Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications最新文献

筛选
英文 中文
On The Implementation of Traffic-Engineering in an "All-Ethernet Global Multi-Service Infrastructure" “全以太网全局多业务基础设施”中流量工程的实现
A. Hadjiantonis, Mohamed A. Ali, H. Chamas, W. Bjorkman, S. Elby, N. Ghani
{"title":"On The Implementation of Traffic-Engineering in an \"All-Ethernet Global Multi-Service Infrastructure\"","authors":"A. Hadjiantonis, Mohamed A. Ali, H. Chamas, W. Bjorkman, S. Elby, N. Ghani","doi":"10.1109/INFOCOM.2006.16","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.16","url":null,"abstract":"This paper presents a signaling framework for supporting and implementing traffic engineering in an all Ethernet global multi-service infrastructure.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Policy-Based Service Provisioning Architecture for Hybrid Photonic Networks 基于策略的混合光子网络服务发放体系结构
Belkacem Daheb, G. Pujolle, W. Fawaz, Ken Chen
{"title":"Policy-Based Service Provisioning Architecture for Hybrid Photonic Networks","authors":"Belkacem Daheb, G. Pujolle, W. Fawaz, Ken Chen","doi":"10.1109/INFOCOM.2006.96","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.96","url":null,"abstract":"Optical networks are becoming an inevitable technology in the next generation Internet. Optical WDM networks require a control network for automatic and rapid configuration. A control plane is under standardization by the Internet Engineering Task Force (IETF) under the name generalized multiprotocol label switching (GMPLS). However, this control plane is unaware of the specifications of the services to be enforced. This work presents a policy-based management architecture adapted to an emerging kind of optical networks called hybrid photonic networks. Contributing to network flexibility, we present extensions to the management plane of these transparent wavelength and switching capable networks that provide the means to leverage their inherent capabilities. The proposed management architecture would provide optical network operators with the possibility to provision optical services, defined through high level service contracts, in an efficient and dynamic way.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dedicated Channels as an Optimal Network Support for Effective Transfer of Massive Data 专用通道是有效传输海量数据的最佳网络支持
Sergey Gorinsky, N. Rao
{"title":"Dedicated Channels as an Optimal Network Support for Effective Transfer of Massive Data","authors":"Sergey Gorinsky, N. Rao","doi":"10.1109/INFOCOM.2006.20","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.20","url":null,"abstract":"Instantaneous fair sharing (IFS) is a traditional network ideal prescribing to share the network capacity among competing applications fairly during any infinitesimal time interval. In this paper, we argue that IFS is an inappropriate ideal for the application of massive data transfers where the primary goal is to minimize message transfer times. We propose an alternative paradigm of virtual finish time first (ViFi) scheduling that dedicates the entire capacity to one message at a time in the order of message finish times under IFS. Unlike shortest remaining time first and other earlier algorithms for dedicated scheduling, ViFi provides a remarkable guarantee of delivering each message no later than under IFS. Our analysis and simulations show the dedicated ViFi scheduling offers significant reductions in the average transfer time. The above properties make ViFi a promising approach for resource allocation in emerging dedicated-channel networks that enable advance reservation of end-to-end channels between hosts.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125697104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Light-Weight Overlay Path Selection in a Peer-to-Peer Environment 点对点环境中的轻量级覆盖路径选择
Teng Fei, S. Tao, Lixin Gao, R. Guérin, Zhi-Li Zhang
{"title":"Light-Weight Overlay Path Selection in a Peer-to-Peer Environment","authors":"Teng Fei, S. Tao, Lixin Gao, R. Guérin, Zhi-Li Zhang","doi":"10.1109/INFOCOM.2006.48","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.48","url":null,"abstract":"Large-scale peer-to-peer systems span a wide range of Internet locations. Such diversity can be leveraged to build overlay \"detours\" to circumvent periods of poor performance on the default path. However, identifying which peers are \"good\" relay choices in support of such detours is challenging, if one is to avoid incurring an overhead that grows with the size of the peer- to-peer system. This paper proposes and investigates the Earliest Branching Rule (EBR) to perform such a selection. EBR builds on the Earliest Diverging Rule (EDR) that selects relay nodes whose AS path diverges from the default path at the earliest possible point, but calls for monitoring a much smaller number of paths. As a result, it has a much lower overhead. The paper explores the performance and overhead of EBR, and compares them to that of EDR. The results demonstrate that EBR succeeds in selecting good relay nodes with minimum control overhead. Hence, providing a practical solution for dynamically building good overlays in large peer-to-peer systems.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132461838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network 利用主路径共享带宽实现MPLS网络保护路由
