{"title":"Service-oriented MPLS network management in a virtual networking environment","authors":"B. Thurm, M. Hennig","doi":"10.1109/ICCCN.2003.1284209","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284209","url":null,"abstract":"Using XML-based Web services for network management purposes gains more and more attention as the underlying principles seem to be highly appropriate for developing efficient and interoperable management systems. Hereby, a major advantage is the standard, XML-based way of accessing, finding, and defining management functionality in a distributed, Web-based environment. In this context, the following paper presents a novel management interface allowing to control MPLS (multiprotocol label switching) devices via Web service calls. Moreover, a novel virtual networking environment based on UML (user-mode Linux) is presented which can be used to establish comprehensive network scenarios efficiently without using dedicated hardware.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126207948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single and multipath logical topology design and traffic grooming algorithm in IP over WDM networks","authors":"Kwangil Lee, M. Shayman","doi":"10.1109/ICCCN.2003.1284150","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284150","url":null,"abstract":"In this paper we investigate single- and multipath logical topology design and traffic grooming algorithms. Since the problem of the optimal logical topology design for all traffic demands is NP-complete, we design a logical topology by sequentially constructing the shortest path for one source-destination pair at a time. In the single path case, the demand for each source-destination pair must be routed on a single path. In the multipath case, if it is not feasible to route a demand on a single path, the traffic demand is divided into multiple subdemands and a path is provided for each subdemand. Each path is a locally optimized path in the sense that there are no other paths with less hop count that may be constructed from existing links and newly created links. We propose heuristic algorithms for logical topology design and traffic grooming in both the single path and multipath cases. The performance of these algorithms in terms of weighted hop count and throughput is evaluated using the GLASS/SSF simulator. The results indicate that a proposed single path algorithm outperforms other known algorithms in terms of weighted hop count and throughput. Also, we observed that multipath algorithms improve network throughput and a multipath algorithm with widest-shortest paths reduces the weighted hop count compared to single path algorithms.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"71 s300","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113953543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MAPS - a generalized scheme for quality of service routing under delay-bandwidth constraints","authors":"Lei Zhang, J. Muppala, S. Chanson","doi":"10.1109/ICCCN.2003.1284214","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284214","url":null,"abstract":"In this paper we present a generalized scheme for quality of service routing with both delay and bandwidth constraints using a delay weighted flow approach. The objective is to minimize call blocking probability. A request is routed along the path capable of supporting the required quality of service and which most preserves the routing ability of the network for future requests. A general mathematical model has been formulated to solve this problem. Simulation results show that the proposed scheme outperforms existing schemes.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116781895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web server performance in a WAN environment","authors":"Vsevolod Panteleenko, V. Freeh","doi":"10.1109/ICCCN.2003.1284195","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284195","url":null,"abstract":"This paper analyzes web server performance under simulated WAN conditions. The workload simulates many critical network characteristics, such as network delay, bandwidth limit for client connections, and small MTU sizes to dial-up clients. A novel aspect of this study is the examination of the internal behavior of the web server at the network protocol stack and the device driver. We discovered that WAN network characteristics may significantly change the behavior of the web server compared to LAN-based simulations and may make many of optimizations of server design irrelevant in this environment. Particularly, we found that the small MTU size of the dial-up or wireless user connections can increase the processing overhead several times.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131464578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A random graph approach for multicast scheduling and performance analysis","authors":"Guowen Han, Yuanyuan Yang","doi":"10.1109/ICCCN.2003.1284181","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284181","url":null,"abstract":"In this paper, we consider scheduling in multicast switching networks, which aims to minimize the multicast latency for a set of multicast requests. Such a problem has been proved to be NP-complete. We propose a simple, fast greedy multicast scheduling algorithm and derive a lower bound and an upper bound on the performance of the algorithm. As can be seen, while a lower bound is fairly straightforward, the upper bound is much more difficult to obtain. By translating the multicast scheduling problem into a graph theory problem and employing a random graph approach, we are able to obtain a probabilistic upper bound on the performance of the multicast scheduling algorithm. Our analytical and simulation results show that the performance of the proposed multicast scheduling algorithm is quite close to the lower bound and is statistically guaranteed by the probabilistic upper bound.