Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks最新文献

筛选
英文 中文
Evaluation of anonymity providing techniques using queuing theory 评估匿名提供技术使用排队论
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990801
Dogan Kesdogan
{"title":"Evaluation of anonymity providing techniques using queuing theory","authors":"Dogan Kesdogan","doi":"10.1109/LCN.2001.990801","DOIUrl":"https://doi.org/10.1109/LCN.2001.990801","url":null,"abstract":"In our work we use queuing theory both for security (ie, anonymity) and performance analysis. A well-known anonymity technique, the MIX method, which is the basis of most of today's deployments, is the object of our investigation. We show shortcomings and problems in the MIX method and suggest possible workarounds. Our investigation reveals the level of security of MIX based systems and their performance characteristics on the Internet.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129586412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A constant size rekeying message framework for secure multicasting 用于安全组播的恒定大小的密钥更新消息框架
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990813
Chih-Kuang Tseng, Kuen-Pin Wu, J. Lin, Chun-yen Chou, F. Lai
{"title":"A constant size rekeying message framework for secure multicasting","authors":"Chih-Kuang Tseng, Kuen-Pin Wu, J. Lin, Chun-yen Chou, F. Lai","doi":"10.1109/LCN.2001.990813","DOIUrl":"https://doi.org/10.1109/LCN.2001.990813","url":null,"abstract":"We propose a new framework for key management to construct a secure multicasting environment. When rekeying, only one message needs to be generated, and the message size is a constant. Especially when the group size is large, our framework largely reduces the traffic in the network. Two solutions are given to carry out this framework, which are closed curve solution (CCS) and perpendicular space solution (PSS), respectively. One is based on a geometric approach and the other on a linear algebraic approach. Our framework is also compatible to other group communication protocols.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130498703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Congestion handling in dynamic Differentiated Services networks 动态差异化服务网络中的拥塞处理
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990782
Markus Albrecht, M. Köster, P. Martini
{"title":"Congestion handling in dynamic Differentiated Services networks","authors":"Markus Albrecht, M. Köster, P. Martini","doi":"10.1109/LCN.2001.990782","DOIUrl":"https://doi.org/10.1109/LCN.2001.990782","url":null,"abstract":"Differentiated Services is a very promising approach to achieve quality of service in the Internet. However, setting up static service level agreements (SLA) between different Internet service provider domains lacks flexibility and may reduce quality of service as resource reservations cannot be adapted to the actual traffic. With the introduction of bandwidth brokers, a significant step towards a completely dynamic Differentiated Services environment has been made. Bandwidth brokers negotiate and automatically set up SLA according to network load and provider policies. Nevertheless, this automatic set-up may fail if there are bottlenecks in the network caused by physical limitations or policy issues and may lead to congestion. In this paper, we propose a scalable mechanism to handle these congestion situations, that uses four phases each solving a different level of congestion. Our mechanism does not need any destination information thus making it applicable for the majority of Internet applications.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132850363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data transport on the networked surface 网络面上的数据传输
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990796
Frank Hoffmann, James Scott, M. Addlesee, G. Mapp, A. Hopper
{"title":"Data transport on the networked surface","authors":"Frank Hoffmann, James Scott, M. Addlesee, G. Mapp, A. Hopper","doi":"10.1109/LCN.2001.990796","DOIUrl":"https://doi.org/10.1109/LCN.2001.990796","url":null,"abstract":"Networked surfaces are surfaces such as desks which provide network connectivity to specially augmented devices, for example handheld computers. When the devices are physically placed on top of the surface, they can connect to different kinds of services-mainly, but not exclusively to send and receive data. This paper discusses challenges in implementing networked surfaces, paying particular attention to data flow issues, focusing on how the various software and hardware entities comprising the surface interact to transport data to and from objects.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A capacity and utilization study of mobile ad hoc networks 移动自组织网络的容量和利用研究
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990838
Nishant Gupta, Samir R Das
{"title":"A capacity and utilization study of mobile ad hoc networks","authors":"Nishant Gupta, Samir R Das","doi":"10.1109/LCN.2001.990838","DOIUrl":"https://doi.org/10.1109/LCN.2001.990838","url":null,"abstract":"We develop an empirical technique to determine the capacity of a mobile ad hoc network. We assume that the network runs on-demand routing and carrier sense-based medium access protocols. The technique, however, is general and should apply to other types of protocols. We develop a tool that determines the network capacity given session-level traffic and node mobility traces. We compare the network capacity so determined with the actual network utilization from output statistics generated by a comprehensive simulator. It is observed that network capacity increases with node mobility; but the routing and medium access protocols fail to take advantage of the increased capacity. Even with high loads, a significant portion of the network capacity is not utilized, while the routing performance remains poor. This study indicates that there is a significant scope for designing aggressive routing protocols that utilize the network capacity better to improve routing performance.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"56 37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128251003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Non-intrusive estimation of Web server delays 非侵入式的Web服务器延迟估计
