2007 15th IEEE International Conference on Networks最新文献

筛选
英文 中文
Balancing Secondary Traffic Metering for DiffServ Assured Forwarding Classes 均衡DiffServ保证转发类的二次流量计量
2007 15th IEEE International Conference on Networks Pub Date : 2007-11-01 DOI: 10.1109/ICON.2007.4444121
P. Pakdeepinit, Tapanun Yeophantong, Pavel Chen, P. Santiprabhob
{"title":"Balancing Secondary Traffic Metering for DiffServ Assured Forwarding Classes","authors":"P. Pakdeepinit, Tapanun Yeophantong, Pavel Chen, P. Santiprabhob","doi":"10.1109/ICON.2007.4444121","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444121","url":null,"abstract":"Differentiated services (DiffServ) is being accepted as an architecture that specifies a simple, scalable and coarse-gained mechanism for managing network traffic and ensuring quality of services (QoS) guarantees on modern IP networks. In this study, we look into the DiffServ QoS management of assure forwarding per hop behavior (AF PHB) and propose the balancing secondary traffic metering scheme that is able to effectively share the idle bandwidth originally allocated to some AF flow(s) to the other flow(s) that is currently overloading. These excess bandwidths redistribution is to be relatively to the additional bandwidth requirement and the priority of the overloading flow(s).","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115880052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Model for Next Generation Networks with Guaranteed End-to-End Quality of Service 具有端到端服务质量保证的下一代网络改进模型
2007 15th IEEE International Conference on Networks Pub Date : 2007-11-01 DOI: 10.1109/ICON.2007.4444071
C. Ghazel, L. Saïdane
{"title":"An Improved Model for Next Generation Networks with Guaranteed End-to-End Quality of Service","authors":"C. Ghazel, L. Saïdane","doi":"10.1109/ICON.2007.4444071","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444071","url":null,"abstract":"The quality of service (QoS) in the Next Generation Networks (NGN) has been of a particular interest to researchers, system designers, standardization organizations and various industries affected by these networks. In this paper, we propose and outline a control and signalling model which guarantees an end-to-end QoS for multi-service traffics in the NGN networks based on IP/MPLS transport. This work is based on previous works of various standardization bodies such as PacketCable, 3GPP, ETSI, MSF, and ITU-T. The proposed model treats the RACM as a basis component for a large scale QoS guarantee architecture. A key aspect of this model lies in its capacity to integrate the MPLS traffics engineering which offers a scalability and resilience to the transport network and guarantees the requested QoS.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115024859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lightweight Detection of DoS Attacks 轻量级的DoS攻击检测
2007 15th IEEE International Conference on Networks Pub Date : 2007-11-01 DOI: 10.1109/ICON.2007.4444065
S. Pukkawanna, V. Visoottiviseth, P. Pongpaibool
{"title":"Lightweight Detection of DoS Attacks","authors":"S. Pukkawanna, V. Visoottiviseth, P. Pongpaibool","doi":"10.1109/ICON.2007.4444065","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444065","url":null,"abstract":"Denial of service (DoS) attacks have continued to evolve and impact availability of the Internet infrastructure. Many researchers in the field of network security and system survivability have been developing mechanisms to detect DoS attacks. By doing so they hope to maximize accurate detections (true-positive) and minimize non-justified detections (false-positive). This research proposes a lightweight method to identify DoS attacks by analyzing host behaviors. Our method is based on the concept of BLINd Classification or BLINC: no access to packet payload, no knowledge of port numbers, and no additional information other than what current flow collectors provide. Rather than using pre-defined signatures or rules as in typical Intrusion Detection Systems, BLINC maps flows into graphlets of each attack pattern. In this work we create three types of graphlets for the following DoS attack patterns: SYN flood, ICMP flood, and host scan. Results show that our method can identify all occurrences and all hosts associated with attack activities, with a low percentage of false positive.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Distributed Server Delivery of Immersive VoIP Service: Balancing Between Voice Latency and Access Upload Cost 沉浸式VoIP业务的分布式服务器交付:平衡语音延迟和接入上传成本
2007 15th IEEE International Conference on Networks Pub Date : 2007-11-01 DOI: 10.1109/ICON.2007.4444135
Y. Que, F. Safaei, P. Boustead
