{"title":"Optimal Leader Election Scheme for Peer-to-Peer Applications","authors":"S. Han, Ye Xia","doi":"10.1109/ICN.2007.65","DOIUrl":"https://doi.org/10.1109/ICN.2007.65","url":null,"abstract":"Leader election is one of the most frequently encountered problems in peer-to-peer applications. However, choosing the best node is not a trivial problem and the obtained performance can dramatically vary depending on it. Another issue is what to measure in the evaluation and comparison of different leader election schemes. It is not clear yet what metrics best capture the performance objective. In this paper, we introduce two performance metrics, the worst link stress (WLS) and the degree of interference (DOI), for the leader election problem, and present a fully distributed, optimal scheme that elects a leader according to the DOI-minimizing criterion in a peer-to-peer network. Our scheme does not require network collaboration, and the communication/computation overhead is low. The only assumption is that the participating nodes can obtain a list of IDs of the nodes in the session through the underlying P2P substrates. After examining the correctness of the algorithm, we present simulation results demonstrating the benefits of the optimal leader election scheme. Through the simulation results, we conclude that the algorithm is simple yet effective in achieving the design goals, particularly in reducing (1) the worst link stress and balancing load in the network, and (2) the network bandwidth usage.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127840751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access Authentication to IMS Systems in Next Generation Networks","authors":"S. Holtmanns, Son Phan-Anh","doi":"10.1109/ICN.2007.16","DOIUrl":"https://doi.org/10.1109/ICN.2007.16","url":null,"abstract":"IP multimedia system (IMS) access authentication over fixed networks faces some challenges in the process of converging fixed and mobile networks. Authentication in 3GPP IMS system is bound to lower layer authentication mechanisms, hence the used protocols can not be used directly for the NGN fixed network environment. Therefore different mechanisms were proposed in standardization, we will outline the approaches and their integration into the 3GPP IMS system.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121782205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A High Performance Multicast Scheme Based on Virtual 2D Torus Topology","authors":"I. Hwang, San-Nan Lee, Kuo-Chang Chien","doi":"10.1109/ICN.2007.2","DOIUrl":"https://doi.org/10.1109/ICN.2007.2","url":null,"abstract":"Wavelength division multiplexing (WDM) not only can increase the bandwidth of backbone transmission network significantly, but can also decrease the network cost and make the controlling and maintaining of transmission easy. A new algorithm, torus topology conversion algorithm (TTCA), is proposed in this paper. It is made up of three parts: (1) the conversion algorithm, developed from ring-tree-based RWA (RTRWA), is employed to change topologies from real networks into torus networks; (2) the earliest available channel (EAC) algorithm is utilized for wavelength assignment; and (3) time division multiplexing (TDM) is used for the scheduling algorithm to proceed on transmission of packets. The system performance of the TTCA is compared with both the RTRWA and Steiner minimal tree (SMT). The simulation results show that the call blocking probability of the TTCA can be reduced 10% to 20% more than that of the RTRWA and the channel utilization of the TTCA can be increased 40% to 50% more than that of the RTRWA.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114438719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Correlation of Geographic and Network Proximity at Internet Edges and Its Implications for Mobile Unicast and Multicast Routing","authors":"T. Schmidt, Matthias Wählisch, Y. Zhang","doi":"10.1109/ICN.2007.61","DOIUrl":"https://doi.org/10.1109/ICN.2007.61","url":null,"abstract":"Significant effort has been invested recently to accelerate handover operations in a next generation mobile Internet. Corresponding works for developing efficient mobile multicast management are emergent. Both problems simultaneously expose routing complexity between subsequent points of attachment as a characteristic parameter for handover performance in access networks. As continuous mobility handovers necessarily occur between access routers located in geographic vicinity, this paper investigates on the hypothesis that geographically adjacent edge networks attain a reduced network distances as compared to arbitrary Internet nodes. We therefore evaluate and analyze edge distance distributions in various regions for clustered IP ranges on their geographic location such as a city. We use traceroute to collect packet forwarding path and round-trip-time of each intermediate node to scan-wise derive an upper bound of the node distances. Results of different scanning origins are compared to obtain the best estimation of network distance of each pair. Our results are compared with corresponding analysis of CAIDA Skitter data, overall leading to fairly stable, reproducible edge distance distributions. As a first conclusion on expected impact on handover performance measures, our results indicate a general optimum for handover anticipation time in 802.11 networks of 25 ms.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130846635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. W. V. Dijk, H. Scholten, Alvaro Tobalina, Victor Garcia Munoz, S. Milanini, A. Kung
{"title":"Open Home Networks: The TEAHA Approach","authors":"H. W. V. Dijk, H. Scholten, Alvaro Tobalina, Victor Garcia Munoz, S. Milanini, A. Kung","doi":"10.1109/ICN.2007.63","DOIUrl":"https://doi.org/10.1109/ICN.2007.63","url":null,"abstract":"The current trend for home appliances is networking. Although more and more of these appliances are networked, there is not a standard way of interaction, which restrains the development of services for in-home networks. The lack of standardisation is partly due to a legacy of business interests; white goods, audio video equipment, security, and personal digital appliances all have a different background and have different business models. Rather than profound standardisation we propose secure seamless interworking of technologies, applications, and business interests. In this paper we present an architecture which is embedded in legacy technology. Our approach combines known design patterns, augments existing technology, and facilitates so-called business clusters. Further, we discuss a prototype implementation that integrates as an example OSGl, ZigBee, and UPnP technology with CECED (white goods) business interests. The work reported in this paper has been executed in an international industrial project1: TEAHA.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132325786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response","authors":"Birger Tödtmann, Stephan Riebach, E. Rathgeb","doi":"10.1109/ICN.2007.92","DOIUrl":"https://doi.org/10.1109/ICN.2007.92","url":null,"abstract":"Anomaly based intrusion detection is inherently subject to false alarms. Fast and automated intrusion response based on this type of intrusion detection will cause significant usage restrictions for falsely suspected systems. To avoid these negative effects without sacrificing detection sensitivity or increasing the risk for the production network inadequately, we propose a scheme combining anomaly-based IDS with Honeynet concepts and link layer based VLANs. In addition to introducing the concept, we will describe a proof-of-concept implementation and report results from some lab tests confirming the benefits of this approach.","PeriodicalId":117154,"journal":{"name":"Sixth International Conference on Networking (ICN'07)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123748144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}