Sixth International Conference on Networking (ICN'07)最新文献

筛选
英文 中文
Optimal Leader Election Scheme for Peer-to-Peer Applications 点对点应用的最优领导者选举方案
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.65
S. Han, Ye Xia
{"title":"Optimal Leader Election Scheme for Peer-to-Peer Applications","authors":"S. Han, Ye Xia","doi":"10.1109/ICN.2007.65","DOIUrl":"https://doi.org/10.1109/ICN.2007.65","url":null,"abstract":"Leader election is one of the most frequently encountered problems in peer-to-peer applications. However, choosing the best node is not a trivial problem and the obtained performance can dramatically vary depending on it. Another issue is what to measure in the evaluation and comparison of different leader election schemes. It is not clear yet what metrics best capture the performance objective. In this paper, we introduce two performance metrics, the worst link stress (WLS) and the degree of interference (DOI), for the leader election problem, and present a fully distributed, optimal scheme that elects a leader according to the DOI-minimizing criterion in a peer-to-peer network. Our scheme does not require network collaboration, and the communication/computation overhead is low. The only assumption is that the participating nodes can obtain a list of IDs of the nodes in the session through the underlying P2P substrates. After examining the correctness of the algorithm, we present simulation results demonstrating the benefits of the optimal leader election scheme. Through the simulation results, we conclude that the algorithm is simple yet effective in achieving the design goals, particularly in reducing (1) the worst link stress and balancing load in the network, and (2) the network bandwidth usage.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127840751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Access Authentication to IMS Systems in Next Generation Networks 下一代网络中IMS系统的接入认证
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-22 DOI: 10.1109/ICN.2007.16
S. Holtmanns, Son Phan-Anh
{"title":"Access Authentication to IMS Systems in Next Generation Networks","authors":"S. Holtmanns, Son Phan-Anh","doi":"10.1109/ICN.2007.16","DOIUrl":"https://doi.org/10.1109/ICN.2007.16","url":null,"abstract":"IP multimedia system (IMS) access authentication over fixed networks faces some challenges in the process of converging fixed and mobile networks. Authentication in 3GPP IMS system is bound to lower layer authentication mechanisms, hence the used protocols can not be used directly for the NGN fixed network environment. Therefore different mechanisms were proposed in standardization, we will outline the approaches and their integration into the 3GPP IMS system.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121782205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A High Performance Multicast Scheme Based on Virtual 2D Torus Topology 一种基于虚拟二维环面拓扑的高性能组播方案
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-04-01 DOI: 10.1109/ICN.2007.2
I. Hwang, San-Nan Lee, Kuo-Chang Chien
{"title":"A High Performance Multicast Scheme Based on Virtual 2D Torus Topology","authors":"I. Hwang, San-Nan Lee, Kuo-Chang Chien","doi":"10.1109/ICN.2007.2","DOIUrl":"https://doi.org/10.1109/ICN.2007.2","url":null,"abstract":"Wavelength division multiplexing (WDM) not only can increase the bandwidth of backbone transmission network significantly, but can also decrease the network cost and make the controlling and maintaining of transmission easy. A new algorithm, torus topology conversion algorithm (TTCA), is proposed in this paper. It is made up of three parts: (1) the conversion algorithm, developed from ring-tree-based RWA (RTRWA), is employed to change topologies from real networks into torus networks; (2) the earliest available channel (EAC) algorithm is utilized for wavelength assignment; and (3) time division multiplexing (TDM) is used for the scheduling algorithm to proceed on transmission of packets. The system performance of the TTCA is compared with both the RTRWA and Steiner minimal tree (SMT). The simulation results show that the call blocking probability of the TTCA can be reduced 10% to 20% more than that of the RTRWA and the channel utilization of the TTCA can be increased 40% to 50% more than that of the RTRWA.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114438719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Correlation of Geographic and Network Proximity at Internet Edges and Its Implications for Mobile Unicast and Multicast Routing 互联网边缘地理与网络邻近的相关性及其对移动单播和组播路由的影响
Sixth International Conference on Networking (ICN'07) Pub Date : 2007-01-20 DOI: 10.1109/ICN.2007.61
