M. Portmann, P. Sookavatana, S. Ardon, A. Seneviratne
{"title":"The cost of peer discovery and searching in the Gnutella peer-to-peer file sharing protocol","authors":"M. Portmann, P. Sookavatana, S. Ardon, A. Seneviratne","doi":"10.1109/ICON.2001.962351","DOIUrl":"https://doi.org/10.1109/ICON.2001.962351","url":null,"abstract":"A lot of attention has been focused on peer-to-peer file sharing systems. Gnutella is a fully distributed peer-to-peer protocol without the need for a central entity. This increases the reliability of the system by avoiding a single point of failure as well making it more immune to legal attack. The two main features of the Gnutella protocol discovery of peers and searching for files are implemented by passing different types of messages between the nodes of the Gnutella overlay network. Due to its fully distributed nature, Gnutella relies on flooding to route most of these messages, which immediately raises the question of cost and scalability. We study these aspects of the Gnutella protocol by means of simulation also considering the influence of the topology of the Gnutella network.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115609959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet charging-behind the time$","authors":"M. Chalmers, S. Jha, Mahbub Hassan","doi":"10.1109/ICON.2001.962327","DOIUrl":"https://doi.org/10.1109/ICON.2001.962327","url":null,"abstract":"Billing and charging is a hard issue, but an extremely important one given the increasingly commercial nature of the Internet. Economic analysis and emerging Internet technologies have stimulated charging research to new levels, and many, approaches have been produced by the Internet community in response to such stimulus, but little standardisation has resulted. This paper is a sampling of the diverse area of Internet charging, highlighting some of the key directions in previous research and giving examples of specific work.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122505957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximating fair bandwidth allocation in core-stateless networks","authors":"Zhai Mingyu, Gu Guanqun","doi":"10.1109/ICON.2001.962384","DOIUrl":"https://doi.org/10.1109/ICON.2001.962384","url":null,"abstract":"We present queue length based fair queueing (QLFQ), a scheme to approximate fair bandwidth allocation without per-flow state. Edge routers divide each flow into a set of layers using a linear encoding scheme and insert an appropriate label into each packet header. Core routers maintain a dropping threshold according to the current queue length at each router; packets with a label greater than the threshold are dropped. We have evaluated QLFQ together with CSFQ (core-stateless fair queueing) and RFQ (rainbow fair queueing) with several different configurations and traffic sources. The simulation results show that QLFQ is able to achieve approximately fair bandwidth sharing in all of these scenarios. The performance of QLFQ is comparable to that of CSFQ, and it performs much better than RFQ. The simulations also show that in an environment with bursty traffic sources, QLFQ provides much better fairness than CSFQ.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123247749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A transparent deployment method of RSVP-aware applications on UNIX","authors":"Yu-Ben Miao, W. Hwang, C. Shieh","doi":"10.1109/ICON.2001.962382","DOIUrl":"https://doi.org/10.1109/ICON.2001.962382","url":null,"abstract":"This paper proposes a method, called RLR (RSVP library redirection), which can transform legacy Internet applications into RSVP-aware applications without modifying their source files. RLR achieves the transparent transformation by redirecting procedure calls from the socket library to the RAPI (RSVP application programming interface) library. For UNIX operating systems, such as Linux, Free-BSD etc., the redirection can be realized since the related mechanisms of procedure call interception are supported in these operating systems. In addition to the advantage of transparent transformation, RLR can allow a single RLR software module to be used for multiple programs if they have similar behavior. We have used one RLR module to transform several FTP applications to be RSVP-aware. The experimental results show the feasibility of RLR.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"10 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120844293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OnLine Test System, an application of passive testing in routing protocols test","authors":"Yixin Zhao, Xia Yin, Jianping Wu","doi":"10.1109/ICON.2001.962339","DOIUrl":"https://doi.org/10.1109/ICON.2001.962339","url":null,"abstract":"In order to perform effective routing protocol testing, passive testing is introduced. The passive testing checks the protocol implementation through online observation. It can be performed in the production field without interfering with the network and possesses several other beneficial features. This test method was realized in an OnLine Test System (OLTS). Key techniques were worked out and the framework was designed. The OLTS exploits the state synchronization algorithm to test the protocol state machine. It tests the exchange and the manipulation of the routing information through topology analysis and internal process simulation. OLTS supports multiple instances to work in a distributed environment. It can also cooperate with an active test system to bring out the best in each other. The prototype of the OLTS has been implemented. The testing of BGP, OSPF and RIP has been performed.