Sixth International Conference on Networking (ICN'07)最新文献

筛选
英文 中文
Design and Implementation of an Open Programmable Router Compliant to IETF ForCES Specifications 符合IETF强制规范的开放可编程路由器的设计与实现
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.35
Weiming Wang, Ligang Dong, Bin Zhuge, M. Gao, Fenggen Jia, Rong Jin, Jin Yu, Xiaochun Wu
{"title":"Design and Implementation of an Open Programmable Router Compliant to IETF ForCES Specifications","authors":"Weiming Wang, Ligang Dong, Bin Zhuge, M. Gao, Fenggen Jia, Rong Jin, Jin Yu, Xiaochun Wu","doi":"10.1109/ICN.2007.35","DOIUrl":"https://doi.org/10.1109/ICN.2007.35","url":null,"abstract":"IETF ForCES (forwarding and control element separation) is defining specifications for interfaces and modular resources abstractions of network equipments. ForCES brings flexible, programmable, and cost-effective advantages over traditional architectures for network equipments. In this paper, the design and implementation of a ForCES-based router (ForTER) was illustrated. The framework of ForCES was introduced firstly. Then a layered model for the implementation of ForTER was presented. Next, the implementation details of control element (CE) and forwarding element (FE) of ForTER were introduced, which complied with the ForCES framework and related IETF ForCES specifications. Finally, results of experiments for routing and for SNMP support showed the feasibility of the system architecture of ForTER, which also fundamentally testified the feasibility of ForCES and related specifications that are being standardized by IETF ForCES working group.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125351857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Tourist: Self-Adaptive Structured Overlay 游客:自适应结构叠加
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.96
Huanan Zhang, Jinfeng Hu, Chunhui Hong, Dongsheng Wang
{"title":"Tourist: Self-Adaptive Structured Overlay","authors":"Huanan Zhang, Jinfeng Hu, Chunhui Hong, Dongsheng Wang","doi":"10.1109/ICN.2007.96","DOIUrl":"https://doi.org/10.1109/ICN.2007.96","url":null,"abstract":"Structured overlays provide a basic substrate for many peer-to-peer systems. Existing structured overlays can be classified into two categories, O(logN)-hop ones and O(l)-hop ones. The former are suitable for large and dynamic systems, while the latter are suitable for small or stable ones. However, for the lack of adaptivity, it is difficult for a peer-to-peer system designer to choose from these two kinds of overlays because the eventual size and churn rate are not easy to predict in the design phase. To address this problem, we propose a self-adaptive structured overlay Tourist, which can adapt itself to the changing environment dynamically. Tourist nodes determine their routing table size autonomously: nodes with different capacities hold routing tables with different sizes. This makes Tourist sufficiently utilize all the nodes' allowable bandwidth to achieve as high routing efficiency as possible. Tourist also allows each node to adjust its routing table size dynamically, which is the essential reason for the self adaptivity. Simulation results show that in a common 1,000,000-node system, Tourist can route all the messages within two hops and each node only pays no more than 1% bandwidth for its routing table maintenance.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116062198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Transmission Power Control MAC Protocol for Wireless Sensor Networks 一种无线传感器网络的传输功率控制MAC协议
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.12
Zhiwei Zhao, Xinming Zhang, Peng-Fei Sun, Pengxi Liu
{"title":"A Transmission Power Control MAC Protocol for Wireless Sensor Networks","authors":"Zhiwei Zhao, Xinming Zhang, Peng-Fei Sun, Pengxi Liu","doi":"10.1109/ICN.2007.12","DOIUrl":"https://doi.org/10.1109/ICN.2007.12","url":null,"abstract":"Wireless sensor networks have been widely used in many important fields. Medium Access Control (MAC) protocols have a significant effect on the function and performance of sensor networks. At present, most MAC protocols use the same transmission power when sensor nodes send packets. However, the deployment of the sensor nodes is asymmetrical in wireless sensor networks, which will bring more energy consumption and unnecessary collisions. By jointing the MAC layer and physical layer of the senor nodes, and based on Sensor MAC (SMAC) [1] protocol, we propose a transmission power control MAC protocol in wireless sensor networks (transmission Power control in SMAC, PSMAQ. The simulation results show that, compared with the SMAC protocol, our protocol has improved a lot in the delay of packets, reception rate, energy consumption and throughput of the networks.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129004973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Weighted IS Method of Estimating FER of LDPC Codes in High SNR Region 高信噪比区域LDPC码的加权IS估计方法
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.105