T. Schmidt, Matthias Wählisch, Y. Zhang
{"title":"On the Correlation of Geographic and Network Proximity at Internet Edges and Its Implications for Mobile Unicast and Multicast Routing","authors":"T. Schmidt, Matthias Wählisch, Y. Zhang","doi":"10.1109/ICN.2007.61","DOIUrl":"https://doi.org/10.1109/ICN.2007.61","url":null,"abstract":"Significant effort has been invested recently to accelerate handover operations in a next generation mobile Internet. Corresponding works for developing efficient mobile multicast management are emergent. Both problems simultaneously expose routing complexity between subsequent points of attachment as a characteristic parameter for handover performance in access networks. As continuous mobility handovers necessarily occur between access routers located in geographic vicinity, this paper investigates on the hypothesis that geographically adjacent edge networks attain a reduced network distances as compared to arbitrary Internet nodes. We therefore evaluate and analyze edge distance distributions in various regions for clustered IP ranges on their geographic location such as a city. We use traceroute to collect packet forwarding path and round-trip-time of each intermediate node to scan-wise derive an upper bound of the node distances. Results of different scanning origins are compared to obtain the best estimation of network distance of each pair. Our results are compared with corresponding analysis of CAIDA Skitter data, overall leading to fairly stable, reproducible edge distance distributions. As a first conclusion on expected impact on handover performance measures, our results indicate a general optimum for handover anticipation time in 802.11 networks of 25 ms.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130846635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Open Home Networks: The TEAHA Approach 开放家庭网络:TEAHA方法
Sixth International Conference on Networking (ICN'07) Pub Date : 2006-11-20 DOI: 10.1109/ICN.2007.63
H. W. V. Dijk, H. Scholten, Alvaro Tobalina, Victor Garcia Munoz, S. Milanini, A. Kung
{"title":"Open Home Networks: The TEAHA Approach","authors":"H. W. V. Dijk, H. Scholten, Alvaro Tobalina, Victor Garcia Munoz, S. Milanini, A. Kung","doi":"10.1109/ICN.2007.63","DOIUrl":"https://doi.org/10.1109/ICN.2007.63","url":null,"abstract":"The current trend for home appliances is networking. Although more and more of these appliances are networked, there is not a standard way of interaction, which restrains the development of services for in-home networks. The lack of standardisation is partly due to a legacy of business interests; white goods, audio video equipment, security, and personal digital appliances all have a different background and have different business models. Rather than profound standardisation we propose secure seamless interworking of technologies, applications, and business interests. In this paper we present an architecture which is embedded in legacy technology. Our approach combines known design patterns, augments existing technology, and facilitates so-called business clusters. Further, we discuss a prototype implementation that integrates as an example OSGl, ZigBee, and UPnP technology with CECED (white goods) business interests. The work reported in this paper has been executed in an international industrial project1: TEAHA.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132325786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response 蜜网隔离:减少早期入侵响应造成的附带损害
Sixth International Conference on Networking (ICN'07) Pub Date : 2005-06-15 DOI: 10.1109/ICN.2007.92
Birger Tödtmann, Stephan Riebach, E. Rathgeb
{"title":"The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response","authors":"Birger Tödtmann, Stephan Riebach, E. Rathgeb","doi":"10.1109/ICN.2007.92","DOIUrl":"https://doi.org/10.1109/ICN.2007.92","url":null,"abstract":"Anomaly based intrusion detection is inherently subject to false alarms. Fast and automated intrusion response based on this type of intrusion detection will cause significant usage restrictions for falsely suspected systems. To avoid these negative effects without sacrificing detection sensitivity or increasing the risk for the production network inadequately, we propose a scheme combining anomaly-based IDS with Honeynet concepts and link layer based VLANs. In addition to introducing the concept, we will describe a proof-of-concept implementation and report results from some lab tests confirming the benefits of this approach.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123748144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信