Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)最新文献

筛选
英文 中文
Service-oriented MPLS network management in a virtual networking environment 虚拟组网环境下面向服务的MPLS网络管理
B. Thurm, M. Hennig
{"title":"Service-oriented MPLS network management in a virtual networking environment","authors":"B. Thurm, M. Hennig","doi":"10.1109/ICCCN.2003.1284209","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284209","url":null,"abstract":"Using XML-based Web services for network management purposes gains more and more attention as the underlying principles seem to be highly appropriate for developing efficient and interoperable management systems. Hereby, a major advantage is the standard, XML-based way of accessing, finding, and defining management functionality in a distributed, Web-based environment. In this context, the following paper presents a novel management interface allowing to control MPLS (multiprotocol label switching) devices via Web service calls. Moreover, a novel virtual networking environment based on UML (user-mode Linux) is presented which can be used to establish comprehensive network scenarios efficiently without using dedicated hardware.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126207948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Single and multipath logical topology design and traffic grooming algorithm in IP over WDM networks IP over WDM网络中单路和多路逻辑拓扑设计及流量疏导算法
Kwangil Lee, M. Shayman
{"title":"Single and multipath logical topology design and traffic grooming algorithm in IP over WDM networks","authors":"Kwangil Lee, M. Shayman","doi":"10.1109/ICCCN.2003.1284150","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284150","url":null,"abstract":"In this paper we investigate single- and multipath logical topology design and traffic grooming algorithms. Since the problem of the optimal logical topology design for all traffic demands is NP-complete, we design a logical topology by sequentially constructing the shortest path for one source-destination pair at a time. In the single path case, the demand for each source-destination pair must be routed on a single path. In the multipath case, if it is not feasible to route a demand on a single path, the traffic demand is divided into multiple subdemands and a path is provided for each subdemand. Each path is a locally optimized path in the sense that there are no other paths with less hop count that may be constructed from existing links and newly created links. We propose heuristic algorithms for logical topology design and traffic grooming in both the single path and multipath cases. The performance of these algorithms in terms of weighted hop count and throughput is evaluated using the GLASS/SSF simulator. The results indicate that a proposed single path algorithm outperforms other known algorithms in terms of weighted hop count and throughput. Also, we observed that multipath algorithms improve network throughput and a multipath algorithm with widest-shortest paths reduces the weighted hop count compared to single path algorithms.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"71 s300","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113953543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MAPS - a generalized scheme for quality of service routing under delay-bandwidth constraints MAPS -延迟带宽约束下服务质量路由的一种通用方案
Lei Zhang, J. Muppala, S. Chanson
{"title":"MAPS - a generalized scheme for quality of service routing under delay-bandwidth constraints","authors":"Lei Zhang, J. Muppala, S. Chanson","doi":"10.1109/ICCCN.2003.1284214","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284214","url":null,"abstract":"In this paper we present a generalized scheme for quality of service routing with both delay and bandwidth constraints using a delay weighted flow approach. The objective is to minimize call blocking probability. A request is routed along the path capable of supporting the required quality of service and which most preserves the routing ability of the network for future requests. A general mathematical model has been formulated to solve this problem. Simulation results show that the proposed scheme outperforms existing schemes.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116781895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web server performance in a WAN environment WAN环境中的Web服务器性能
Vsevolod Panteleenko, V. Freeh
{"title":"Web server performance in a WAN environment","authors":"Vsevolod Panteleenko, V. Freeh","doi":"10.1109/ICCCN.2003.1284195","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284195","url":null,"abstract":"This paper analyzes web server performance under simulated WAN conditions. The workload simulates many critical network characteristics, such as network delay, bandwidth limit for client connections, and small MTU sizes to dial-up clients. A novel aspect of this study is the examination of the internal behavior of the web server at the network protocol stack and the device driver. We discovered that WAN network characteristics may significantly change the behavior of the web server compared to LAN-based simulations and may make many of optimizations of server design irrelevant in this environment. Particularly, we found that the small MTU size of the dial-up or wireless user connections can increase the processing overhead several times.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131464578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A random graph approach for multicast scheduling and performance analysis 一种随机图方法用于组播调度和性能分析
Guowen Han, Yuanyuan Yang
{"title":"A random graph approach for multicast scheduling and performance analysis","authors":"Guowen Han, Yuanyuan Yang","doi":"10.1109/ICCCN.2003.1284181","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284181","url":null,"abstract":"In this paper, we consider scheduling in multicast switching networks, which aims to minimize the multicast latency for a set of multicast requests. Such a problem has been proved to be NP-complete. We propose a simple, fast greedy multicast scheduling algorithm and derive a lower bound and an upper bound on the performance of the algorithm. As can be seen, while a lower bound is fairly straightforward, the upper bound is much more difficult to obtain. By translating the multicast scheduling problem into a graph theory problem and employing a random graph approach, we are able to obtain a probabilistic upper bound on the performance of the multicast scheduling algorithm. Our analytical and simulation results show that the performance of the proposed multicast scheduling algorithm is quite close to the lower bound and is statistically guaranteed by the probabilistic upper bound.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127927025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust sensor localization algorithm in wireless ad-hoc sensor networks 无线自组织传感器网络中的鲁棒传感器定位算法
Xiang Ji, H. Zha
