Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium最新文献

筛选
英文 中文
A throughput deadlock-free TCP for high-speed Internet 用于高速因特网的吞吐量无死锁的TCP
R. Chang, H. Y. Chan
{"title":"A throughput deadlock-free TCP for high-speed Internet","authors":"R. Chang, H. Y. Chan","doi":"10.1109/ICON.2000.875773","DOIUrl":"https://doi.org/10.1109/ICON.2000.875773","url":null,"abstract":"Throughput deadlocks were observed when TCP was operated on high-speed networks. This deadlock problem is caused by the interaction of the sender-side and receiver-side silly window syndrome avoidance algorithms, because a TCP connection's maximum segment size is no longer small on the high-speed Internet when compared with the send and receive socket buffer sizes. We propose a new congestion-sensitive, adaptive acknowledgment algorithm (CS-AAA) to solve the deadlock problem. Unlike our previously proposed AAA, the CS-AAA is able to respond to and to recover from congestion much faster than AAA. The CS-AAA solves this problem by detecting congestion, and performing a slow-start-like mechanism. Extensive simulation results support that CS-AAA's throughput performance significantly exceeds that of AAA, especially when the send buffer size is relatively large.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113949779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BGP based shortcut virtual channels for transit IP traffic over ATM networks 基于BGP的ATM网络中IP流量传输的快捷虚拟通道
Changhoon Kim, H. Choi, T. Jeong
{"title":"BGP based shortcut virtual channels for transit IP traffic over ATM networks","authors":"Changhoon Kim, H. Choi, T. Jeong","doi":"10.1109/ICON.2000.875794","DOIUrl":"https://doi.org/10.1109/ICON.2000.875794","url":null,"abstract":"This paper suggests an efficient mechanism to establish and utilize shortcut virtual channels for transit traffic over an ATM based IP network which uses BGP as an inter-domain routing protocol. Although in this case, \"MPOA\" or \"CLIP with NHRP\" might be alternative solutions, they incur not only inevitable hop-by-hop routing for the first packet, but also multiple communications between NHC and NHSs. What is worse, the NHRP based schemes can not efficiently cope with inter-domain routing instability that can result in temporal inconsistency between existing shortcut VCs and authoritative paths. BGP, de facto inter-domain routing protocol in the Internet, can directly identify an egress router for transit traffic crossing the network. Thus, when ingress routers know the ATM address of egress routers, virtual channels for transit traffic can be immediately and very easily set up. Fortunately, by the virtue of the extensible design of BGP we can extend it to transport egress router's ATM address without any distortion of the basic mechanism of the protocol. Moreover because the resulting scheme inherits several merits of BCP and ATM shortcut VCs, it can easily enforce administrative policies to the network and dynamically adapt itself to the routing instabilities, even render the existing routers and network architecture.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114263664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Call admission control in cellular multiservice networks using virtual partitioning with priority 基于优先级虚拟分区的蜂窝多业务网络呼叫准入控制
Shun-Ping Chung, Jin-Chang Lee
{"title":"Call admission control in cellular multiservice networks using virtual partitioning with priority","authors":"Shun-Ping Chung, Jin-Chang Lee","doi":"10.1109/ICON.2000.875761","DOIUrl":"https://doi.org/10.1109/ICON.2000.875761","url":null,"abstract":"With the tremendous growth of mobile users and the emergence of multimedia applications, an appropriate call admission control policy is expected to make efficient use of scarce wireless resource while supporting different services with diverse quality-of-service requirements. Also, the popularity of microcells makes the actual traffic load of a given cell deviates from the expected load more easily. Furthermore, handoff calls are normally given priority over new calls to reduce forced termination probability. Virtual partitioning with priority (VPP) is proposed to fulfil the aforesaid goals, whether the traffic is stationary or non-stationary. An approximation method is derived to calculate performance measures of interest. Numerical results show that VPP achieves a similar high multiplexing gain as complete sharing (CS) when all classes are behaving as expected. VPP also realizes a similar isolated effect as complete partitioning (CP) in regions of practical interest. It is also shown under non-stationary scenarios, VPP outperforms trunk reservation (TR).","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121864466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An improved key distribution protocol with perfect reparability 改进的密钥分发协议,具有完美的可修复性
Hu Li, Huanghai Chen, Hongwen Zhu
