Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium最新文献

筛选
英文 中文
Scalable video delivery to unicast handheld-based clients 可扩展的视频传输到单播手持客户端
Raymond K. Y. Chow, C. Tham
{"title":"Scalable video delivery to unicast handheld-based clients","authors":"Raymond K. Y. Chow, C. Tham","doi":"10.1109/ICON.2000.875774","DOIUrl":"https://doi.org/10.1109/ICON.2000.875774","url":null,"abstract":"This paper discusses the proxy gateway and unicast client of a scalable video delivery system. The aim is to deliver video to heterogeneous clients using only a single video stream. This is possible using a layered wavelet-based codec that allows a video stream to be encoded and divided, and is then distributed using several multicast channels. A layered multicast method of delivery allows each client to control the amount of video information it receives, and hence the video quality, without the server having to transcode or modify the video stream. However, because there are devices that cannot receive multicast data, e.g., handheld devices or PDAs, a proxy gateway was developed to receive the multicast stream and retransmit them in a unicast manner The proxy gateway, designed primarily to support the low-powered handheld devices, also performs buffering and other actions that may require amounts of memory that handheld devices do not have. This complete system is now in its final stage of development and the performance of the proxy gateway and unicast handheld-based client have been tested.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114487914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Learning-automata-based MAC protocols for photonic LANs 基于学习自动机的光子局域网MAC协议
G. Papadimitriou, A. Pomportsis
{"title":"Learning-automata-based MAC protocols for photonic LANs","authors":"G. Papadimitriou, A. Pomportsis","doi":"10.1109/ICON.2000.875834","DOIUrl":"https://doi.org/10.1109/ICON.2000.875834","url":null,"abstract":"A MAC protocol for WDM passive star networks, which is capable of operating efficiently under bursty and correlated traffic, is introduced. According to the proposed protocol, the stations which grant permission to transmit at each time slot, are selected by means of learning automata. The choice probabilities of the selected stations are updated by taking into account the network feedback information.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124319542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A multi-constrained distributed QoS routing algorithm 一种多约束分布式QoS路由算法
Jun Song, H. Pung, L. Jacob
{"title":"A multi-constrained distributed QoS routing algorithm","authors":"Jun Song, H. Pung, L. Jacob","doi":"10.1109/ICON.2000.875785","DOIUrl":"https://doi.org/10.1109/ICON.2000.875785","url":null,"abstract":"Multi-criteria QoS routing has been regarded by researchers as a vital mechanism to support multimedia communications. Unfortunately, finding a qualified path meeting the multiple criteria is indeed a very difficult problem to solve. Multi-path-constrained routing problems are considered to be NP complete, and most existing QoS routing algorithms are based on maintaining global network state at every node. This paper proposes a multi-constrained flooding-based QoS routing with minimum computation and implementation complexity which relies on local link-state information only. It takes the least delay to establish a QoS connection which meets all QoS requirements and addresses the \"over-reservation\" problem of the flooding-based QoS routing in an elegant and efficient manner. We study the performance of the proposed algorithm, in terms of blocking probability, routing overhead, and connection set-up time, through simulation.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A novel priority weight-based explicit rate allocation scheme for ATM ABR services 一种新的基于优先级权重的ATM ABR业务显式速率分配方案
D. Xu, Y. Ang
{"title":"A novel priority weight-based explicit rate allocation scheme for ATM ABR services","authors":"D. Xu, Y. Ang","doi":"10.1109/ICON.2000.875840","DOIUrl":"https://doi.org/10.1109/ICON.2000.875840","url":null,"abstract":"A priority weight-based rate allocation scheme is proposed for ATM ABR services. Compared with existing ATM weight-based rate allocation algorithms, the proposed scheme is able to assure quality of service (QoS) guarantee based on its cell loss ratio (CLR) specification and actual cell rate of the application. The priority weight (PW) factor allows prioritization of application services for efficient flow control using minimum control variables and only less than 6% RM cell overheads.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Document caching policies on high-speed distributed networks for personalized multimedia services 面向个性化多媒体业务的高速分布式网络文档缓存策略
B. Veeravalli
{"title":"Document caching policies on high-speed distributed networks for personalized multimedia services","authors":"B. Veeravalli","doi":"10.1109/ICON.2000.875792","DOIUrl":"https://doi.org/10.1109/ICON.2000.875792","url":null,"abstract":"Following the previously introduced multimedia information caching paradigm in the literature, we present a polynomial time optimal caching strategy that minimizes the total monetary cost of all the service requests by the users requesting a multimedia document to view in a high-speed metropolitan area broadband network (MAN). We consider a scenario in which a large pool of customers from one or more number of remote sites on this network demand a multimedia program situated on a site for viewing at different time instants. This process of distribution of the requested program involves communication costs and caching costs of the program before it is delivered to the users at their desired viewing times. We configure the MANs as a fully-connected topology and show that a single copy of the requested document is sufficient to serve all the user requests in an optimal manner, for the case of high speed networks. Using this strategy, the personal service agents (PSAs) will decide when, where, and for how long the requested programs must be cached to obtain an optimal solution.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129112368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance of TCP over lossy upstream and downstream links with link-level retransmissions TCP在带有链路级重传的有损上行和下行链路上的性能