Faisal Aslam, Saqib Raza, Z. A. Uzmi, Young-Chon Kim
{"title":"Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network","authors":"Faisal Aslam, Saqib Raza, Z. A. Uzmi, Young-Chon Kim","doi":"10.1109/INFOCOM.2006.58","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.58","url":null,"abstract":"In label-switched networks such as MPLS, protection routing involves computing and setting up the backup paths at the same time when the primary paths are routed. It has previously been shown that two or more backup paths may share bandwidth along common links if such backup paths will never be activated simultaneously. Such sharing between the backup paths leads to reduced bandwidth reservations and, hence improved performance in terms of number of path requests that can be accommodated on the network (Aslam et al., 2005). We present a novel idea that backup paths may also share bandwidth with certain primary paths, thereby further reducing the overall bandwidth reservations on the network. This results in even more path requests being accommodated on the network. Sharing with primary paths is possible with any protection routing framework. To demonstrate this sharing, we use the NPP protection routing framework as an example (Aslam et al., 2005). We provide the enhancements to the NPP framework needed to exploit sharing with the primary paths. For the enhanced NPP framework, simulation results on various networks confirm that sharing with primary paths indeed results in better network utilization. This increased performance is achieved with bounded local state information and without requiring any additional routing or signaling overhead.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131181733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Stimulating Participation in Wireless Community Networks 鼓励参与无线社区网络
E. C. Efstathiou, P. A. Frangoudis, George C. Polyzos
{"title":"Stimulating Participation in Wireless Community Networks","authors":"E. C. Efstathiou, P. A. Frangoudis, George C. Polyzos","doi":"10.1109/INFOCOM.2006.320","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.320","url":null,"abstract":"Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. We focus on the provision of Internet access to mobile users through WCN-controlled wireless LAN access points (APs). We rely on reciprocity: a person participates in the WCN and provides ‘free’ Internet access to mobile users in order to enjoy the same benefit when mobile. Our reciprocity scheme is compatible with the distinctive structure of WCNs: it does not require registration with authorities, relying only on uncertified free identities (public-private key pairs). Users sign digital receipts when they consume service. The receipts form a receipt graph, which is used as input to a reciprocity algorithm that identifies contributing users using network flow techniques. Simulations show that this algorithm can sustain reciprocal cooperation. We have implemented our algorithm to run on common APs.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133494233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
The Complexity of Connectivity in Wireless Networks 无线网络连接的复杂性
T. Moscibroda, Roger Wattenhofer
{"title":"The Complexity of Connectivity in Wireless Networks","authors":"T. Moscibroda, Roger Wattenhofer","doi":"10.1109/INFOCOM.2006.23","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.23","url":null,"abstract":"We define and study the scheduling complexity in wireless networks, which expresses the theoretically achievable efficiency of MAC layer protocols. Given a set of communication requests in arbitrary networks, the scheduling complexity describes the amount of time required to successfully schedule all requests. The most basic and important network structure in wireless networks being connectivity, we study the scheduling complexity of connectivity, i.e., the minimal amount of time required until a connected structure can be scheduled. In this paper, we prove that the scheduling complexity of connectivity grows only polylogarithmically in the number of nodes. Specifically, we present a novel scheduling algorithm that successfully schedules a strongly connected set of links in time O(logn) even in arbitrary worst-case networks. On the other hand, we prove that standard MAC layer or scheduling protocols can perform much worse. Particularly, any protocol that either employs uniform or linear (a node’s transmit power is proportional to the minimum power required to reach its intended receiver) power assignment