2008 Next Generation Internet Networks最新文献

筛选
英文 中文
Measurements on the Feasibility of TCP NAT Traversal in Cellular Networks 蜂窝网络中TCP NAT穿越可行性的测量
2008 Next Generation Internet Networks Pub Date : 2008-04-28 DOI: 10.1109/NGI.2008.42
L. Makinen, J. Nurminen
{"title":"Measurements on the Feasibility of TCP NAT Traversal in Cellular Networks","authors":"L. Makinen, J. Nurminen","doi":"10.1109/NGI.2008.42","DOIUrl":"https://doi.org/10.1109/NGI.2008.42","url":null,"abstract":"This paper studies various techniques to overcome the barriers that firewalls and NATs cause to peer-to-peer connectivity. In the mobile context firewalls and NATs are typically managed by the mobile operator and are thus beyond the control of the mobile user. Therefore the focus of this paper is on techniques that take advantage of known behaviors of NATs and firewalls. Instead of studying how to apply explicit control to these devices we analyze how the different NAT and firewall traversal techniques would work in different cellular networks. To get an idea of operator NAT/firewall behavior we measured six cellular networks in different parts of the world. The analysis of the results shows that there is much variance in these networks; three to four (depending on the used approach) of the networks seem to allow TCP traffic between peers behind NATs or firewalls.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Resource Efficient Grooming Policy in Groomable WDM Mesh Networks 可梳理WDM网状网络中的资源高效梳理策略
2008 Next Generation Internet Networks Pub Date : 2008-04-28 DOI: 10.1109/NGI.2008.8
Huaxiong Yao, Yan Yang, Xiansi Tan
{"title":"Resource Efficient Grooming Policy in Groomable WDM Mesh Networks","authors":"Huaxiong Yao, Yan Yang, Xiansi Tan","doi":"10.1109/NGI.2008.8","DOIUrl":"https://doi.org/10.1109/NGI.2008.8","url":null,"abstract":"This paper addresses the traffic grooming problem in wavelength-division multiplexing (WDM) mesh networks. We first introduce a transceiver saving auxiliary graph model, in which various grooming policies can easily be achieved by assigning weight values for various edges. Then we propose a resource efficient grooming policy (REGP) based on the graph model, which take into account the wavelength constraint and transceiver constraint simultaneously according to the correlation between them while other policies consider only one between them. The REGP policy can apply to dynamic traffic and static traffic. In dynamic traffic scenario, REGP utilizes network resources efficiently according to the ratio of the available number of two resources. In static traffic scenario, REGP chooses the most economical routing path according to the cost ratio between the two resources. Simulation results validate that REGP reduces the blocking probability for dynamic traffic and saves the total network cost for static traffic. Results also show that REGP always has a better performance than other policies in various conditions, static traffic, dynamic traffic and various resource deployments.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115203835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near-Optimal Load Balancing in Dense Wireless Multi-Hop Networks 密集无线多跳网络中的近最优负载均衡
2008 Next Generation Internet Networks Pub Date : 2008-04-28 DOI: 10.1109/NGI.2008.31
E. Hyytia, J. Virtamo
{"title":"Near-Optimal Load Balancing in Dense Wireless Multi-Hop Networks","authors":"E. Hyytia, J. Virtamo","doi":"10.1109/NGI.2008.31","DOIUrl":"https://doi.org/10.1109/NGI.2008.31","url":null,"abstract":"We consider the load balancing problem in wireless multi-hop networks. In the limit of a dense network, there is a strong separation between the macroscopic and microscopic scales, and the load balancing problem can be formulated as finding continuous curves (\"routes\") between all source-destination pairs that minimize the maximum of the so-called scalar packet flux (\"traffic load\"). In this paper we re-formulate the problem by focusing entirely on the so-called d-flows (vector flow field of packets with a common destination x) and by looking at the equation these flows have to satisfy. The general solution to this equation can be written in terms of a single unknown scalar function, psi(r, x), related to the circulation density of the d-flow, for which function the optimization task can be presented as a problem of variational calculus. In this approach, we avoid completely dealing with systems of paths and calculating the load distribution resulting from the use of a given set of paths. Once the optimal solution for psi(r, x) is found the corresponding paths are obtained as the flow lines of the d-flows. In the example of a unit disk with uniform traffic demands we are able to find a set of paths which is considerably better than any previously published results, yielding a low maximal scalar flux and an extraordinarily flat load distribution. We further illustrate the methodology for a unit square with comparable improvements achieved.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128517887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Three Methods for Optimizing Single-Shortest Path Routing 单最短路径路由优化的三种方法
2008 Next Generation Internet Networks Pub Date : 2008-04-28 DOI: 10.1109/NGI.2008.15
M. Dzida, M. Zagozdzon, M. Żotkiewicz, M. Pettersson, M. Pióro, M. Duelli, M. Menth
