{"title":"Performance analysis of IEEE 802.11e enhanced distributed coordination function","authors":"Yunli Chen, Qing-An Zeng, D. Agrawal","doi":"10.1109/ICON.2003.1266252","DOIUrl":"https://doi.org/10.1109/ICON.2003.1266252","url":null,"abstract":"The IEEE 802.11e working group aims to enhance the current 802.11 MAC to support the integrated data and voice (or video) communications. Till now a draft of the IEEE 802.11e EDCF has been proposed. In this paper, we evaluate the performance of the EDCF by dividing the traffic into two categories, namely real-time packets and non real-time packets, and use an analytical model to quantify the performance of both IFS priority and CW priority in the EDCF. We also propose a new priority scheme, which allows the user to continuously send real-time packets. We define the maximum number of real-time packets that a user can continuously send to get a good balance between the fairness and the priority. Our proposed scheme is shown to provide much better results than IEEE 802.11e EDCF.","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130695536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Bless, Götz Lichtwald, Markus Schmidt, M. Zitterbart
{"title":"Fast scoped rerouting for BGP","authors":"R. Bless, Götz Lichtwald, Markus Schmidt, M. Zitterbart","doi":"10.1109/ICON.2003.1266162","DOIUrl":"https://doi.org/10.1109/ICON.2003.1266162","url":null,"abstract":"This paper presents an approach to improve inter-domain connectivity in the Internet. This novel concept deploys inter-domain routing functions on two different time scales. The innovative fast scoped rerouting approach operates on a fine granular time scale while regular BGP is used on a coarse granular time scale. The overall concept intends to provide fast recovery from failures and to reduce the amount of globally visible BGP update messages. It also provides an alternative path in case of failure. Thus, this novel approach improves the Internet's ability to derive a coherent view of its topology.","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131158558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contributory approaches to centralized key agreement in dynamic peer groups","authors":"A. Saxena, B. Soh","doi":"10.1109/ICON.2003.1266223","DOIUrl":"https://doi.org/10.1109/ICON.2003.1266223","url":null,"abstract":"This paper has two contributions. In the first part of this paper we propose a new approach to contributory key agreement in dynamic peer groups (DPG) using a central controller. Our approach has certain advantages over other centralized approaches because it can be extended to a distributed environment. We discuss ways to extend our approach to adapt to arbitrary network failures by segregating a large group into smaller subgroups. Since each subgroup still requires access to a central controller, in the second part of this paper, we present a protocol that can be used to adapt to arbitrary network failures that disable the central controller.","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132695242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Anagnostakis, M. Greenwald, S. Ioannidis, A. Keromytis, Dekai Li
{"title":"A cooperative immunization system for an untrusting Internet","authors":"K. Anagnostakis, M. Greenwald, S. Ioannidis, A. Keromytis, Dekai Li","doi":"10.1109/ICON.2003.1266224","DOIUrl":"https://doi.org/10.1109/ICON.2003.1266224","url":null,"abstract":"Viruses and worms are one of the most common causes of security problems in computer systems today. Users attempt to protect machines from such attacks by using anti-virus programs and firewalls, with a mixed record of success at best. One of the main problems with these solutions is that they rely on manual configurations and human intervention, and may fail to react in time to defend against an attack. We present a cooperative immunization system that helps defend against these types of attacks. The nodes in our system cooperate and inform each other of ongoing attacks and the actions necessary to defend. To evaluate our proposal, we discuss a simple virus model and evaluate our system using simulation. Our measurements show that our algorithm is more effective against viruses and more robust against malicious participants in the immunization system.","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131677800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forwarding-loop-free configuration for IBGP networks","authors":"Hassan Gobjuka","doi":"10.1109/ICON.2003.1266163","DOIUrl":"https://doi.org/10.1109/ICON.2003.1266163","url":null,"abstract":"We investigate the inter-cluster routing deflection and forwarding loops in IBGP networks. In more detail, we define and explore the two causes of deflection, and consecutively, forwarding loops which might happen due to IBGP cluster misconfiguration. We study the methods that can be used to remove forwarding loops, if detected. Unfortunately, we show that detecting forwarding loops in a given IBGP network configuration is NP-hard. However, we propose a simple heuristic algorithm with complexity of 0(2) to configure deflection- and loop-free IBGP network.","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115511676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rate-distortion comparisons between FEC and MDC based on Gilbert channel model","authors":"M. Kim, W. Kleijn","doi":"10.1109/ICON.2003.1266239","DOIUrl":"https://doi.org/10.1109/ICON.2003.1266239","url":null,"abstract":"Abstracl-To facilitate real-time audio-visual communications thmugh the Internet, low-delay packet-loss