Guangwen Li, G. Feng
{"title":"Weighted IS Method of Estimating FER of LDPC Codes in High SNR Region","authors":"Guangwen Li, G. Feng","doi":"10.1109/ICN.2007.105","DOIUrl":"https://doi.org/10.1109/ICN.2007.105","url":null,"abstract":"In this paper, one improved frame error rate (FER) estimation approach in high Signal Noise Ratio (SNR) region for low-density parity-check (LDPC) codes is reported. Firstly dominant trapping sets (TSs), accounting for most of FER in high SNR region, are picked out as decoding result, with input of decoder consisting of a group of biased bits. And how those biased bits are chosen is reduced to finding solution to an binary integer program. Then decoder termination conditions are slightly modified so that history of the tentative decoding could facilitate action of searching for dominant TSs effectively. Without no prior knowledge of shape of error regions for specific LDPC code, we implement weighted mean translation (MT) of importance sampling (IS) method to compute FER in high SNR region. Simulation results demonstrate estimated FER curve conforms well with that of standard monte carlo (MC) simulation in overlapped SNR region.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126238718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Toward Broad-Spectrum Autonomic Management 走向广谱自主管理
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.97
Edmund Smith, P. Anderson
{"title":"Toward Broad-Spectrum Autonomic Management","authors":"Edmund Smith, P. Anderson","doi":"10.1109/ICN.2007.97","DOIUrl":"https://doi.org/10.1109/ICN.2007.97","url":null,"abstract":"The fields of autonomics and system configuration share a common goal in decreasing the cost of ownership of large fabrics. In this paper we present a combined vision in which the technical advances of autonomics and the usability advances of system configuration are merged. We present some early system configuration research that forms the first steps toward this vision. Computer fabrics are becoming ever more complex and ever more central to the operation of organisations. The cost of a single fabric failure can easily dwarf the cost of employing its administrators but, as for software developers before them , IT managers are discovering that simply adding more people to a complex problem does not necessarily provide better results. Autonomics has as its origin the attempt to improve the robustness of an infrastructure by enabling the fabric itself to respond to changes in its environment . But how can we be sure that the the large-scale properties of the fabric will be maintained as it attempts to heal itself? Allowing the fabric to modify itself and evolve its own solutions will make management more difficult, not less, unless the power of administrators to understand and control their fabric is not also increased. The authors' background is not in autonomics, but in system configuration, the study of correctly, accurately and scalably building and maintaining computer fabrics. In this paper we present our vision of an autonomic fabric, a fabric which can recover from many errors without human intervention, yet never be beyond the control or understanding of its administrators. This, we believe, will be a fabric which is affordable, both in terms of the effort needed to maintain it and in terms of its support for critical applications.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132361913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model 一种基于流量增长与分布模型的网络拓扑演化生成器
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.5
Xiangqian Chen, K. Makki, K. Yen, N. Pissinou
{"title":"A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model","authors":"Xiangqian Chen, K. Makki, K. Yen, N. Pissinou","doi":"10.1109/ICN.2007.5","DOIUrl":"https://doi.org/10.1109/ICN.2007.5","url":null,"abstract":"Following traffic increase near to network backbone capacity in a domain network, the evolution of backbone topology takes place. In this paper, three main types of evolution methods: link upgrading only method (upgrade link capacity only), node upgrading method (add nodes and links with the same link capacity), and the combinations of previous two are explored. To shunt the saturated traffic efficiently, we propose several node upgrading generators - Adapting Traffic Evolution Topology gEnerators (ATETEs). ATETEs consider traffic distribution and node burden conditions and select the congested link as the main shunting object. The difference among ATETEs lies that they have diverse strategies to choose a node in the congested link as the second shunting aim. Simulation shows that: the type of ATETEs which picks the burdened node in the saturated link as another shunting object has the most effective shunting result. Compare with most of current topology generators such as [BRITE] in [1] which consider little about traffic increase distribution, ATETEs are more efficient to satisfy traffic increase.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Empirical Study on the Evolution of PlanetLab PlanetLab演化的实证研究