{"title":"An improved key distribution protocol with perfect reparability","authors":"Hu Li, Huanghai Chen, Hongwen Zhu","doi":"10.1109/ICON.2000.875801","DOIUrl":"https://doi.org/10.1109/ICON.2000.875801","url":null,"abstract":"This paper handles the problem on reparability of key distribution protocols, whose concept was introduced by Hwang and Ku (1995). Two reparable key distribution schemes, which were proposed by Hwang and Ku, are analyzed and their security defects are pointed out, which caused the discussion on whether there can be perfect reparability suitable for implementation. Not agreeing with these authors about the result they got, this paper proposed an improved key distribution protocol, which removes security defects mentioned. Especially, a new method, concealing the repeat of event marker is proposed. This method gives the protocol perfect reparability without making the protocol complex and does not increase the computation much.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"346 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115604746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
QoS-based connection set-up in ATM networks ATM网络中基于qos的连接设置
Sin-Lam Tan, C. Tham, L. Ngoh
{"title":"QoS-based connection set-up in ATM networks","authors":"Sin-Lam Tan, C. Tham, L. Ngoh","doi":"10.1109/ICON.2000.875777","DOIUrl":"https://doi.org/10.1109/ICON.2000.875777","url":null,"abstract":"It is possible to set up virtual connections across multiple ATM switches using ATM Forum's Private Network-Network Interface (PNNI). However, the PNNI protocol is a complex signalling protocol. Although PNNI supports QoS routing, current ATM switches may not fully implement QoS routing as in the PNNI specification. This paper describes a system for creating virtual connections based on QoS requirements, thus providing basic QoS routing functionality. The system maintains up-to-date link-state information in a centralised database, and distributes system tasks such as connection set-up, QoS route selection and detection of link failures, to a few subsystems in a scalable manner. It effectively bridges the gap between complex protocols like PNNI and tedious manual set-up of virtual connections, and can be useful in managing wide area ATM networks such as SingAREN, SingaporeONE and the vBNS.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123101925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated quality of service and network management 综合服务质量和网络管理
Rohit Joshi, C. Tham
{"title":"Integrated quality of service and network management","authors":"Rohit Joshi, C. Tham","doi":"10.1109/ICON.2000.875848","DOIUrl":"https://doi.org/10.1109/ICON.2000.875848","url":null,"abstract":"Today, there are a large number of bandwidth-hungry applications which cause congestion and delay in networks. Delivery delays adversely affect critical applications especially those with real time requirements, e.g. video-conferencing. Hence, more effective quality of service (QoS) and network performance monitoring is required in order to quickly identify and locate performance bottlenecks. An integrated remote monitoring application that monitors both QoS and network performance has been developed. This application is based on the IETF Real Time Flow Monitoring Architecture (RTFM).","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Utilization of multiple block cipher hashing in authentication and digital signatures 多块密码哈希在身份验证和数字签名中的应用
K. Rahouma
{"title":"Utilization of multiple block cipher hashing in authentication and digital signatures","authors":"K. Rahouma","doi":"10.1109/ICON.2000.875798","DOIUrl":"https://doi.org/10.1109/ICON.2000.875798","url":null,"abstract":"A new algorithm for authentication and digital signature is introduced. It is based on using four different hash functions classified as very secure against all attacks except the brute force one. The hash function used is selected by computing nf/sub i/=r/sub i/ mod 4 where r/sub i/ is randomly generated and the initial hash sequence H/sub 0/ is publicized by the sender. According to nf/sub i/, he/she prepares every message block M/sub i/ for encryption by applying a special block cipher technique to obtain the cipher block C/sub i/. Then, the corresponding new hash value H/sub i/ is obtained. The value r/sub i/ is encrypted to R/sub i/ using the sender's secret RSA key d/sub s/ and then the receiver's public one e/sub r/ (this could be reversed if n/sub r/>n/sub s/ where n/sub r/ and n/sub s/ are the modulus numbers of the receiver and sender respectively). The code sent by the sender to the receiver is composed of the combination (C/sub i/, H/sub i/, R/sub i/). This could be useful in checking the integrity of the transmitted message as a whole. The receiver reads the public values H/sub 0/, e/sub s/ and n/sub s/. Then he/she decrypts the cipher C/sub i/ and uses his private RSA key d/sub r/ and the senders public one e/sub s/ to decrypt R/sub i/. Decryption of C/sub i/ yields the prepared block before encryption and decryption of R/sub i/ yields the value r/sub i/. Using r/sub i/, the receiver can compute nf/sub i/=r/sub i/ mod 4. Using nf/sub i/ and H/sub i-1/, he/she can compute the message block M/sub i/' and the hash value H/sub i/'. If H/sub i/'=H/sub i/ then M/sub i/'=M/sub i/ and this means that the message block M/sub i/' was sent by the sender. If this condition is not satisfied, then the message is either changed or sent by another sender. This algorithm is easy to implement and hard to attack.