{"title":"Distributed Server Delivery of Immersive VoIP Service: Balancing Between Voice Latency and Access Upload Cost","authors":"Y. Que, F. Safaei, P. Boustead","doi":"10.1109/ICON.2007.4444135","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444135","url":null,"abstract":"As a future communication tool to the distributed virtual environment, the Immersive VoIP service delivers to each user a real-time mix of nearby user voices which are all rendered according to their respective virtual world positions. In this work, we conjecture that the voice latency constraints between Immersive VoIP users would vary according to their virtual world distance of separation. As verified in our subjective listening tests, this conjecture is more realistic than fixed latency constraint, in terms of user perceptual experience and network feasibility. Empowered by the Bandwidth Reduced server assignment algorithm, the proposed two-hop distributed server architecture achieves a better balance between access bandwidth cost and voice latency when compared against the central server and the peer-to-peer architectures. The two-hop architecture targets the challenging scenario where there lacks clear correlations between the virtual world and the underlying physical network. In addition, we have also investigated the necessary frequency to execute the server assignment solutions to mitigate sensitivity to virtual world mobility.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115997932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Packet Arrival Model for Wolfenstein Enemy Territory Online Server Discovery Traffic Wolfenstein敌方领地在线服务器发现流量的数据包到达模型
2007 15th IEEE International Conference on Networks Pub Date : 2007-11-01 DOI: 10.1109/ICON.2007.4444057
G. Armitage
{"title":"A Packet Arrival Model for Wolfenstein Enemy Territory Online Server Discovery Traffic","authors":"G. Armitage","doi":"10.1109/ICON.2007.4444057","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444057","url":null,"abstract":"Clients for online multiplayer first person shooter (FPS) games typically discover game servers through a two-step process. Clients initially query a well-known master server for a list of currently registered game servers, and then sequentially probe each game server in the order they were returned by the master server. The starting and stopping of clients over time creates a 24-hour cycle of 'background noise' (probe traffic) impacting on registered game servers, independent of a given server's actual popularity with players. Based on over 10 million probe packets from two topologically distinct Wolfenstein enemy territory servers in 2006, this paper shows that probe arrivals are uncorrelated and exhibit exponentially distributed inter-probe intervals during both busiest and least-busy hours of the 24-hour cycle. A modified Laplace curve is then shown to be a reasonable estimator of lambda for the exponentially distributed probe arrivals during any hour of the day. The ability to easily synthesise probe traffic patterns will augment existing approaches to modeling the IP traffic loads experienced by game servers and network devices attached to game servers.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116021178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Impact of User Mobility Patterns on Opportunistic Content Distribution Network 用户移动模式对机会主义内容分发网络的影响
2007 15th IEEE International Conference on Networks Pub Date : 2007-11-01 DOI: 10.1109/ICON.2007.4444114
F. Tan, S. Ardon, R. Hsieh
{"title":"The Impact of User Mobility Patterns on Opportunistic Content Distribution Network","authors":"F. Tan, S. Ardon, R. Hsieh","doi":"10.1109/ICON.2007.4444114","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444114","url":null,"abstract":"Understanding the impact of mobility on opportunistic network is a challenging problem. This paper focuses on analyzing the impact of specific type of mobility characteristic, namely user mobility patterns. We base our analysis on opportunistic temporal-pairing access network (OPAN), an opportunistic content distribution framework that utilizes both pairings between nodes and infrastructure-based wireless network. Focusing our study to explore the impact of peak hour traffic (i.e. due to human mobility patterns involving routines and schedules) and hence node density (clustering) on opportunistic content distribution paradigm, we introduce two models based on a rail public transportation model, namely random train model and peak hour train model. Our simulation results show that peak hour traffic increases the downlink traffic (i.e. uses more downlink capacity) in OPAN however provides faster diffusion time for nodes to download content. Our simulation results further suggests that mobility patterns with high node clustering is more beneficial for content distribution in mobile opportunistic networks due to higher chance of forming direct pairing between nodes.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116396202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive Segregation-Based MAC Protocol for Real-Time Multimedia Traffic in WLANs 基于自适应隔离的无线局域网实时多媒体流量MAC协议
2007 15th IEEE International Conference on Networks Pub Date : 2007-11-01 DOI: 10.1109/ICON.2007.4444130
Hushairi Zen, D. Habibi, Alexander Rassau, Justin Wyatt