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.40
Li Tang, Yin Chen, Fei Li, Hui Zhang, Jun Li
{"title":"Empirical Study on the Evolution of PlanetLab","authors":"Li Tang, Yin Chen, Fei Li, Hui Zhang, Jun Li","doi":"10.1109/ICN.2007.40","DOIUrl":"https://doi.org/10.1109/ICN.2007.40","url":null,"abstract":"PlanetLab is a globally distributed overlay platform that has been increasingly used by researchers to deploy and assess planetary-scale network services. This paper analyzes some particular advantages of PlanetLab, and then investigates its evolution process, geographical node-distribution, and network topological features. The revealed results are helpful for researchers to 1) understand the history of PlanetLab and some of its important properties quantitatively; 2) realize the dynamic of PlanetLab environment and design professional experiments; 3) select stable nodes that possess a high probability to run continuously for a long time; and 4) objectively and in depth evaluate the experimental results.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Shortening the Switching Times of Gradients for MR Tomography and Spectroscopy 缩短磁共振断层成像和光谱学中梯度开关时间
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.82
E. Gescheidtová, R. Kubasek, K. Bartusek, Z. Smékal
{"title":"Shortening the Switching Times of Gradients for MR Tomography and Spectroscopy","authors":"E. Gescheidtová, R. Kubasek, K. Bartusek, Z. Smékal","doi":"10.1109/ICN.2007.82","DOIUrl":"https://doi.org/10.1109/ICN.2007.82","url":null,"abstract":"The magnetic resonance (MR) imaging techniques of tomography and spectroscopy are exploited in many applications. For the MR instruments to function properly it is necessary to maintain a high quality of homogeneity of the fundamental magnetic field. The pre-emphasis compensation of the generated gradient field increases the homogeneity of the generated magnetic field and reduces the minimum switching times of the gradients. This enables measuring the MR images of incisions in the human body, the relaxation properties of nuclei, self-diffusion processes, flows of liquids and movements of solids faster and more accurately.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116480786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Engineering in Fourth Generation Wireless Networks 第四代无线网络中的流量工程
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.100
T. Gyires
{"title":"Traffic Engineering in Fourth Generation Wireless Networks","authors":"T. Gyires","doi":"10.1109/ICN.2007.100","DOIUrl":"https://doi.org/10.1109/ICN.2007.100","url":null,"abstract":"We present an extension to the multiprotocol label switching (MPLS) traffic engineering in fourth generation (4G) composite networks. In a 4G composite network users should be able to select among various radio access technologies that can individually or collectively satisfy the users' capacity and quality of service requirements. The extension provides the ability to diverge traffic flows away from a path that cannot satisfy the QoS requirements of a flow. When the QoS requirements of a traffic flow exceed a predefined threshold, the extension will distribute the flow among multiple paths based on the cost of the traffic distribution and the effectiveness of label switching routers (LSPs). The simulation results demonstrate that the extension significantly improves the overall network performance.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WebMiner--Anatomy of Super Peer Based Incremental Topic-Specific Web Crawler WebMiner——剖析基于超级对等的增量主题特定网络爬虫
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.104
O. Vikas, Nitin Chiluka, Purushottam K. Ray, Girraj Meena, A. Meshram, Amit Gupta, Abhishek Sisodia
{"title":"WebMiner--Anatomy of Super Peer Based Incremental Topic-Specific Web Crawler","authors":"O. Vikas, Nitin Chiluka, Purushottam K. Ray, Girraj Meena, A. Meshram, Amit Gupta, Abhishek Sisodia","doi":"10.1109/ICN.2007.104","DOIUrl":"https://doi.org/10.1109/ICN.2007.104","url":null,"abstract":"This paper introduces \"WebMiner\", a super-peer based P2P system for building an incremental topic-specific Web crawler. This develops a topic-based repository of Web pages that would later be used in the construction of ontologies. Current crawlers suffer from centralized architecture, having single point of failure and heavy load. Super-peer systems strike a balance between the inherent efficiency of centralized search and the autonomity, load balancing and robustness to attacks, provided by distributed search, with heterogeneity of capabilities across peers. In this paper, we discuss the architecture of WebMiner in detail including the construction of the super-peer overlay network and the working of the system, which includes feature of crawling the hidden Web.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122053063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信