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133770994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bandwidth allocation scheme in ATM networks based on virtual path for different quality of service (QoS) requirements","authors":"T. Sanguankotchakorn, Bhichate Chiewthanakul","doi":"10.1109/ICON.2001.962396","DOIUrl":"https://doi.org/10.1109/ICON.2001.962396","url":null,"abstract":"We consider the bandwidth allocation scheme of ATM networks based on the virtual path (VP) concept. The bandwidth is allocated individually for supporting different traffic classes with different QoS requirements within a VP. By applying the Markov modulated deterministic process method, different models of VP combinations are proposed in order to compute the minimum capacity and buffer size required to satisfy the entire QoS requirements when multiple classes of on-off sources are multiplexed into UP. Combinations of static VP, called static bandwidth allocation, are proposed to achieve the optimum total capacity, and total buffer required for satisfying the individual QoS requirements. Further, by revising the existing algorithms and cell loss probability function, different priority assignments of VP combination, called dynamic bandwidth allocation, are also proposed to compute the minimum capacity and buffer size. Simulations of these schemes are carried out to evaluate their performance.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a robust and controllable intra-domain multicast protocol","authors":"Yulu Ma, Keping Long, Shiduan Cheng","doi":"10.1109/ICON.2001.962353","DOIUrl":"https://doi.org/10.1109/ICON.2001.962353","url":null,"abstract":"CBT and PIM-SM are two typical intra-domain multicast routing protocols. However, CBT lacks an efficient member management mechanism such as admission control and authentication for senders. In PIM-SM, multicast traffic concentrates on RP which causes network collapse. Frequently the authorization operation tends to overload RP. Furthermore, PIM-SM is single-failure, which means RP failure will destroy the whole multicast tree. We propose a new protocol that can effectively solve all these problems by admitting senders at multiple cores and transporting packets towards uni-direction.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128554622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haitao Wu, Keping Long, Shiduan Cheng, Jian Ma, Yanqun Le
{"title":"TCP friendly fairness in Differentiated Services IP networks","authors":"Haitao Wu, Keping Long, Shiduan Cheng, Jian Ma, Yanqun Le","doi":"10.1109/ICON.2001.962321","DOIUrl":"https://doi.org/10.1109/ICON.2001.962321","url":null,"abstract":"The Differentiated Services architecture has been proposed by IETF to implement QoS in IP networks. However, research shows that there exists great unfairness in the DiffServ network, especially between responsive and unresponsive aggregate traffic. This paper argues that responsive and unresponsive flows should be treated differently only to their out-of-profile traffic, in addition, traffic responsiveness should be identified by its behavior rather than simply by protocol. Then this paper defines the TCP-friendly fairness in the DiffServ network by introducing the idea of TCP friendliness into the DiffServ network to guarantee the fairness between responsive and unresponsive aggregate flows. Moreover, two markers, srTCM and trTCM, with eight mapping schemes, are examined by elaborate simulations, however, none could achieve the TCP-friendly fairness. Therefore, this paper propose the direct congestion control scheme (DCCS) to achieve fairness between responsive and unresponsive aggregate flows.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133196782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A graph theoretic model for hardware-based firewalls","authors":"Y. Permpoontanalarp, Chaiwat Rujimethabhas","doi":"10.1109/ICON.2001.962345","DOIUrl":"https://doi.org/10.1109/ICON.2001.962345","url":null,"abstract":"Firewalls offer a protection for private networks against external attacks. However, configuring firewalls is a difficult task. The reason is that the effects of a firewall configuration cannot be easily seen during the configuration time. As a result, errors and loopholes in firewall configurations, if they exist, are discovered only after they actually happen at the execution time. We propose a preliminary yet novel model and its methodology for hardware-based firewalls. Our model offers precise and simple understanding of effects of firewall configurations. Moreover, our methodology offers an analysis of effects of firewall configurations. In particular, it provides reasoning about the correctness of firewall configurations. Also, the redundancy and inconsistency of firewall rules can be reasoned about. As a result, many kinds of errors and loopholes of firewall configurations can be detected during the configuration time.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117195443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using network flows in hierarchical QoS routing","authors":"V. Sarangan, R. Acharya","doi":"10.1109/ICON.2001.962379","DOIUrl":"https://doi.org/10.1109/ICON.2001.962379","url":null,"abstract":"Quality of Service (QoS) routing is the process of routing a connection through a network based on its resource requirements. In QoS routing a lot of overhead is generated either due to the state maintenance or during the call establishment. These overheads increase with the network size. Hence to deploy QoS routing in very big networks, special techniques for reducing these overheads have to be developed. State aggregation is an important technique for reducing the state maintenance overhead. In state aggregation, each domain constructs an aggregated topology of itself, and sends it to other domains. Other domains make routing decisions based on this aggregated information. However, as the network resources change dynamically, the information sent by a domain quickly becomes out-of-date. This stale information leads to bad routing decisions and hence the routing performance goes down. If a domain can update the aggregated information sent by other domains, better routing decisions can be made and hence the routing performance can improve. In this paper, based on \"network flows\", we propose a new scheme for aggregating bandwidth. Our scheme enables a domain to update the aggregate sent by another domain and thus keep track of resources available in other domains. We also give a distributed approach for inter-domain routing based on our proposed aggregation scheme. Simulation results show that our method gives a better bandwidth admission ratio when compared to existing aggregation techniques.","PeriodicalId":178842,"journal":{"name":"Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114682210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}