{"title":"Robust sensor localization algorithm in wireless ad-hoc sensor networks","authors":"Xiang Ji, H. Zha","doi":"10.1109/ICCCN.2003.1284219","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284219","url":null,"abstract":"Wireless ad-hoc sensor networks are being developed to collect data across the area of deployment. To stamp the collected data and facilitate communication protocols, it is necessary to identify the location of each sensor. Most existing localization algorithms make use of trilateration or multilateration based on range measurements obtained from RSSI, TOA, TDOA and AoA. In the paper, we first study some situations that most existing sensor localization methods fail to perform well. An example of such situations is when the topology of a sensor network is anisotropic. We propose a distributed sensor localization method with estimation-comparison-correction paradigm to address these conditions. In detail, multidimensional scaling (MDS) technique is applied to recover a series of local maps for adjacent sensors in two (or three) dimensional space. The maps along the route from an anchor to another anchor are stitched together to estimate the sensors' physical locations. Then, the estimated anchor locations are compared with the anchors' physical locations for correction, and estimated sensor locations are corrected at the same time to approximate their physical locations. By iterative estimation, comparison, and correction, the method reduces sensor localization errors caused by anisotropic network topology and complex terrain, which were seldom addressed in previous research.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134171075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
BEAM: a framework for bridge negotiation in Bluetooth scatternets 蓝牙散射网中桥接协商的框架
R. Duggirala, R. L. Ashok, D. Agrawal
{"title":"BEAM: a framework for bridge negotiation in Bluetooth scatternets","authors":"R. Duggirala, R. L. Ashok, D. Agrawal","doi":"10.1109/ICCCN.2003.1284191","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284191","url":null,"abstract":"Bluetooth is a short-range wireless technology designed to connect various low power, resource constrained devices such as cameras, cell-phones, laptops, handhelds, etc. Devices form autonomous ad hoc networks of up to 8 active devices, referred to as piconets. Piconets may be inter-connected by one or more bridge devices to form a scatternet. The Bluetooth specification is very clear about piconet formation, maintenance, operation and termination, but only mentions the concept of a scatternet. The bridges are the most important part of the scatternet as they bear the responsibility of a switch -relaying traffic from one piconet to another. Generally, the implicit assumption made is that the bridge already exists or that the bridge can be formed in some manner. However, the issues surrounding the bridge are complex and involve the masters of more than one piconet. In this paper we propose a framework - the bridge establishment, adaptation and maintenance (BEAM) - for bridge formation, maintenance, negotiation and termination. We have enunciated the mechanisms by which a node may be made a bridge and how it may be used to add or replace subsequent bridges. The framework has been designed to be flexible so that, it may be used by any of the scatternet formation or performance improvement algorithms. It is a logical step absolutely necessary for real world Bluetooth scatternet working and is simply an enabling mechanism to be used in conjunction with other protocols. It is presented in the form of a design specification or a protocol that may be customized by different implementers, and yet maintain a very high degree of interoperability.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Study on a noise reduction system of CATV network upstream for data communication 有线电视网络数据通信上游降噪系统的研究
M. Nakamura, Yuying Yang, K. Wasaki, Y. Shidama
{"title":"Study on a noise reduction system of CATV network upstream for data communication","authors":"M. Nakamura, Yuying Yang, K. Wasaki, Y. Shidama","doi":"10.1109/ICCCN.2003.1284235","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284235","url":null,"abstract":"All cable modems used in the CATV network use the same upstream and downstream frequencies to establish bidirectional communication with their central system. The upstream frequency band usually suffers from ingress impulse noises that cause severe interference to upstream communication. We have developed a method to detect, at the central system, the places where these noises get into the coaxial cable, using signals/radio waves in the atmosphere in the downstream frequency range such as mobile phones, which are not used in the CATV infrastructure. We also developed a new tap-off system, in which the central system can turn on and off high pass filters connected to output connections in a tap to disable the upstream frequency band on each coaxial subscriber's line, when the line carries excess noises. With this detection system of ingress noise and the new tap-off system, the vulnerability of the security and the stability of the upstream channels in CATV can be improved.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114820853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive marking threshold for assured forwarding services 自适应可靠转发服务标记阈值
Xiaolin Chang, J. Muppala
{"title":"Adaptive marking threshold for assured forwarding services","authors":"Xiaolin Chang, J. Muppala","doi":"10.1109/ICCCN.2003.1284189","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284189","url":null,"abstract":"Recent research studies have shown that assured forwarding (AF) service in the current differentiated services (Diffserv) framework does not provide bandwidth assurance in some circumstances. This paper proposes a mechanism, called Adaptive CIR+PIR Threshold (ACPT), which improves bandwidth assurance and domain throughput simultaneously. Extensive simulation results demonstrate significant improvement with ACPT in bandwidth assurance and domain throughput under various conditions: different round trip times (RTT), different numbers of micro-flows in an aggregate, different target rates, different packet sizes, and the presence of nonadaptive flows, compared to other mechanisms proposed in the literature.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121602534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modelling TCP Reno with spurious timeouts in wireless mobile environments 在无线移动环境中用虚假超时建模TCP Reno
S. Fu, Mohammed Atiquzzaman
{"title":"Modelling TCP Reno with spurious timeouts in wireless mobile environments","authors":"S. Fu, Mohammed Atiquzzaman","doi":"10.1109/ICCCN.2003.1284199","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284199","url":null,"abstract":"TCP has been found to perform poorly in the presence of spurious timeouts (ST) caused by delay spikes which are especially more frequent in today's wireless mobile networks than in traditional wired network. Because STs are generally considered to represent a transient state in wired networks, previous research did not consider the effects of ST on the steady state performance of TCP. In this paper, we propose an analytical model for the sending rate and throughput of TCP Reno as a function of packet error rate and characteristics of spurious timeouts. The proposed model has been validated against simulation results and has been found to be more accurate than previous models in the presence of spurious timeouts.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123948732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信