Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks最新文献

筛选
英文 中文
A distributed synchronization scheme for multimedia streams in mobile systems: proof and correctness 移动系统中多媒体流的分布式同步方案:证明与正确性
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990845
A. Boukerche, Sungbum Hong, Tom Jacob
{"title":"A distributed synchronization scheme for multimedia streams in mobile systems: proof and correctness","authors":"A. Boukerche, Sungbum Hong, Tom Jacob","doi":"10.1109/LCN.2001.990845","DOIUrl":"https://doi.org/10.1109/LCN.2001.990845","url":null,"abstract":"The rapid development in portable computing platforms, distributed multimedia systems and wireless communication technologies has led to a significant interest in mobile multimedia and wireless networking. Video entertainment and multimedia Internet access over wireless networks are examples of future wireless personal communication systems. These, however, incur challenging technological issues. The synchronization of the multimedia objects among mobile clients is one of the most important of these issues. The task of synchronization in wireless multimedia systems is to eliminate variations and delays incurred during the transmission of multiple-media streams and to maintain the temporal order among the various media streams. We propose an efficient distributed multimedia synchronization algorithm for wireless and mobile multimedia systems to ensure and facilitate mobile clients' access to multimedia objects. We discuss the algorithm and provide its formal proof and correctness.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Profile-based protocols in wireless mobile ad hoc networks 无线移动自组织网络中基于配置文件的协议
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990837
Kui Wu, J. Harms, E. Elmallah
{"title":"Profile-based protocols in wireless mobile ad hoc networks","authors":"Kui Wu, J. Harms, E. Elmallah","doi":"10.1109/LCN.2001.990837","DOIUrl":"https://doi.org/10.1109/LCN.2001.990837","url":null,"abstract":"Wireless Mobile Ad hoc NETworks (MANET) provide end-users with a flexible and cheap way to access and exchange information. While most research in MANETs is oriented to the general application environments, little work is done to utilize the specific characteristics of particular application scenarios, in which end-users' behavior is quite predictable or controllable. To deploy a MANET for a particular realistic system, the end-users' behavior, or profiles, can be used to simplify the implementation and enhance the network performance. We present a scheme to simplify routing strategy in MANET with the help of end-users' mobility profiles. We also study how the routing strategy improves the network performance in a realistic city transportation system.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Voice quality evaluation of IP-based voice stream multiplexing schemes 基于ip的语音流复用方案的语音质量评价
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990808
H. Yamada, N. Higuchi
{"title":"Voice quality evaluation of IP-based voice stream multiplexing schemes","authors":"H. Yamada, N. Higuchi","doi":"10.1109/LCN.2001.990808","DOIUrl":"https://doi.org/10.1109/LCN.2001.990808","url":null,"abstract":"IP-based networks for corporate and public network have been growing widely along with remarkable advances in the devices making up the IP-based network infrastructure. A great deal of attention is being focused on using VoIP (voice over IP) for a wide range of real-time streaming IP services and the VoIP traffic to be a promising traffic over IP-based networks. This paper describes schemes for efficiently transporting voice signals over IP-based networks in order to provide VoIP services. While taking the requirements for these schemes into account, this paper provides IP-based circuit-multiplexing techniques for carrying voices calls over IP-based networks and evaluates the voice quality of those schemes.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132483732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Voice and multi-fractal data in the Internet 互联网中的语音与多重分形数据
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990818
M. Fiedler, Patrik Carlsson, A. Nilsson
{"title":"Voice and multi-fractal data in the Internet","authors":"M. Fiedler, Patrik Carlsson, A. Nilsson","doi":"10.1109/LCN.2001.990818","DOIUrl":"https://doi.org/10.1109/LCN.2001.990818","url":null,"abstract":"In the Internet era, there is a need to understand how traditional public switched telephone network (PSTN) services and the new Internet services can coexist. The best-effort based IP network will have to maintain the level of service that customers from the PSTN world expect. This study contributes to the traffic engineering of such a system by presenting an analytical model for integrating voice over IP (VoIP) traffic with multi-fractal data traffic. This model is based on the stochastic fluid flow model. Effects on delay and loss performance of adding VoIP traffic to a data link as well as capacity requirements to maintain a certain quality of service are discussed.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128103843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementing bandwidth broker using COPS-PR in Java 在Java中使用COPS-PR实现带宽代理
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990783
S. Jha, Mahbub Hassan
{"title":"Implementing bandwidth broker using COPS-PR in Java","authors":"S. Jha, Mahbub Hassan","doi":"10.1109/LCN.2001.990783","DOIUrl":"https://doi.org/10.1109/LCN.2001.990783","url":null,"abstract":"We describe a Java implementation of a policy based bandwidth management system using the standard policy protocols and an interface to the Linux DiffServ implementation and demonstrate the capability of our implementation in supporting policy based dynamic resource allocations in enterprise networks.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133196283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Economics of buffer space provisioning in data communication systems 数据通信系统中缓冲空间供给的经济学
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990820
S. Varada