F. Anjum, R. Jain
{"title":"Performance of TCP over lossy upstream and downstream links with link-level retransmissions","authors":"F. Anjum, R. Jain","doi":"10.1109/ICON.2000.875760","DOIUrl":"https://doi.org/10.1109/ICON.2000.875760","url":null,"abstract":"We study the efficacy of using link-layer retransmissions to improve the TCP performance over lossy wireless links. The scenario we consider is where TCP packets traverse a wired network to a base station, and thence over a single wireless hop to a stationary receiver. Unlike many previous studies, which rely on simulation, we develop an analytical model for calculating TCP throughput; unlike all previous analytical studies, we do not ignore the possibility of acknowledgement packets (ACKs) being lost on the reverse link from the wireless receiver to the base station. The analytical model captures the performance of four common TCP algorithms: OldTahoe, Tahoe, NewReno and Sack. We find that, for the scenarios studied, a moderate number of link-level retransmissions can significantly improve the throughput of TCP and its resilience to packet losses on the forward and reverse links; increasing the number of retransmissions further has relatively little benefit. We also show that ACK losses cannot be ignored unless the number of retransmissions permitted is high or errors on the reverse link are infrequent. Of the TCP algorithms studied, we find that Sack has the best performance, closely followed by NewReno; the performance of OldTahoe is very poor. We end with suggestions for further work.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114765481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A reservation-based multicast scheduling algorithm with a reservation window for single-hop WDM networks 一种基于预留窗口的单跳WDM网络多播调度算法
Hwa-Chun Lin, Pei-Shin Liu
{"title":"A reservation-based multicast scheduling algorithm with a reservation window for single-hop WDM networks","authors":"Hwa-Chun Lin, Pei-Shin Liu","doi":"10.1109/ICON.2000.875844","DOIUrl":"https://doi.org/10.1109/ICON.2000.875844","url":null,"abstract":"This paper proposes a new reservation-based multicast scheduling algorithm which tries to make use of every data slot on all data channels such that the performance of the system is improved.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131510477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Flexible IP encapsulation for IP over ATM with ATM shortcuts 灵活的IP封装IP通过ATM与ATM快捷方式
Shengming Jiang, Q. Ding, M. Jin
{"title":"Flexible IP encapsulation for IP over ATM with ATM shortcuts","authors":"Shengming Jiang, Q. Ding, M. Jin","doi":"10.1109/ICON.2000.875795","DOIUrl":"https://doi.org/10.1109/ICON.2000.875795","url":null,"abstract":"One problem for IP over ATM is the bandwidth inefficiency caused by multiple encapsulations and the ATM cell padding, especially for short and moderate data. An ATM shortcut, an ATM virtual circuit connection established for an IP flow, can allow IP packets to be routed directly by the underlaid ATM network. In this paper, we first discuss how to adopt this approach to remove the IP encapsulation for IP packets belonging to an IP flow having an ATM shortcut, then show, through simple analysis, that this effort can improve the bandwidth efficiency especially for short and moderate data when it is used jointly with the AAL2 multiplexing.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126471649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security policy system: status and perspective 安全策略系统:现状与展望
M. Baltatu, A. Lioy, D. Mazzocchi
{"title":"Security policy system: status and perspective","authors":"M. Baltatu, A. Lioy, D. Mazzocchi","doi":"10.1109/ICON.2000.875802","DOIUrl":"https://doi.org/10.1109/ICON.2000.875802","url":null,"abstract":"With the definition of the security policy system, IPsec has joined the area of policy-based networking. This paper discusses the general architectural and functional requirements for systems in charge of security policy provisioning, and presents a critical evaluation of SPS. Some extensions are also suggested to increase SPS functionality in the network access control field.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134067052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The case for a hybrid passive/active network monitoring scheme in the wireless Internet 无线互联网中混合被动/主动网络监控方案的案例
B. Landfeldt, P. Sookavatana, A. Seneviratne
{"title":"The case for a hybrid passive/active network monitoring scheme in the wireless Internet","authors":"B. Landfeldt, P. Sookavatana, A. Seneviratne","doi":"10.1109/ICON.2000.875781","DOIUrl":"https://doi.org/10.1109/ICON.2000.875781","url":null,"abstract":"This paper discusses monitoring within wired and wireless networks and the type of monitoring information needed to support different applications. We suggest a hybrid active/passive monitoring approach with a dynamic time window mechanism and interchangeable filters to extract requested information. The paper also shows our initial experimental results and presents our conclusions.","PeriodicalId":191244,"journal":{"name":"Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130120673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信