{"title":"A distributed synchronization scheme for multimedia streams in mobile systems: proof and correctness","authors":"A. Boukerche, Sungbum Hong, Tom Jacob","doi":"10.1109/LCN.2001.990845","DOIUrl":"https://doi.org/10.1109/LCN.2001.990845","url":null,"abstract":"The rapid development in portable computing platforms, distributed multimedia systems and wireless communication technologies has led to a significant interest in mobile multimedia and wireless networking. Video entertainment and multimedia Internet access over wireless networks are examples of future wireless personal communication systems. These, however, incur challenging technological issues. The synchronization of the multimedia objects among mobile clients is one of the most important of these issues. The task of synchronization in wireless multimedia systems is to eliminate variations and delays incurred during the transmission of multiple-media streams and to maintain the temporal order among the various media streams. We propose an efficient distributed multimedia synchronization algorithm for wireless and mobile multimedia systems to ensure and facilitate mobile clients' access to multimedia objects. We discuss the algorithm and provide its formal proof and correctness.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Profile-based protocols in wireless mobile ad hoc networks","authors":"Kui Wu, J. Harms, E. Elmallah","doi":"10.1109/LCN.2001.990837","DOIUrl":"https://doi.org/10.1109/LCN.2001.990837","url":null,"abstract":"Wireless Mobile Ad hoc NETworks (MANET) provide end-users with a flexible and cheap way to access and exchange information. While most research in MANETs is oriented to the general application environments, little work is done to utilize the specific characteristics of particular application scenarios, in which end-users' behavior is quite predictable or controllable. To deploy a MANET for a particular realistic system, the end-users' behavior, or profiles, can be used to simplify the implementation and enhance the network performance. We present a scheme to simplify routing strategy in MANET with the help of end-users' mobility profiles. We also study how the routing strategy improves the network performance in a realistic city transportation system.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voice quality evaluation of IP-based voice stream multiplexing schemes","authors":"H. Yamada, N. Higuchi","doi":"10.1109/LCN.2001.990808","DOIUrl":"https://doi.org/10.1109/LCN.2001.990808","url":null,"abstract":"IP-based networks for corporate and public network have been growing widely along with remarkable advances in the devices making up the IP-based network infrastructure. A great deal of attention is being focused on using VoIP (voice over IP) for a wide range of real-time streaming IP services and the VoIP traffic to be a promising traffic over IP-based networks. This paper describes schemes for efficiently transporting voice signals over IP-based networks in order to provide VoIP services. While taking the requirements for these schemes into account, this paper provides IP-based circuit-multiplexing techniques for carrying voices calls over IP-based networks and evaluates the voice quality of those schemes.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132483732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voice and multi-fractal data in the Internet","authors":"M. Fiedler, Patrik Carlsson, A. Nilsson","doi":"10.1109/LCN.2001.990818","DOIUrl":"https://doi.org/10.1109/LCN.2001.990818","url":null,"abstract":"In the Internet era, there is a need to understand how traditional public switched telephone network (PSTN) services and the new Internet services can coexist. The best-effort based IP network will have to maintain the level of service that customers from the PSTN world expect. This study contributes to the traffic engineering of such a system by presenting an analytical model for integrating voice over IP (VoIP) traffic with multi-fractal data traffic. This model is based on the stochastic fluid flow model. Effects on delay and loss performance of adding VoIP traffic to a data link as well as capacity requirements to maintain a certain quality of service are discussed.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128103843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing bandwidth broker using COPS-PR in Java","authors":"S. Jha, Mahbub Hassan","doi":"10.1109/LCN.2001.990783","DOIUrl":"https://doi.org/10.1109/LCN.2001.990783","url":null,"abstract":"We describe a Java implementation of a policy based bandwidth management system using the standard policy protocols and an interface to the Linux DiffServ implementation and demonstrate the capability of our implementation in supporting policy based dynamic resource allocations in enterprise networks.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133196283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Economics of buffer space provisioning in data communication systems","authors":"S. Varada","doi":"10.1109/LCN.2001.990820","DOIUrl":"https://doi.org/10.1109/LCN.2001.990820","url":null,"abstract":"In data communication systems, system designers often face the quintessential dilemma of how much buffer space for storing packet or cell data is to be provided to satisfy performance requirements cost effectively. The dilemma is created by the pitfalls associated with the over-provisioning and the under-provisioning of buffer space. Over-provisioning of buffer space triggers increased system cost in terms of board space and the price of the total solution. Under-provisioning, on the other hand, triggers instability of the system leading to performance degradation causing eventual system failure. The performance degradation manifests itself in packet or cell drops potentially triggering increased number of re-transmissions at the higher layers which is detrimental to the network goodput altogether. Thus, finding an optimal operating point in the buffer-space/line-rate plane is critical to the operation of the system while producing a cost-effective solution. The paper analyzes the theoretical and practical aspects involved in sizing buffer space in general terms.