{"title":"SSM extensions: network layer support for multiple senders in SSM","authors":"K. Saraç, Pavan Namburi, K. Almeroth","doi":"10.1109/ICCCN.2003.1284152","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284152","url":null,"abstract":"Source specific multicast (SSM) provides native support for single sender multicast applications. Current proposals for supporting multiple sender applications on top of SSM includes using multiple SSM channels or using an application layer relay mechanism on top of SSM. These approaches have potential scalability or single point of failure problems, respectively. In this paper, we propose network layer extensions to SSM. Our extensions provide a convenient mechanism for SSM group owners to include additional senders in their multicast applications. We present our SSM extensions model and provide a detailed discussion on the protocol operation under various scenarios. We also examine the protocol performance by comparing it to alternative approaches on several performance metrics. With SSM Extensions, we introduce a small number of changes into the existing infrastructure and in return, provide an effective and efficient mechanism to support multiple-sender applications on top of SSM.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116970216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A TCP socket buffer auto-tuning daemon","authors":"Shao Tao, L. Jacob, A. Ananda","doi":"10.1109/ICCCN.2003.1284185","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284185","url":null,"abstract":"Depending on the bandwidth and round trip time of a network path, certain network connections may need different socket buffers than others. However, most TCP implementations use default socket buffer size for all the connections. This leads to a wastage of kernel memory for low bandwidth, long round trip time network paths and inefficiency for long fat W. Rechard Stevens (1994) network paths. To tackle this problem, we implement a TCP socket buffer auto-tuning daemon. It will periodically tune the socket buffer size of each connection to an optimal value according to the network status of each connection, without the intervention of user or change of network application. The tuning daemon can run on different machines and communicate with each other, send tuning request to the remote daemon and exchange the tuning information. Experiment results are presented to show that this daemon can improve the throughput for network application.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127771772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Xu, R. Lipton, Irfan Essa, Minho Sung, Yong Zhu
{"title":"Mandatory human participation: a new authentication scheme for building secure systems","authors":"Jun Xu, R. Lipton, Irfan Essa, Minho Sung, Yong Zhu","doi":"10.1109/ICCCN.2003.1284222","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284222","url":null,"abstract":"Mandatory human participation (MHP) is a novel authentication scheme that asks the question \"are you human?\" (Instead of \"who are you?\"), and upon the correct answer to this question, can prove a principal to be a human being instead of a computer program. MHP helps solve old and new problems in computer security that existing security measures cannot address properly, including password (or PIN number) guessing attacks and application-level denial of service. A key component of this \"are you human?\" authentication process is a character morphing algorithm that transforms a character string into its graphical form in such a way that a human being won't have any problem recognizing the original string, while a computer program (e.g., an optical character recognition program), will not be able to decipher it or make a correct guess with nonnegligible probability. The basic idea of the MHP scheme is to ask an agent to recognize the string before its login attempts or transaction requests can be honored. Here a protocol is needed to send a puzzle to an agent, check if the answer supplied by the agent is correct, and most importantly make sure that the agent cannot cheat in the process. A number of system and security issues that relate to the protocol need to be addressed for the protocol to be secure, efficient, robust, and user-friendly. The MHP scheme contributes to the foundation of the computer security by faithfully implementing novel security semantics, \"human,\" which existing cryptographic measures cannot express accurately. As many real-world security applications involve the interaction between a human and a computer, which naturally contains \"human\" as a part of its protocol semantics, we believe that the MHP scheme will find many new applications in the future.