recovery techniques, such as forward e m r c o m t i o n (FEC) aud multiple description coding WDC), can be used. Based on a 2-state Gilbert channel model, we compare the SNR performance of FEC with XOR operation (XOR-FEC), FEC with Reed-Solomon code WFEC), side distortion optimized MDC (SD-MDC), and channel optimized MDC (optMDC). If we know the channel condition by feedback thmugh the Real-Time Contml Pmtocol (RTCP), optMDC can adjust the ratio between central distortion and side distortion so that it works at the best operating point. From a ratedistortion viewpoint, optMDC gives the best performance both in the single-channel and two-independent-chel transmission cases via packet networks with burst loss nature. Multiple-channel transmission is preferred if independent channels can be established between connections.","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115932385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Phillips, Jiankun Hu, B. Lloyd-Smith, R. Harris
{"title":"A note on an analytic model for slow start in TCP","authors":"D. Phillips, Jiankun Hu, B. Lloyd-Smith, R. Harris","doi":"10.1109/ICON.2003.1266200","DOIUrl":"https://doi.org/10.1109/ICON.2003.1266200","url":null,"abstract":"Sikdar et al. [B. Sikdar et al., 2001] has provided a formula to model the window increase pattern given the mechanics of delayed acknowledgements. In this paper, we show that their sum formula significantly underestimates the iterated sum for rounds greater than seven. The approximation error grows exponentially. We also derive a more accurate sum formula whose approximation error is linearly bounded. We show that with use of the incorrect sum formula, cases arise where it is impossible to time out as the initial loss indication in slow start, which can have significant impact on TCP latency, assuming a correlated loss model. We show that our more accurate sum formula greatly reduces the number of cases showing this behaviour, further improving upon the accuracy of the model.","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114809115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast IP lookup algorithms","authors":"Jaeyong Lim, S. Rajasekaran","doi":"10.1109/ICON.2003.1266173","DOIUrl":"https://doi.org/10.1109/ICON.2003.1266173","url":null,"abstract":"In this paper we present a fast algorithm for the problem of IP routing. In particular, the algorithm presented is for the problem of longest prefix matching. The new algorithm has an expected run time that is asymptotically better than those of existing algorithms. Experimental results are also encouraging. For a packet with a given destination IP address, the next hop the packet should take can be determined in an expected time of O(1+log (n/2/sup q/)), where n is the number of destination prefixes and q is an appropriate parameter. For instance, if q is chosen to be log n, then the expected search time is O(1). The memory requirement is only O(n).","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dealing with heterogeneity in a fully reliable multicast protocol","authors":"M. Maimour, C. Pham","doi":"10.1109/ICON.2003.1266191","DOIUrl":"https://doi.org/10.1109/ICON.2003.1266191","url":null,"abstract":"Many of the proposed multicast congestion avoidance algorithms are single-rate where heterogeneity is accommodated by adjusting the transmission rate as a response to the worst receiver in the group. Due to the Internet heterogeneity, a single-rate congestion control affects the overall satisfaction of the receivers in a multicast session. In this paper, we propose a multi-rate replicated scheme where some receivers (instead of the source) are designated to perform data replication for other receivers with lower capacity. To be more scalable and to minimize the bandwidth consumption due to data replication, the partitioning algorithm is performed on-the-fly by the routers depending on the feedback they receive. Neither a prior estimation of the receivers capacity is necessary nor a complex computation is required to execute our partitioning algorithm.","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125982347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible route control for wireless multi-hop internet access","authors":"T. Nakagawa, T. Yoshikawa, K. Ohta, S. Kurakake","doi":"10.1109/ICON.2003.1266274","DOIUrl":"https://doi.org/10.1109/ICON.2003.1266274","url":null,"abstract":"Pervasive ad hoc networks are a promising approach to realize ubiquitous Internet access. If an end terminal is located outside of the coverage area of an infrastructure network, neighboring terminals may relay packets so that the packets can reach the infrastructure network. In order to meet the diverse QoS requirements of applications in such a mixture of an ad hoc network and an infrastructure network, we propose a cross-layer route control mechanism. The proposed mechanism allows dynamic change of the routing metric based on the requirements of applications running. We also propose a new routing metric called hybrid metric. I t takes into account both the optimality of ad hoc network configuration and the link quality of the connection between the ad hoc network and an infrastructure network to be connected. We confirmed by computer simulation that the hybrid metric is effective in improving throughput. The hybrid metric is added as a routing metric option for the proposed route control mechanism and improves route control flexibility.","PeriodicalId":122389,"journal":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129487160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}