more Ensuring information security is a necessity in cyberspace. A lot of information is available online in a visual form so, if an image must be kept private, it needs to be encrypted. But usually any image processing algorithm requires many computing resources and time, especially if the image has a high-definition. Therefore, an image encryption algorithm has to be designed differently than those used to encrypt general data. We propose an image encryption algorithm that combines all known encryption techniques (permutation, substitution and key addition), that has very good performances in comparison of traditional encryption standards and it is also fast, simple and easy to implement. The proposed algorithm, so-called Light Encryption Algorithm (LEA), is applied on standard test images and some performance metrics are computed in order to analyze its performances and to compare them to those of other well-known encryption techniques.
IOP conference series, Aug 2, 2019
The environmental parameters (temperature, relative humidity, UV factor, light intensity and othe... more The environmental parameters (temperature, relative humidity, UV factor, light intensity and others) of an indoor exhibition space must be monitored and controlled in order to ensure proper conditions for artifacts' preservation. This can be done by a monitoring, alert and control system (MACS) consisting of a sensor network, a communication infrastructure and a central processing device. Data are measured and collected by sensors, sent by the communication network and, finally, stored and processed into the central node (NC). Based on the analysis of data, decisions are made, alerts are sent to the responsible personnel, by short messages to the mobile phone or by email, and commands are sent to the actuators in order to turn on the environmental control devices (air conditioners, heating or light control devices and others). The goal of MACS is to provide efficiently and economically a stable quality of the indoor exhibition environment. A case study is done for an exhibition room from the Metropolitan Museum of Iasi.
The RSA algorithm proposed by Rivest, Shamir and Adleman as a public key cryptosystem is used in ... more The RSA algorithm proposed by Rivest, Shamir and Adleman as a public key cryptosystem is used in different communication networks in order to ensure data confidentiality. Different weaknesses of this algorithm could be observed and many attacks against it are developed successfully. Improving this algorithm was performed in this paper in order to ensure a higher data security and an
Advanced Encryption Standard (AES) is a widely used encryption algorithm considered to be the mos... more Advanced Encryption Standard (AES) is a widely used encryption algorithm considered to be the most safe and robust algorithm, recommended for governmental and military applications. It is a secret-key encryption algorithm that can use a 128-bit, 192-bit or 256-bit key. The goal of cryptanalysis is to find the encryption key and/or read the information. A detailed analysis of the AES mathematical algorithm and some vulnerabilities identification represent the purpose of this paper. The linearity, identity element for addition or identity element for multiplication are checked for each stage of the algorithm. Particular weak values that can be inserted in the data stream by an attacker in order to get the encryption key are found.
IOP conference series, Jun 1, 2018
Exhibited textile-materials-based artefacts can be affected by the environmental conditions. A sm... more Exhibited textile-materials-based artefacts can be affected by the environmental conditions. A smart monitoring system that commands an adaptive automatic environment control system is proposed for indoor exhibition spaces containing various textile artefacts. All exhibited objects are monitored by many multi-sensor nodes containing temperature, relative humidity and light sensors. Data collected periodically from the entire sensor network is stored in a database and statistically processed in order to identify and classify the environment risk. Risk consequences are analyzed depending on the risk class and the smart system commands different control measures in order to stabilize the indoor environment conditions to the recommended values and prevent material degradation.
MATEC web of conferences, 2017
Our paper presents a short overview of the educational methods used in the learning process in te... more Our paper presents a short overview of the educational methods used in the learning process in telecommunication domain, targeting skills and competences students acquire and develop during the semester and focusing on the ones that are most valuable and appreciated on the labor market after graduation. Our research of the market shows that besides basic engineering knowledge, skills like initiative, team-playing, business analysis, decision-making, marketing and creative project presentation are considered very valuable assets by HR recruiters. We implement and test an improved method that combines classic techniques with the use of modern digital tools, emphasizing on specific tasks that coach the student how to deal with real markets, extract valuable data through analysis, design up-to-date computer-networks, make correlated decisions based also on economic arguments, team working and assume responsibilities. This is achieved through a real-case study and project themes for computer-networks that involve real situations with technical and budgetary challenges, market analysis and research through online facilities and dealing with specialized software for network design and simulation with a creative presentation. The presented approach is intended to prepare faculty staff to implement innovative and self-improving teaching methods in engineering educational process and thus make an educational reform happen [1].
In this paper we describe an assessment quiz tool and how it has been integrated in our lecture c... more In this paper we describe an assessment quiz tool and how it has been integrated in our lecture courses of physics in a powerful way. Our experience demonstrates that this computational method appears to be one of the most preferred modes of instruction. The topics within the quizzes make them an efficient tool. The web-design and database are elaborated using PHPTriad and MySQL programs. PHPTriad is a powerful program that contains the main modulus composed by a server running in Apache, the connection with the database which is elaborated in MySQL and, also, the connection with the web-design through PHP-html. MySQL is recognized for superior ease of use, performance, and reliability. It is a program designed for the creation and administration of databases. It provides security to the online quizzes which are password protected with Java Script. The online quizzes are designed to remedy some of the students' deficiencies and help them to their homework. The online test is a reliable tool for the content and structure of students' knowledge of physics.
ABSTRACT Nowadays the need for wireless communication services and networks is continuously incre... more ABSTRACT Nowadays the need for wireless communication services and networks is continuously increasing for different kind of mobile applications (commercial, entertainment, military, aeronautics, navigation, etc.) Bandwidth management is an important task of the administrative tool to provide quality of service (QoS) for real time applications (voice, video and so on). IEEE 802.11 standard is widely used in the unlicensed 2.4 GHz frequency band and we will refer to it as a wireless communication network. TCP/IP (Transmission Control Protocol/Internet Protocol) does not offer any guaranties for QoS, so a special procedure is needed for resource reservation, especially for bandwidth prior allocation for real-time traffic. A different method to ensure the QoS of differentiated services is presented and some scenarios are analyzed.
This paper is adding recent trends and follow-ups on a previous overview on QoS for Satellite IP ... more This paper is adding recent trends and follow-ups on a previous overview on QoS for Satellite IP networks [1]. QoS classes defined by QoS functions and QoS parameters of the satellite network components can be mapped with IP QoS from the bottom to the top level. IP Multimedia System - IMS is considered as the core of the Next Generation Networks (NGN), the process of satellite access to IMS, including the transmission delay has been simulated [14]. A new QoS architecture that introduces optimization paths between layers and supplies advanced support for end-to-end QoS in IP satellite systems is analyzed [15]. A new software-defined architecture for next-generation satellite networks called SoftSpace [16] exploits concepts like network virtualization and software-defined radio in order to ease embedding of new services, apps or satellite communications technologies. A fuzzy satellite routing strategy for Non-Geo-stationary Earth Orbit satellite IP networks in order to meet multiple classes QoS requirements is being highlighted [17]. Design of a new algorithm for Radio Resource Management (RRM) with the purpose of increasing efficiency in multicast multimedia content transmission management over a satellite network is presented [18].