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128002939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Call admission control in mobile cellular systems using fuzzy associative memory","authors":"Sivaramakrishna Mopati, D. Sarkar","doi":"10.1109/ICCCN.2003.1284155","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284155","url":null,"abstract":"In a mobile cellular system quality of service to mobile terminals (MTs) is measured by the probability of new call blocking P/sub b/, and the probability of forced termination, P/sub ft/. Since the available bandwidth in a cell is very limited, both P/sub b/ and P/sub ft/ cannot be reduced or avoided simultaneously. Usually keeping the P/sub ft/ below a designated level is accepted as the measure of quality of service. Admission of new calls is controlled to reduce P/sub ft/. However, there are at least three parameters (new call arrival rate, mean duration of calls, and mobility of users) that can and change dynamically. Moreover, these parameters are related with P/sub ft/ via complicated nonlinear equations. Therefore, call admission control (CAC) for maintaining a desired value of P/sub ft/ is a very challenging task. No CAC algorithm has been reported in the past that can function well with dynamic changes to all these three parameters. We proposed an algorithm that addresses this issue. The new algorithm uses a fuzzy controller to adjust the call preblocking load value with the changing traffic parameters. The fuzzy controller makes use of fuzzy associative memory (FAM) to maintain the required QoS. The use of new system in dynamic traffic conditions is illustrated. Providing the required level of QoS, the algorithm also increases the channel utilization. The proposed CAC with FAM is compared and contrasted with previous CACs.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The mote connectivity protocol","authors":"Young-ri Choi, M. Gouda, Moon C. Kim, A. Arora","doi":"10.1109/ICCCN.2003.1284220","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284220","url":null,"abstract":"An attractive architecture for sensor networks is to have the sensing devices mounted on small computers, called motes. Motes are battery-powered, and can communicate in a wireless fashion by broadcasting messages over radio frequency. In mote networks, the connectivity of a mote u can be defined by those motes that can receive messages from u with high probability and those motes from which u can receive messages with high probability. In this paper, we describe a protocol that can be triggered by any mote in a mote network in order that each mote in the network computes its connectivity. The protocol is simple and has several energy saving features. We implemented this protocol over TinyOS and discuss the results of some execution runs of this implementation.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130354868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient scheduling discipline for packet switching networks using earliest deadline first round robin*","authors":"Deming Liu, Yann-Hang Lee","doi":"10.1109/ICCCN.2003.1284142","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284142","url":null,"abstract":"In this paper we propose a frame-oriented scheduling discipline, EDF-RR (earliest-deadline-first round-robin), for OQ (output-queued) switch architecture and data traffic consisting of fixed-length cells. Bandwidth reservation for an active session is performed by holding a number of cell slots for the session in frames. Each cell that is going to be transferred in a frame is assigned a virtual release time and a virtual deadline according to the bandwidth reservation scheme. The transmitting order of the cells in frames is thus determined by nonpreemptive nonidling EDF algorithm so that cells of a backlogged session in frames are distributed as uniformly as possible. Through the analysis applying real-time scheduling theory and network calculus as well as network simulation, EDF-RR takes the advantage of low computational complexity, and possesses tight delay bounds and lenient buffer requirements. The proposed scheduling discipline is appropriate for distributed real-time systems as we show that sessions can be configured based on message traffic models and deadline requirements. Also, a modified version of EDF-RR, called EDF-DRR, can be applied as traffic regulator when jitter requirements exist among active sessions.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134066732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A pay word-based micropayment protocol supporting multiple payments","authors":"Sunhyoung Kim, Wonjun Lee","doi":"10.1109/ICCCN.2003.1284234","DOIUrl":"https://doi.org/10.1109/ICCCN.2003.1284234","url":null,"abstract":"In this paper, we propose an efficient micropayment protocol by improving PayWord, which is one of the representative micropayment protocols. In the original PayWord system, it was designed for a customer who generates paywords by performing hash chain operation for payments to an only designated vendor. In other words, the customer has to create new paywords in order to establish commercial transactions with different vendors on the Internet. To supplement this drawback, our proposed scheme provides a useful method to do business with multiple vendors for a customer with only one hash chain operation. In our proposed protocol, a broker creates a new series of hash chain values along with a certificate for the certificate request of a customer. This certificate is signed by the broker to give authority enabling the customer to make paywords. Our proposed scheme provides an efficient means for the customer to do business with multiple vendors.","PeriodicalId":168378,"journal":{"name":"Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114689892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}