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130228713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and comparison of distributed caching schemes 分布式缓存方案的实现与比较
S. Selvakumar, P. Prabhakar
{"title":"Implementation and comparison of distributed caching schemes","authors":"S. Selvakumar, P. Prabhakar","doi":"10.1109/ICON.2000.875842","DOIUrl":"https://doi.org/10.1109/ICON.2000.875842","url":null,"abstract":"Shared Web caches allow multiple clients to quickly access a pool of popular Web pages. An organization that provides shared caching to its Web clients will typically have a collection of shared caches rather than a single cache. If a collection of shared caches is used, it is required to coordinate the caches so that all cached pages in the collection are shared among the clients of the organization. In this paper, two protocol schemes for coordinating the collection of shared caches are investigated. The first scheme is based on the Internet caching protocol (ICP). In the ICP scheme, the Web caches query other caches for the Web pages and fetch the Web pages from the neighbors if they have cached the requested page. The second scheme is the hash routing scheme in which the client (browser) has to find the hash value for the URL of the requested page and send the request to the corresponding cache server. These two schemes have been implemented, and compared with respect to the page retrieval latency and the adaptability of the cache servers when a peer cache server fails. Our analysis shows that the hash routing schemes have significant performance advantages over ICP with respect to the average latency under normal conditions but when failure rate of the cache server is significant the ICP provides good adaptability. Also, we observe that the hashing function used in the hash routing scheme must have certain features such as quick calculation of the hash value and uniform distribution of the Web pages (among cache servers).","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124707214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A general theory of constrained max-min rate allocation for multicast networks 组播网络约束最大最小速率分配的一般理论
J. Ros, W. Tsai
{"title":"A general theory of constrained max-min rate allocation for multicast networks","authors":"J. Ros, W. Tsai","doi":"10.1109/ICON.2000.875809","DOIUrl":"https://doi.org/10.1109/ICON.2000.875809","url":null,"abstract":"This paper presents a general theory of network max-min rate assignment as a lexicographic optimization. The model includes multicast and lower bound constraints. The model for multicast allows the sender to send at the maximum rate allowed by the network and the receivers. Equivalent optimality conditions, especially those which can be coded into practical algorithms, are derived. A reference parallel algorithm is also derived. The theoretical results clearly show the important role of the advertised rates in automatable optimality conditions. The theory also shows that, once the single-link problem is solved, the multi-link (network) problem can be simply solved by recursively applying the algorithm for single-link problem.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117067367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Effective fairness queuing algorithms 有效的公平性排队算法
Wang Chonggang, L. Keping, G. Xiang-yang, Cheng Shiduan
{"title":"Effective fairness queuing algorithms","authors":"Wang Chonggang, L. Keping, G. Xiang-yang, Cheng Shiduan","doi":"10.1109/ICON.2000.875804","DOIUrl":"https://doi.org/10.1109/ICON.2000.875804","url":null,"abstract":"In this paper we present two effective fair queuing algorithms (EFQs), which achieves fairness properties and delay properties similar to WFQ (which is currently the better scheduling algorithm among others), and uses a system potential function of O(l) complexity. In EFQs, computation of system potential function does not require any division or multiplication operations such as in minimum delay-self clocked fair queuing (MD-SCFQ). Compared to MD-SCFQ, EFQs have lower complexity and can be easily implemented on chips. We verify the effectiveness of the proposed EFQs through theoretical analysis and give some simulation results.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信