Wang-Rong Chang, Hui-Tang Lin, Sheng-Jhe Hong, Chai-Lin Lai
{"title":"A Novel WDM EPON Architecture with Wavelength Spatial Reuse in High-Speed Access Networks","authors":"Wang-Rong Chang, Hui-Tang Lin, Sheng-Jhe Hong, Chai-Lin Lai","doi":"10.1109/ICON.2007.4444078","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444078","url":null,"abstract":"This study proposes a novel WDM EPON system based upon an AWG, in which multiple wavelengths are established in both the upstream and the downstream fibers. The use of the AWG device enables the WDM EPON architecture to support wavelength spatial reuse and allows the ONUs to communicate directly with one another rather than through the OLT. The proposed WDM EPON scheme takes account of the requirement for backward compatibility with the 802.3ah MPCP and investigates the associated DBA algorithm used to arbitrate the access of each individual ONU over the WDM layer.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127048528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximation Techniques For Analytical Characterization Of Downlink Traffic Power For Multi-Service CDMA Networks","authors":"A. Mahmoud, Mohammed A. Aabed","doi":"10.1109/ICON.2007.4444110","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444110","url":null,"abstract":"This paper presents a novel analytical framework for characterizing the downlink power allocations for a multi-rate code division multiple access (CDMA) network. The characterization takes into account the RF propagation model, the shadowing process and considers both intracell and intercell interference. To arrive at the model, the paper utilizes approximation techniques recently developed in the recent literature to evaluate the sum of lognormal random variables. The overall traffic power is modeled as a random variable that is function of the network parameters and the assigned downlink bit rates. The paper demonstrates the calculation of the forward link power outage probability as one example application for the developed characterization. It also compares between two approximation techniques suggested in this paper: matched first and second order statistics, and the min-max technique. The analytical results are compared to those obtained via Monte-Carlo simulations to assess the accuracy of the adapted approximations. The results indicate the min-max technique produces more accurate results when compared to matched first and second moments approximation scheme.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121796086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Pre-emption Policy For MPLS-TE Networks","authors":"I. Chaieb, J. L. Roux, Bernard A. Cousin","doi":"10.1109/ICON.2007.4444119","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444119","url":null,"abstract":"The pre-emption mechanism may be used in multi protocol label switching traffic engineering (MPLS-TE) networks in order to reduce the number of rejected tunnels during failure. But pre-emption may have an impact on the convergence time, and it is required to minimize the number of pre-emptions per tunnel. For that purpose this paper proposes a new preemption policy allowing reducing or limiting the number of pre-emptions per tunnel, after a network failure. Two approaches are proposed: A pre-emption reduction approach where the least preempted tunnels are pre-empted in priority and a pre-emption limitation approach where a tunnel cannot be preempted more than N times during a given period. Simulation results show that we can limit the maximum number of pre-emptions for a given tunnel to only one, without significantly diminishing the rejection reduction capabilities.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127772879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimizing the Number of Constraints for Shared Backup Path Protection (SBPP) in Shared Risk Link Group (SRLG) Optical Mesh Networks","authors":"D. Habibi, Viet Q. Phung, H. Nguyen","doi":"10.1109/ICON.2007.4444094","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444094","url":null,"abstract":"Path-arc integer linear programming (ILP) models for shared backup path protection (SBPP) in optical mesh networks generally contain many redundant constraints for calculating shared backup capacity. This greatly increases the computational time of the ILP solvers. In this paper, we first identify the sharing relationship between working and backup capacities, which facilitates the development of two novel algorithms for minimizing the number of constraints in ILP models for SBPP in mesh networks. Next, we consider the more realistic case of Shared Risk Link Group (SRLG) networks, where some optical fibers have the same risk of a physical cut due to being bundled in the same conduit. We propose a path-arc ILP model for SBPP in SRLG networks and minimize the number of constraints in this ILP model using the proposed algorithms. Simulation results show a remarkable reduction of around 50% in the number of constraints, which significantly improves the computational complexity of the model.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126780164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JavaCard-based Two-Level User Key Management for IP Conditional Access Systems","authors":"Jinyoung Moon, Jongyoul Park, E. Paik","doi":"10.1109/ICON.2007.4444064","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444064","url":null,"abstract":"To prohibit the unauthorized accesses on premium contents of the Pay-TV system, a conditional access system (CAS) scrambles the contents with a scrambling key. In order to securely send the scrambling key for descrambling, the CAS transmits the scrambling key after encrypting it with another encryption key. The encryption keys are generally transmitted by entitlement management message (EMM). In this paper, we propose a two-level user key management scheme for the IP CAS used in the IPTV system. A user key for every subscriber is subdivided into permanent subscriber key (SK) and updatable user key (UK). The SK is used to obtain the UK by an authentication protocol. According to the authentication protocol, the authentication server requests the results of cryptographic operations to the authentication client to verify the authentication client. The UK is used to encrypt the next encryption key. The proposed scheme strengthens the security of the IP CAS because the use of the UK for the EMMs enables the lifetime of the SK to be infinite and the replacement of the smartcard to be eliminated. In addition, the IP CAS adopts Java card instead of Smart card because Java card applets are able to be dynamically reloaded.