{"title":"Economics of buffer space provisioning in data communication systems","authors":"S. Varada","doi":"10.1109/LCN.2001.990820","DOIUrl":"https://doi.org/10.1109/LCN.2001.990820","url":null,"abstract":"In data communication systems, system designers often face the quintessential dilemma of how much buffer space for storing packet or cell data is to be provided to satisfy performance requirements cost effectively. The dilemma is created by the pitfalls associated with the over-provisioning and the under-provisioning of buffer space. Over-provisioning of buffer space triggers increased system cost in terms of board space and the price of the total solution. Under-provisioning, on the other hand, triggers instability of the system leading to performance degradation causing eventual system failure. The performance degradation manifests itself in packet or cell drops potentially triggering increased number of re-transmissions at the higher layers which is detrimental to the network goodput altogether. Thus, finding an optimal operating point in the buffer-space/line-rate plane is critical to the operation of the system while producing a cost-effective solution. The paper analyzes the theoretical and practical aspects involved in sizing buffer space in general terms.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131280816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A logic-based policy definition language for network management 一种用于网络管理的基于逻辑的策略定义语言
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990765
Yongxin Li, Ming Chen, Xuping Jiang, Lihua Song
{"title":"A logic-based policy definition language for network management","authors":"Yongxin Li, Ming Chen, Xuping Jiang, Lihua Song","doi":"10.1109/LCN.2001.990765","DOIUrl":"https://doi.org/10.1109/LCN.2001.990765","url":null,"abstract":"Policies are increasingly used to manage large-scale distributed systems. They usually adopt ECA rules that cannot express system state transitions, enable policy servers to perform flexible actions or cooperate efficiently. A logic-based policy definition language, LPDL, is proposed. We define LPDL's syntax, execution model and its semantic that provides a formal framework for policy-based network management. LPDL is proved to have Petri net's expressive power and Turing machine computing power. An administrator can use LPDL to describe a system's analysis and decision functions or encapsulate them into physical codes flexibly based on actual need. Finally, a cooperative network management framework (CNMF), its prototype and application are presented to show that LPDL can meet the requirements of network management's dynamic growth.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124816105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure distributed location management scheme for mobile hosts 移动主机安全分布式位置管理方案
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990799
R. Shankaran, V. Varadharajan, M. Hitchens
{"title":"Secure distributed location management scheme for mobile hosts","authors":"R. Shankaran, V. Varadharajan, M. Hitchens","doi":"10.1109/LCN.2001.990799","DOIUrl":"https://doi.org/10.1109/LCN.2001.990799","url":null,"abstract":"With the increasing growth in mobile computing devices and wireless networks, users are able to access information from anywhere and at anytime. In such situations, the issues of location management for mobile hosts are becoming increasingly significant. Different location management schemes such as Columbia University's mobile IP scheme and IETF Mobile IP have been proposed. In this paper, we propose a distributed location management scheme and discuss the advantages of the proposed scheme over the others. It seems that the proposed scheme is easy to implement and achieves optimal routing. The paper then considers the issues of multicasting in the proposed scheme. Finally, the paper describes security protocols for authentication and data privacy for the proposed architecture.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"3 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120821237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OR2: a path tuning algorithm for routing in ad hoc networks OR2:一种用于自组织网络路由的路径调整算法
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990836
M. Saito, H. Aida, Y. Tamura, Y. Tobe, H. Tokuda
{"title":"OR2: a path tuning algorithm for routing in ad hoc networks","authors":"M. Saito, H. Aida, Y. Tamura, Y. Tobe, H. Tokuda","doi":"10.1109/LCN.2001.990836","DOIUrl":"https://doi.org/10.1109/LCN.2001.990836","url":null,"abstract":"This paper presents \"OR2\", an adaptive path tuning scheme for mobile ad hoc networks. In OR2, the active path adapts dynamically to node mobility without any link failures based on the local link quality. Most conventional routing protocols accommodate the change of network topology only when the link fails. Unless the movement of intermediate nodes leads to any link failures, they cannot adapt to the network topology even if other routes with less hop count become available. In contrast to these protocols, OR2 reduces the hop count of an active route while data packets are sent without link disconnection. Specifically, by introducing the notion of proximity that indicates the nearness of two communicating nodes, OR2 skips the upstream node in a proximity area and continues to shorten an active route as possible. For delay sensitive TCP flows, reducing the number of hops and path delay significantly improves the performance of TCP. We have implemented OR2 as an extension to DSR on FreeBSD. The experimental results have shown that OR2 is effective in enhancing TCP throughput and reducing end-to-end delay for all relevant flows.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115569597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Voice communications over IEEE 802.11 wireless LANs interconnected using ATM links 通过使用ATM链路互联的IEEE 802.11无线局域网进行语音通信
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990843
E. Ziouva, T. Antonakopoulos
{"title":"Voice communications over IEEE 802.11 wireless LANs interconnected using ATM links","authors":"E. Ziouva, T. Antonakopoulos","doi":"10.1109/LCN.2001.990843","DOIUrl":"https://doi.org/10.1109/LCN.2001.990843","url":null,"abstract":"This paper presents a new polling scheme that can be used at the access point of an IEEE 802.11 wireless network as part of the point coordination function, in order to provide guaranteed QoS support of voice traffic. The so called cyclic shift polling scheme, along with the use of silence detection at the mobile terminals, increases the supported number of calls as a function of the overall rate of dropped voice packets and the point coordination function repetition interval. The advantages of utilizing this polling scheme are demonstrated by using the voice delay and voice jitter distributions. The delay and jitter distributions confirm that the voice packet delay introduced by the wireless network can be less than 25 ms even in the case of stations of different wireless networks when the IEEE 802.11 LANs are interconnected via an ATM infrastructure.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127240044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信