has a Ω(n) scheduling complexity in the worst case, even for simple communication requests. In contrast, our polylogarithmic scheduling algorithm allows many concurrent transmission by using an explicitly formulated non-linear power assignment scheme. Our results show that even in large-scale worst-case networks, there is no theoretical scalability problem when it comes to scheduling transmission requests, thus giving an interesting complement to the more pessimistic bounds for the capacity in wireless networks. All results are based on the physical model of communication, which takes into account that the signal-tonoise plus interference ratio (SINR) at a receiver must be above a certain threshold if the transmission is to be received correctly.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130195183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 317
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks 异构传感器网络中双密钥的建立
Patrick Traynor, Heesook Choi, G. Cao, Sencun Zhu, T. L. Porta
{"title":"Establishing Pair-Wise Keys in Heterogeneous Sensor Networks","authors":"Patrick Traynor, Heesook Choi, G. Cao, Sencun Zhu, T. L. Porta","doi":"10.1109/INFOCOM.2006.260","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.260","url":null,"abstract":"Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained environment, symmetric-key methods coupled with a priori key distribution schemes have been proposed to achieve the goals of data secrecy and integrity. These approaches typically assume that all sensors are similar in terms of capabilities, and hence deploy the same number of keys in all sensors in a network to provide the aforementioned protections. In this paper we demonstrate that a probabilistic unbalanced distribution of keys throughout the network that leverages the existence of a small percentage of more capable sensor nodes can not only provide an equal level of security but also reduce the consequences of node compromise. We demonstrate the effectiveness of this approach on small networks using a variety of trust models and then demonstrate the application of this method to very large systems. The approach and analysis presented in this paper can be applied to all protocols that use probabilistic keys including those that employ broadcast mechanisms, hash functions or polynomials for the generation of keys.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Resource Aware Middleware Services Over MANETs 通过manet的资源感知中间件服务
O. Drugan, T. Plagemann, E. Munthe-Kaas
{"title":"Resource Aware Middleware Services Over MANETs","authors":"O. Drugan, T. Plagemann, E. Munthe-Kaas","doi":"10.1109/INFOCOM.2006.66","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.66","url":null,"abstract":"In emergency and rescue operations MANETs can help to increase the efficiency of the collaborative work. The goal is to increase the availability of services and information through resource awareness. The work described in this paper, presents our approach towards prediction of current and future resources available on remote devices. Our solution is based on information extracted from the node's routing protocol. The advantage of our approach is that resource management is not intrusive, does not need location information, and is independent of the routing protocol. We are using simulations to analyze for how far into the future we can make valid predictions.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131877534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Node Identity Internetworking Architecture 一个节点身份互联网络架构
B. Ahlgren, J. Arkko, L. Eggert, J. Rajahalme
{"title":"A Node Identity Internetworking Architecture","authors":"B. Ahlgren, J. Arkko, L. Eggert, J. Rajahalme","doi":"10.1109/INFOCOM.2006.51","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.51","url":null,"abstract":"The Internet consists of independent networks that belong to different administrative domains and vary in scope from personal area networks, private home networks, corporate networks to ISP and global operator networks. These networks may employ different technologies, communications mediums, addressing realms and may have widely different capabilities. The coming years will add a significant level of dynamic behavior, such as mobile nodes and moving networks, which the Internet must support. At the same time, there is a need to address the increasing levels of harmful traffic and denial-of-service attacks. The existing Internet architecture does not support dynamic behavior or secure communication to a sufficient degree. This paper outlines a node-identity-based internetworking architecture that allows heterogeneous networks to work together without loss of functionality. Some of techniques employed in this architecture include reliance on cryptographic node identifiers, identity routers and localized addressing realms.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信