{"title":"Traffic scheduling in Bluetooth network","authors":"V. Sangvornvetphan, T. Erke","doi":"10.1109/ICON.2001.962367","DOIUrl":"https://doi.org/10.1109/ICON.2001.962367","url":null,"abstract":"Bluetooth is a wireless ad-hoc network concept using a universal short-range radio link for communicating electronic devices in a small area. The Bluetooth radio nodes form piconets and provide a slotted time division duplex (TDD) scheme in which each slot is 0.625 ms long. This work studies traffic performance in a piconet focusing on \"mean packet delay\" and \"probability of packet loss\" of data traffic. A mix of data and voice traffic is used in the simulation where data traffic streams are modeled by an interrupted Bernoulli process. The priority, round robin, and \"alternating priority\" scheduling schemes are studied and compared. The alternating priority scheme turns out to be a fair and efficient scheme and it has almost as good overall performance as in the priority scheme.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synchronizing multimedia flows in active-high-speed networks","authors":"S. Fatmi, N. Boudriga","doi":"10.1109/ICON.2001.962316","DOIUrl":"https://doi.org/10.1109/ICON.2001.962316","url":null,"abstract":"The main requirement of multimedia stream transfer is to guarantee the quality of service contracted between the user and the network. We are particularly interested by the synchronization constraints between different data streams flowing through a high-speed network. Our approach aims to regulate the streams progress reducing the gap observed between these streams and assuming that intermediate nodes in the network are capable of performing appropriate procedures that can be pre-defined by the user and the network manager. This intelligence allows the network nodes to manage the data streams, unlike passive carriers, by accelerating data units arriving after critical delays. We particularly address the case of active-ATM technologies and define for this purpose the active-ATM architecture that is needed for multimedia flow synchronization.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130760324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Kim, S. Koh, Juyoung Park, Singak Kang, Jongwon Choe
{"title":"A design and analysis of top-down based ACK-trees","authors":"E. Kim, S. Koh, Juyoung Park, Singak Kang, Jongwon Choe","doi":"10.1109/ICON.2001.962337","DOIUrl":"https://doi.org/10.1109/ICON.2001.962337","url":null,"abstract":"For reliable multicast service, to use a tree hierarchy can be a promising solution to avoid the well-known ACK-implosion. However, to build an efficient ACK-tree is very difficult for IP multicast because it does not provide explicit membership and routing topology information to the upper layer protocol. Due to the difficulties, not much study has been done on the control tree configuration yet, while it immensely affects the behavior and performance on a protocol using the mechanism. Previous approaches can be classified into top-down and bottom-up, and promising previous works have typically been focused on the bottom-up construction mechanism, because the top-down approach has some drawbacks like long tree creation time. However, the ERS-based mechanism, one of the representative bottom-up mechanisms, is known to cause heavy message overhead. Thus, we propose a novel method which takes the benefits of the top-down approach while relieving its most significant drawback, long tree creation time, adopting the concurrent tree creation concept from the bottom-up approach. We show the proposed mechanism reduces message overhead as well as builds a low level of tree. In addition, we achieve medium performance on tree creation time.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133696480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A performance study of a service covering protocol in ad hoc networks","authors":"E. Fleury, H. Koubaa","doi":"10.1109/ICON.2001.962322","DOIUrl":"https://doi.org/10.1109/ICON.2001.962322","url":null,"abstract":"With the rising number of Internet services, extensive research on service location protocols is a very important feature for future networks. We discuss the performance of a service covering protocol designed for ad hoc networks. Our on-demand protocol is based on a distributed approach which contributes to traffic overhead optimization.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124021713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new efficient group signature scheme based on linear codes","authors":"J. Ma, T. C. Chiam, A. Kot","doi":"10.1109/ICON.2001.962328","DOIUrl":"https://doi.org/10.1109/ICON.2001.962328","url":null,"abstract":"An efficient group signature scheme is presented. The security of this scheme is based on the difficulty of the decoding problem of linear codes, and the security of the ElGamal signature scheme. For a given [n, k, d] code and the corresponding group signature scheme, the lengths of the signatures and the group public key are n+5 and n/sup 2/+5 respectively. With regard to the computational overhead of this scheme, the signing process is basically the same as the ElGamal scheme but with O(n) arithmetic operations; the procedure of opening a signature is very efficient and needs only O(d/sup 2/) arithmetic operations. This scheme allows new members to join a group without modifying the group public key. By distributing new membership certificates to some members, a member can be deleted from a group.