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990790
James Hall, I. Pratt, I. Leslie
{"title":"Non-intrusive estimation of Web server delays","authors":"James Hall, I. Pratt, I. Leslie","doi":"10.1109/LCN.2001.990790","DOIUrl":"https://doi.org/10.1109/LCN.2001.990790","url":null,"abstract":"We introduce a novel passive network monitoring architecture which enables us to capture and integrate data from different levels of the protocol stack using a probe which can be placed at any arbitrary point in the network. We subject the data gathered to off-line analysis and show how, by modelling the dynamics of the protocols observed, we are able to extract information which would not be available using existing means. We show how the technique can be used to passively measure Web server response latency. Experiments are described which use artificially generated loads to validate the techniques used, and results obtained from the observation of real traffic are presented.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123116571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Distributed environment for Web-based network management 用于基于web的网络管理的分布式环境
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990766
Flávio Spolidoro, N. Rodriguez
{"title":"Distributed environment for Web-based network management","authors":"Flávio Spolidoro, N. Rodriguez","doi":"10.1109/LCN.2001.990766","DOIUrl":"https://doi.org/10.1109/LCN.2001.990766","url":null,"abstract":"The use of scalable management tools is becoming more and more important for integrated management of different network platforms. This work explores the resources of the interpreted language Lua to create a flexible environment for Web-based distributed network management. This environment includes services for monitoring and asynchronous event handling, both available through CORBA interfaces. The dynamic characteristics of our environment allow the administrator to extend or modify functionality without stopping the system, and also to redefine dynamically the group of servers supporting the network management application.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Signaling protocols for lightpath provisioning 用于光路配置的信令协议
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990772
S. Seetharaman, A. Durresi, R. Jain
{"title":"Signaling protocols for lightpath provisioning","authors":"S. Seetharaman, A. Durresi, R. Jain","doi":"10.1109/LCN.2001.990772","DOIUrl":"https://doi.org/10.1109/LCN.2001.990772","url":null,"abstract":"Challenges presented by the exponential growth of the Internet have resulted in the intense demand for broadband services. Providing bandwidth and connectivity on demand has risen to be an important goal for service providers. To realize this, signaling in the optical network seems to be a critical component. Provisioning involves establishing a circuit from one client end system to another, through the optical backbone. With this general notion, this paper discusses in brief the role of signaling in all-optical networks, which employ DWDM for lower layer transport. The architectural choices pertaining to lightpath services are outlined. Signaling procedures for ensuring dynamic end-to-end lightpath setup have also been presented. Path provisioning comprises a string of operations like service and neighbor discovery, route computation, signaling requests, and path setup. This paper tries to summarize the various strategies, designed for each step, for use in the all-optical networks.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115325300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure mobile IP communication 安全移动IP通信
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990839
T. Braun, Marc Danzeisen
{"title":"Secure mobile IP communication","authors":"T. Braun, Marc Danzeisen","doi":"10.1109/LCN.2001.990839","DOIUrl":"https://doi.org/10.1109/LCN.2001.990839","url":null,"abstract":"This paper describes a solution called secure mobile IP (SecMIP) to provide mobile IP users secure access to their company's firewall protected virtual private network. The solution requires neither the introduction of new protocols nor the insertion or modification of network components. It only requires a slight adaptation of the end system communication software in order to adapt the mobile IP and IP security protocol implementations to each other. The paper describes the concept, prototype implementation, and initial performance measurement results.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114497270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A protocol independent Internet gateway for ad hoc wireless networks 用于自组织无线网络的独立于协议的Internet网关
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks Pub Date : 2001-11-14 DOI: 10.1109/LCN.2001.990774
A. Striegel, R. Ramanujan, J. Bonney
{"title":"A protocol independent Internet gateway for ad hoc wireless networks","authors":"A. Striegel, R. Ramanujan, J. Bonney","doi":"10.1109/LCN.2001.990774","DOIUrl":"https://doi.org/10.1109/LCN.2001.990774","url":null,"abstract":"An autonomous wireless local area network (AWLAN) is a collection of wireless computers that can be rapidly deployed as an ad hoc network without the aid of any established infrastructure or centralized administration. However, existing routing protocols for such networks neither scale nor function on the Internet. Therefore, a solution is required that provides a gateway between the ad hoc network and the Internet. In this paper, we propose a protocol-independent Internet gateway for ad hoc networks, the Cluster Gateway (CG). The proposed Cluster Gateway (CG) provides Internet access by acting as both a service access point and a Mobile IP foreign agent for ad hoc networks. In this paper, we describe the requirements for supporting the CG in any ad hoc routing protocol, the messages sent in order to provide CG support, and several optional enhancements for the CG. Finally, we briefly describe an implementation of the CG over an existing ad hoc routing protocol.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信