{"title":"Three Methods for Optimizing Single-Shortest Path Routing","authors":"M. Dzida, M. Zagozdzon, M. Żotkiewicz, M. Pettersson, M. Pióro, M. Duelli, M. Menth","doi":"10.1109/NGI.2008.15","DOIUrl":"https://doi.org/10.1109/NGI.2008.15","url":null,"abstract":"Intra-domain routing in IP networks is based on the shortest path principle by assigning administrative weights (costs) to links. The resulting least-cost paths determine routes between pairs of routers. If several such equal-cost paths exist between a pair of routers, it may not be clear which of them is actually used to route traffic. This makes it difficult to predict the network traffic flow distribution. Therefore, the selected link costs should assure uniqueness of the shortest paths. On top of that, the link costs can be optimized with respect to some traffic objective. The resulting optimization problem, referred to as SSPP, turns out to be NP-hard. SSPP can be formulated as a mixed-integer programming problem and, as such, solved with branch-and- bound (B&B). In this paper, we consider three methods for SSPP. Two of them are exact methods based on B&B, namely branch- and-cut and constraint programming. Since the exact solutions of SSPP may require excessive computation time and may not always be effective when applied to practical networks, we also study a fast heuristic method. Finally, in a numerical study, we compare the effectiveness of the three approaches.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133599644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Resource Adaptation for Continuous Profit Optimization in Overlay and Virtual Networks 覆盖和虚拟网络中持续利润优化的资源自适应
2008 Next Generation Internet Networks Pub Date : 2008-04-28 DOI: 10.1109/NGI.2008.24
C. Tran, Z. Dziong
{"title":"Resource Adaptation for Continuous Profit Optimization in Overlay and Virtual Networks","authors":"C. Tran, Z. Dziong","doi":"10.1109/NGI.2008.24","DOIUrl":"https://doi.org/10.1109/NGI.2008.24","url":null,"abstract":"Virtual networks and service overlay networks lease bandwidth from Internet autonomous systems to offer end to end quality of service at competitive costs. In this paper, we propose a novel network resource management approach, based on an economic model, which allows continuous optimizing of the network profit, while keeping acceptable grade of service. The proposal integrates leased link capacity adaptation and connection reward adaptation with connection admission control and routing policies. In our approach, these policies are based on a decomposition of the Markov decision process. The approach implementation is based on link traffic measurements. Numerical analysis validates the approach and shows the convergence and stability of the adaptation as a function of measurement parameters.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131903060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reputation Management for DHT-Based Collaborative Environments 基于dht的协作环境的声誉管理
2008 Next Generation Internet Networks Pub Date : 2008-04-28 DOI: 10.1109/NGI.2008.49
N. Fedotova, L. Veltri
{"title":"Reputation Management for DHT-Based Collaborative Environments","authors":"N. Fedotova, L. Veltri","doi":"10.1109/NGI.2008.49","DOIUrl":"https://doi.org/10.1109/NGI.2008.49","url":null,"abstract":"This article addresses a problem of integration of reputation management mechanisms and lookup processes in (distributed hash table) DHT-based peer-to-peer (P2P) networks with collaborative nature. We present a possible scenario of application of some reputation techniques to lookup and data retrieval processes in a P2P network based on the popular Kademlia algorithm. Unlike most of existing reputation management systems for DHT-based P2P environments, we don't use a number of successful downloads as the main instrument to evaluate a trustworthiness of peers, but we propose to consider any type of interactions between nodes. This choice is motivated by the fact that file sharing is not a unique service supported by DHT-based P2P systems. There are other application areas for P2P (e.g. collaborative and distributed computing) where it is important to consider such aspects as a risk factor, a \"stay on-line\" time or a number of requests without reply.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114528119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Improved CSMA/CA Protocol for IEEE 802.11 IEEE 802.11改进的CSMA/CA协议
2008 Next Generation Internet Networks Pub Date : 2008-04-28 DOI: 10.1109/NGI.2008.40
A. Zúquete
{"title":"Improved CSMA/CA Protocol for IEEE 802.11","authors":"A. Zúquete","doi":"10.1109/NGI.2008.40","DOIUrl":"https://doi.org/10.1109/NGI.2008.40","url":null,"abstract":"This paper describes a modification of the CSMA/CA protocol used in IEEE 802.11 wireless networks for improving medium reservation actions. The modification promotes bidirectional data transfers between stations that reserve the medium using an RTS/CTS handshake. This approach reduces the amount of RTS/CTS handshakes required when two stations have simultaneously data to send to each other. Consequently, we improve the occupation of the medium with useful data transfers and minimize RTS collisions by reducing the number of RTS/CTS handshakes required to exchange data. Theoretical performance evaluations with several operational parameters and data volumes showed a reduction of 7 to 47% of the elapsed time to complete a bidirectional data exchange. Fairness in the medium access is kept but stations should use extra policies for preventing frames in output queues to take too long to be transmitted; a simple policy based on per-frame counters is sketched.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
BitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks 下一代网络中基于BitTorrent的高效内容共享解决方案
2008 Next Generation Internet Networks Pub Date : 2008-04-28 DOI: 10.1109/NGI.2008.47
P. Ekler, I. Dévai, B. Bakos, A. Kiss
{"title":"BitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks","authors":"P. Ekler, I. Dévai, B. Bakos, A. Kiss","doi":"10.1109/NGI.2008.47","DOIUrl":"https://doi.org/10.1109/NGI.2008.47","url":null,"abstract":"As the architecture of participation became the main design principle in Web2.0, more and more content sharing solutions have appeared on the Internet. These systems encourage end users to create, publish, tag and consume content. Most of them offer a web interface to access the service and are typically implemented with the traditional client-server software architecture. Due to client-server architecture they require additional investments on the backend side as the service attracts more and more users. In this paper we propose an innovative content sharing solution, called Swarm, which offers the following benefits to service providers: cost efficiency, mobility support and necessary control points to prevent misuse of the service. We propose an architecture that combines the advantages of P2P and client-server systems into a single, competitive hybrid solution. First, we introduce the proposed architecture with the most important features, discuss our experience with the reference implementation and finally demonstrate calculations describing the cost efficiency of the Swarm solution.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125001920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CoV(t)-based Traffic and Queuing Modeling 基于CoV(t)的流量与排队建模
2008 Next Generation Internet Networks Pub Date : 2008-04-28 DOI: 10.1109/NGI.2008.44
L. Noirie, G. Post
{"title":"CoV(t)-based Traffic and Queuing Modeling","authors":"L. Noirie, G. Post","doi":"10.1109/NGI.2008.44","DOIUrl":"https://doi.org/10.1109/NGI.2008.44","url":null,"abstract":"Accurate performance evaluation and network dimensioning are required for the design and the deployment of new telecommunication networks based on packet-switching technologies (e.g., Ethernet, IP, G/T-MPLS, etc.). In this context, network engineers need simple, efficient and realistic traffic models. In this paper we investigate traffic modeling based on the coefficient of variation CoV(t) of the data rate observed at different time scales t. We derive a simplified CoV(t)-based traffic model, the novelty being that it requires only four parameters easily tunable with the following characteristics: the mean-rate mu, the link capacity C constraining the traffic, the Hurst parameter H and the transition time scale t0 linked to the burst duration. Confronted to some real traffic traces, our model proves to be accurate. We illustrate how to use it in analytical performance calculation by applying it to the \"ideal switch\" case: thanks to our four-parameter simple model, one can derive formulas for node performance estimation or dimensioning. Finally, we propose a new fitting procedure that automatically translates the four-parameter traffic model of this paper into a superposition of Markov fluid ON-OFF sources, and that is simpler than already existing fitting procedures. This superposition can be used to generate traffic for packet switch simulations, simplifying the set-up of the test traffic to the specification of the four parameters we mentioned above.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal p-Persistent MAC Algorithm for Event-Driven Wireless Sensor Networks 事件驱动无线传感器网络的最优p-Persistent MAC算法
2008 Next Generation Internet Networks Pub Date : 2008-04-28 DOI: 10.1109/NGI.2008.34
J. Vales-Alonso, E. Egea-López, M. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro
{"title":"Optimal p-Persistent MAC Algorithm for Event-Driven Wireless Sensor Networks","authors":"J. Vales-Alonso, E. Egea-López, M. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro","doi":"10.1109/NGI.2008.34","DOIUrl":"https://doi.org/10.1109/NGI.2008.34","url":null,"abstract":"In event-driven wireless sensor networks nodes transmit information only if the monitored physical magnitude levels have triggered an alarm. In these networks, traffic exhibits a high spatial correlation, since it is likely that neighbor nodes detect and try to notify the same events. Thus, the probability of packet collision raises up, as well as notification delay, just as opposite as required. In this work we propose to use a p- persistent mechanism in the access control layer. The aim is reducing collisions and saving energy. We compute the optimal p for a coherent network deployment and describe the experimental implementation of our proposal. Theoretical computations predict a notable improvement, specially in terms of energy, and experiments reveal that our proposal achieves up to 67% of energy saving compared against a perfect (collision-free) mechanisms.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信