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127927025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust sensor localization algorithm in wireless ad-hoc sensor networks","authors":"Xiang Ji, H. Zha","doi":"10.1109/ICCCN.2003.1284219","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284219","url":null,"abstract":"Wireless ad-hoc sensor networks are being developed to collect data across the area of deployment. To stamp the collected data and facilitate communication protocols, it is necessary to identify the location of each sensor. Most existing localization algorithms make use of trilateration or multilateration based on range measurements obtained from RSSI, TOA, TDOA and AoA. In the paper, we first study some situations that most existing sensor localization methods fail to perform well. An example of such situations is when the topology of a sensor network is anisotropic. We propose a distributed sensor localization method with estimation-comparison-correction paradigm to address these conditions. In detail, multidimensional scaling (MDS) technique is applied to recover a series of local maps for adjacent sensors in two (or three) dimensional space. The maps along the route from an anchor to another anchor are stitched together to estimate the sensors' physical locations. Then, the estimated anchor locations are compared with the anchors' physical locations for correction, and estimated sensor locations are corrected at the same time to approximate their physical locations. By iterative estimation, comparison, and correction, the method reduces sensor localization errors caused by anisotropic network topology and complex terrain, which were seldom addressed in previous research.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134171075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BEAM: a framework for bridge negotiation in Bluetooth scatternets","authors":"R. Duggirala, R. L. Ashok, D. Agrawal","doi":"10.1109/ICCCN.2003.1284191","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284191","url":null,"abstract":"Bluetooth is a short-range wireless technology designed to connect various low power, resource constrained devices such as cameras, cell-phones, laptops, handhelds, etc. Devices form autonomous ad hoc networks of up to 8 active devices, referred to as piconets. Piconets may be inter-connected by one or more bridge devices to form a scatternet. The Bluetooth specification is very clear about piconet formation, maintenance, operation and termination, but only mentions the concept of a scatternet. The bridges are the most important part of the scatternet as they bear the responsibility of a switch -relaying traffic from one piconet to another. Generally, the implicit assumption made is that the bridge already exists or that the bridge can be formed in some manner. However, the issues surrounding the bridge are complex and involve the masters of more than one piconet. In this paper we propose a framework - the bridge establishment, adaptation and maintenance (BEAM) - for bridge formation, maintenance, negotiation and termination. We have enunciated the mechanisms by which a node may be made a bridge and how it may be used to add or replace subsequent bridges. The framework has been designed to be flexible so that, it may be used by any of the scatternet formation or performance improvement algorithms. It is a logical step absolutely necessary for real world Bluetooth scatternet working and is simply an enabling mechanism to be used in conjunction with other protocols. It is presented in the form of a design specification or a protocol that may be customized by different implementers, and yet maintain a very high degree of interoperability.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on a noise reduction system of CATV network upstream for data communication","authors":"M. Nakamura, Yuying Yang, K. Wasaki, Y. Shidama","doi":"10.1109/ICCCN.2003.1284235","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284235","url":null,"abstract":"All cable modems used in the CATV network use the same upstream and downstream frequencies to establish bidirectional communication with their central system. The upstream frequency band usually suffers from ingress impulse noises that cause severe interference to upstream communication. We have developed a method to detect, at the central system, the places where these noises get into the coaxial cable, using signals/radio waves in the atmosphere in the downstream frequency range such as mobile phones, which are not used in the CATV infrastructure. We also developed a new tap-off system, in which the central system can turn on and off high pass filters connected to output connections in a tap to disable the upstream frequency band on each coaxial subscriber's line, when the line carries excess noises. With this detection system of ingress noise and the new tap-off system, the vulnerability of the security and the stability of the upstream channels in CATV can be improved.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114820853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive marking threshold for assured forwarding services","authors":"Xiaolin Chang, J. Muppala","doi":"10.1109/ICCCN.2003.1284189","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284189","url":null,"abstract":"Recent research studies have shown that assured forwarding (AF) service in the current differentiated services (Diffserv) framework does not provide bandwidth assurance in some circumstances. This paper proposes a mechanism, called Adaptive CIR+PIR Threshold (ACPT), which improves bandwidth assurance and domain throughput simultaneously. Extensive simulation results demonstrate significant improvement with ACPT in bandwidth assurance and domain throughput under various conditions: different round trip times (RTT), different numbers of micro-flows in an aggregate, different target rates, different packet sizes, and the presence of nonadaptive flows, compared to other mechanisms proposed in the literature.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121602534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling TCP Reno with spurious timeouts in wireless mobile environments","authors":"S. Fu, Mohammed Atiquzzaman","doi":"10.1109/ICCCN.2003.1284199","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284199","url":null,"abstract":"TCP has been found to perform poorly in the presence of spurious timeouts (ST) caused by delay spikes which are especially more frequent in today's wireless mobile networks than in traditional wired network. Because STs are generally considered to represent a transient state in wired networks, previous research did not consider the effects of ST on the steady state performance of TCP. In this paper, we propose an analytical model for the sending rate and throughput of TCP Reno as a function of packet error rate and characteristics of spurious timeouts. The proposed model has been validated against simulation results and has been found to be more accurate than previous models in the presence of spurious timeouts.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123948732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}