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124581376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using XML-based real-time model for distributed real-time multimedia systems","authors":"T. Tsang","doi":"10.1109/ICON.2001.962315","DOIUrl":"https://doi.org/10.1109/ICON.2001.962315","url":null,"abstract":"In order to manipulate multimedia objects effectively to users, there has been great demand for multimedia modelling languages which can provide various ways of presentation with multiple multimedia objects. We propose a Web-based XML modelling language called RT-XML, which is capable of expressing the manipulation of distributed real-time multimedia objects. The real-time statements of RT-XML are added to a subclass of XML. RT-XML includes time constraint, scheduling, probabilistic behaviour and qualitative description of multimedia streams. Finally, we present an application of RT-XML for controlling the delivery of multimedia services, which include resource management and real-time capabilities.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121414447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selective security for TLS","authors":"M. Portmann, A. Seneviratne","doi":"10.1109/ICON.2001.962343","DOIUrl":"https://doi.org/10.1109/ICON.2001.962343","url":null,"abstract":"Today's computing environments are becoming increasingly heterogeneous, mostly due to the growth of mobile computing. In this environment, application layer proxies that can adapt and tailor the content to the client's needs and capabilities as well as to the available network resources are highly beneficial. The problem is that content adaptation proxies are generally incompatible with the notion of end-to-end security. The only generic solution to this problem is the concept of selective security. The idea is to apply security selectively only to the sensitive elements of a data stream and expose the rest to any intermediary system for potential content adaptation. None of the currently used security protocols provides an API for fine-grained control of the application of security mechanisms to a data stream. We propose a simple extension to the transport layer security protocol (TLS), which provides the application with an interface for selectively protecting elements within a data stream. We also discuss a generic application scenario that shows how the proposed extended features can be used in conjunction with content adaptation proxies.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129166584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scrambling and key distribution scheme for digital television","authors":"Wachiwan Kanjanarin, T. Amornraksa","doi":"10.1109/ICON.2001.962331","DOIUrl":"https://doi.org/10.1109/ICON.2001.962331","url":null,"abstract":"The scrambling scheme is a part of the conditional access system (CAS) that is used to prevent unauthorized access to Pay-TV systems. We propose a new scrambling scheme and key distribution scheme. The scrambling scheme is used in conjunction with ordinary encryption techniques, for protecting the digital video streams from unauthorized viewing. A hash function and a pseudo-random number generator are used to prepare the video stream before being encrypted. The proposed scheme helps reduce computational time and complexity while providing the same level of security as encrypting the entire video stream. In addition, the proposed secure key distribution scheme can be used with any, scrambling scheme e.g. with our scrambling scheme. By using the Chinese remainder theorem (CRT) for distributing parameters in the scrambling process, the security of the scheme can be increased. Moreover, our scheme can prevent two common problems, namely, smart card cloning and McCormac Hack.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129371473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An investigation into performance of congestion control mechanisms in ATM-UBR service for TCP sources","authors":"J. Phunitatkul, T. Erke","doi":"10.1109/ICON.2001.962386","DOIUrl":"https://doi.org/10.1109/ICON.2001.962386","url":null,"abstract":"The performance of congestion control mechanisms in UBR service for TCP sources is investigated. Not only static TCP sources but also dynamic TCP sources are applied to investigate the performance of congestion control in the practical way. For static sources, the result from random early detection (RED) achieves high efficiency but not the highest fairness. RED improves fairness slightly less than FBA. For dynamic sources, the efficiency is not much different for each UBR drop policy according to the different traffic profiles. RED performs the highest fairness. The difference of implementation between the other schemes and RED as the other schemes are most appropriate to implement with the instantaneous queue length, but that RED is appropriate to implement with the average queue length which is suitable for the real or dynamic Internet traffic characteristic.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117344576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feedback consolidation algorithm for ABR point-to-multipoint connections in ATM networks","authors":"M. El-Derini, A. E. El-Abd, Wael Hosny Fouad Aly","doi":"10.1109/ICON.2001.962369","DOIUrl":"https://doi.org/10.1109/ICON.2001.962369","url":null,"abstract":"The point-to-multipoint ABR service in ATM networks is important for many data applications. Resource management (RM) cells are used by receivers to return back to the source an explicit rate indicating their bandwidth fair share on the bottleneck of the path leading to them. Switches in the multicast tree consolidate the information in backward RM cells received from downstream switches or receivers and forward this consolidated information to their upstream switch. A number of algorithms have been developed for extending ABR congestion avoidance algorithms to perform feedback consolidation at the branch points. A demonstration of the performance of the proposed algorithm compared with some other algorithms through a set of numerical examples is presented. We used the ATM/HFC network simulator version 4.1, released December 1998 by the American National Institute for Standards and Technology (NIST). The simulator code is modified to make the algorithm.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115205610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}