{"title":"Adaptive Segregation-Based MAC Protocol for Real-Time Multimedia Traffic in WLANs","authors":"Hushairi Zen, D. Habibi, Alexander Rassau, Justin Wyatt","doi":"10.1109/ICON.2007.4444130","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444130","url":null,"abstract":"Wireless local area networks (WLANs) have become very popular both in private and public sectors. Despite the fast expansion of WLANs in various environments, quality of service (QoS) issues for multimedia applications in WLANs are not yet resolved. Multimedia applications contain traffic that are sensitive to delay and jitter and therefore a best-effort protocol such as the legacy IEEE 802.11 is not suitable. The 802.11e protocol provides prioritization and classification of traffic to offer better QoS for real-time services. However, it leaves the design and implementation of many important optimization features to vendors. In this paper we introduce a mechanism to improve the delay and jitter of real-time traffic in WLAN nodes supporting multimedia applications. In our proposed mechanism, we segregate voice and video traffic from the best-effort traffic. We create a scheduler that schedules the access of real-time traffic and non real-time traffic to the medium with centralized polling and distributed contention respectively. We show that our proposed protocol performs better in terms of delay and jitter than the legacy 802.11 and 802.11e in a scenario where all wireless nodes carry multimedia traffic simultaneously.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123532829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Novel Overlay-Based Failure Detection Architecture for MANET Applications 一种新的基于覆盖的故障检测体系结构
2007 15th IEEE International Conference on Networks Pub Date : 2007-11-01 DOI: 10.1109/ICON.2007.4444074
Dhafer Ben Khedher, R. Glitho, R. Dssouli
{"title":"A Novel Overlay-Based Failure Detection Architecture for MANET Applications","authors":"Dhafer Ben Khedher, R. Glitho, R. Dssouli","doi":"10.1109/ICON.2007.4444074","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444074","url":null,"abstract":"Abstract-Node failures and message losses are frequent in MANETs. This paper proposes a novel overlay-based architecture for MANET applications to ensure that if a node fails, all the other nodes will be notified. Nodes form a self-organizing overlay network that is overlayed on the physical network. In an overlay network, a set of nodes, called detectors, periodically sense each other's heartbeat messages. Every detector also senses the heartbeat messages of a set of nodes. If a detector does not hear from a node after a timeout (possibly due to node failure or message loss), it identifies the failure of the node according to a set of failure detection rules and then reports the failure to all the other nodes. A simulation is done to demonstrate scalability and to compute the number of non-failed nodes declared as failed. Finally, we describe a use case for recovery in a conferencing situation in MANETs.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"52 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120858332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Medium Access Control Protocols in Wireless Sensor Networks 无线传感器网络中的介质访问控制协议
2007 15th IEEE International Conference on Networks Pub Date : 2007-11-01 DOI: 10.1109/ICON.2007.4444129
Haopeng Li, P. Mitchell
{"title":"Medium Access Control Protocols in Wireless Sensor Networks","authors":"Haopeng Li, P. Mitchell","doi":"10.1109/ICON.2007.4444129","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444129","url":null,"abstract":"Wireless Sensor Networks (WSNs) represent a rapidly emerging research field and are attractive because of their ability to monitor a range of environmental conditions in remote and inaccessible locations. Wireless communication is commonly employed to transfer sensed measurements back to a central location. Energy constraints of the battery-operated devices must be addressed. Although many mechanisms have been proposed to reduce the energy consumption, a lot of energy is still wasted through inefficient communications. Medium Access Control (MAC) protocols which directly control the radio activities may provide efficient solutions. In this paper, a variety of existing MAC protocols are summarised and the feasibility of using Aerial Platforms (APs) for MAC scheduling is considered.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126138585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Providing QoS for Symmetrical Voice/Video Traffic in Wireless Networks 为无线网络中的对称语音/视频流量提供QoS
2007 15th IEEE International Conference on Networks Pub Date : 2007-11-01 DOI: 10.1109/ICON.2007.4444105
Justin Wyatt, D. Habibi, I. Ahmad, Hushairi Zen
{"title":"Providing QoS for Symmetrical Voice/Video Traffic in Wireless Networks","authors":"Justin Wyatt, D. Habibi, I. Ahmad, Hushairi Zen","doi":"10.1109/ICON.2007.4444105","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444105","url":null,"abstract":"Voice over IP (VoIP) and voice-video over IP (VIoIP) are becoming very popular and widespread. These types of real-time services produce streams that are almost symmetrical in nature. A new token passing media access control (MAC) developed by our group, called wireless token network (WTN), has been designed with QoS guarantees in mind. We have previously shown in our previous paper (2006) that WTN supports a higher number of VoIP clients compared to 802.11e due to its higher channel efficiency. In this paper we show that WTN also provides superior QoS for bidirectional streams such as VIoIP due to a higher proportion of channel access given to the access point (AP). Performance results are generated by benchmarking WTN against IEEE 802.11 DCF, IEEE 802.11e EDCA and SpectraLink SVP MAC protocols. These results show that whilst appropriate for unidirectional traffic, these current popular solutions do not provide QoS for streams in both directions, due to design constraints which treat the access point as a single client node.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129976325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信