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing the multicast performance of structured P2P overlay in supporting Massively Multiplayer Online Games","authors":"Xinbo Jiang, F. Safaei, P. Boustead","doi":"10.1109/ICON.2007.4444073","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444073","url":null,"abstract":"Scribe is a scalable application level multicast infrastructure. We have developed two techniques to improve the performance of Scribe in terms of latency and bandwidth distribution. The first technique identifies that the final hop of Scribe traffic path is largely selected without any proximity consideration and incurs the longest distance traveled. To overcome this, we introduce Proximity Neighbor Selection (PNS) into the final hop for latency improvement. The second technique builds a hierarchical two-level overlay. While PNS can be applied at both levels for latency performance, the bandwidth stress required by applications can now be distributed among the nodes in the higher level overlay. Our simulation using GT-ITM topology has shown that both techniques have improved the latency performance for more than 30 percent, and the two-level overlay has improved the bandwidth distribution up to 2.7 times, comparing with what can be achieved by a standard Scribe overlay. We have developed the techniques in the context of Massively Multiplayer Online Games (MMOGs). While Scribe provides a possible platform for the scalable deployment of MMOGs, game developers may leverage the techniques to enhance the design of real-time interactions between players in the game world.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129000267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cache Architecture for Counting Bloom Filters","authors":"M. Ahmadi, Stephan Wong","doi":"10.1109/ICON.2007.4444089","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444089","url":null,"abstract":"Within packet processing systems, lengthy memory accesses greatly reduce performance. To overcome this limitation, network processors utilize many different techniques, e.g., utilizing multi-level memory hierarchies, special hardware architectures, and hardware threading. In this paper, we introduce a multi-level memory hierarchy and a special hardware cache architecture for counting Bloom filters that is utilized by network processors and packet processing applications such as packet classification and distributed web caching systems. Based on the value of the counters in the counting Bloom filter, a multi-level cache architecture called the cache counting Bloom filter (CCBF) is presented and analyzed. The results show that the proposed cache architecture decreases the number of memory accesses by at least 51.3% when compared to a standard Bloom filter.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114228485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoshihisa Kondo, S. Itaya, S. Yamaguchi, P. Davis, R. Suzuki, S. Obana
{"title":"Wireless Channel Detection Based on Fluctuation of Packet Arrival Interval","authors":"Yoshihisa Kondo, S. Itaya, S. Yamaguchi, P. Davis, R. Suzuki, S. Obana","doi":"10.1109/ICON.2007.4444103","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444103","url":null,"abstract":"Channel detection is necessary for control of channel usage in multi-user and multi-channel wireless networks. In this paper, we propose a real time wireless channel detection method based on measuring fluctuations of packet arrival intervals in networks using IEEE802.11 media access protocol. We have used simulations to show the relationship between the congestion on wireless channels and fluctuation of packet arrival intervals and show that the quality of a VoIP session can be roughly estimated by measuring arrival interval of periodically generated packets, such as standard HELLO packets which are used for route management. Experiments using standard Linux PCs and WLAN interface cards confirm that the measurement of fluctuations of HELLO packet arrival time is possible.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134012684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Real Time Content Delivery on Wireless Networks","authors":"Ramana Isukapalli","doi":"10.1109/ICON.2007.4444115","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444115","url":null,"abstract":"Wireless networks are very popular today; however, the bandwidth over the air interface is limited to support many real time applications like video on demand. While some of these applications require high quality picture frames with high resolution, large image size, etc., many others (like remote surveillance) need simple and continuous, yet intelligible image frames that are not jittery. A video server that has an estimate of the available bandwidth can stream high quality data if the bandwidth is available, or stream data that needs lower bandwidth (perhaps with a lower size, lower frame rate, etc.) if the available bandwidth is limited. Unfortunately, that poses two issues - first, the video server should be aware of the available bandwidth. Second, it should be able to modify the content it streams, \"dynamically\". In this paper, we do a detailed analysis of some popular \"controlled lossy compression\" methods that are used to reduce the overall \"entropy\" of the source data (video stream), leading to a smaller data size and reducing the overall bandwidth requirements. We discuss these methods in the context of image processing techniques and show how they can modify the data of stored video content, as needed, to present an intelligible video stream that is smaller is size. We present an end to end architecture that (i) uses \"RTCP\" to get an estimate of the available channel bandwidth and (ii) uses a video server that can dynamically change the parameters like image size and frame rate to produce video streams that are best suited for the available bandwidth. We present theoretical compression rates for each of these compression methods and present empirical results to confirm our claims.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131208151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Localized On-Demand Data Collection in Sensor Networks","authors":"R. Teng, Bing Zhang, Yasuo Tan","doi":"10.1109/ICON.2007.4444125","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444125","url":null,"abstract":"In sensor networks, users can collect the sensing data in an on-demand manner. Upon receiving a user's query message, each sensor node that is corresponding to the query delivers the sensing data to the sink node. However, directly forwarding query message throughout the network will cause a large traffic overhead and high energy consumption. In addition, directly forwarding all sensing data toward the sink node via many independent paths might be inefficient with regards to energy consumption and energy distribution. In this paper, we propose a localized query forwarding and data collection scheme based on the processing of the attribute content of the query's name. In contrast to the conventional distributions of data query, a query's name is resolved into the IDs and the locations of corresponding group of sensor nodes before being distributed to the network. Therefore, the query is efficiently forwarded into the network within a localized area. Furthermore, the sensing data are collected and aggregated at intermediate nodes that reside among the corresponding sensor nodes, before being forwarded to the sink node. We also attempt to extensively study the performance on an 802.15.4 integrated ns-2 simulator. The simulation results reveal that the proposed approaches highly reduce the energy consumption of data query and data collection in the network and the energy distribution is more efficiently distributed among sensor nodes than conventional approaches.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134640965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}