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131280816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A logic-based policy definition language for network management","authors":"Yongxin Li, Ming Chen, Xuping Jiang, Lihua Song","doi":"10.1109/LCN.2001.990765","DOIUrl":"https://doi.org/10.1109/LCN.2001.990765","url":null,"abstract":"Policies are increasingly used to manage large-scale distributed systems. They usually adopt ECA rules that cannot express system state transitions, enable policy servers to perform flexible actions or cooperate efficiently. A logic-based policy definition language, LPDL, is proposed. We define LPDL's syntax, execution model and its semantic that provides a formal framework for policy-based network management. LPDL is proved to have Petri net's expressive power and Turing machine computing power. An administrator can use LPDL to describe a system's analysis and decision functions or encapsulate them into physical codes flexibly based on actual need. Finally, a cooperative network management framework (CNMF), its prototype and application are presented to show that LPDL can meet the requirements of network management's dynamic growth.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124816105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure distributed location management scheme for mobile hosts","authors":"R. Shankaran, V. Varadharajan, M. Hitchens","doi":"10.1109/LCN.2001.990799","DOIUrl":"https://doi.org/10.1109/LCN.2001.990799","url":null,"abstract":"With the increasing growth in mobile computing devices and wireless networks, users are able to access information from anywhere and at anytime. In such situations, the issues of location management for mobile hosts are becoming increasingly significant. Different location management schemes such as Columbia University's mobile IP scheme and IETF Mobile IP have been proposed. In this paper, we propose a distributed location management scheme and discuss the advantages of the proposed scheme over the others. It seems that the proposed scheme is easy to implement and achieves optimal routing. The paper then considers the issues of multicasting in the proposed scheme. Finally, the paper describes security protocols for authentication and data privacy for the proposed architecture.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"3 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120821237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OR2: a path tuning algorithm for routing in ad hoc networks","authors":"M. Saito, H. Aida, Y. Tamura, Y. Tobe, H. Tokuda","doi":"10.1109/LCN.2001.990836","DOIUrl":"https://doi.org/10.1109/LCN.2001.990836","url":null,"abstract":"This paper presents \"OR2\", an adaptive path tuning scheme for mobile ad hoc networks. In OR2, the active path adapts dynamically to node mobility without any link failures based on the local link quality. Most conventional routing protocols accommodate the change of network topology only when the link fails. Unless the movement of intermediate nodes leads to any link failures, they cannot adapt to the network topology even if other routes with less hop count become available. In contrast to these protocols, OR2 reduces the hop count of an active route while data packets are sent without link disconnection. Specifically, by introducing the notion of proximity that indicates the nearness of two communicating nodes, OR2 skips the upstream node in a proximity area and continues to shorten an active route as possible. For delay sensitive TCP flows, reducing the number of hops and path delay significantly improves the performance of TCP. We have implemented OR2 as an extension to DSR on FreeBSD. The experimental results have shown that OR2 is effective in enhancing TCP throughput and reducing end-to-end delay for all relevant flows.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115569597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voice communications over IEEE 802.11 wireless LANs interconnected using ATM links","authors":"E. Ziouva, T. Antonakopoulos","doi":"10.1109/LCN.2001.990843","DOIUrl":"https://doi.org/10.1109/LCN.2001.990843","url":null,"abstract":"This paper presents a new polling scheme that can be used at the access point of an IEEE 802.11 wireless network as part of the point coordination function, in order to provide guaranteed QoS support of voice traffic. The so called cyclic shift polling scheme, along with the use of silence detection at the mobile terminals, increases the supported number of calls as a function of the overall rate of dropped voice packets and the point coordination function repetition interval. The advantages of utilizing this polling scheme are demonstrated by using the voice delay and voice jitter distributions. The delay and jitter distributions confirm that the voice packet delay introduced by the wireless network can be less than 25 ms even in the case of stations of different wireless networks when the IEEE 802.11 LANs are interconnected via an ATM infrastructure.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127240044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}