Marcelo M. Carvalho, C. Margi, K. Obraczka, J. Garcia-Luna-Aceves
{"title":"Modeling energy consumption in single-hop IEEE 802.11 ad hoc networks","authors":"Marcelo M. Carvalho, C. Margi, K. Obraczka, J. Garcia-Luna-Aceves","doi":"10.1109/ICCCN.2004.1401671","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401671","url":null,"abstract":"This paper presents an analytical model to predict energy consumption in saturated IEEE 802.11 single-hop ad hoc networks under ideal channel conditions. The model we introduce takes into account the different operational modes of the IEEE 802.11 DCF MAC, and is validated against packet-level simulations. In contrast to previous works that attempted to characterize the energy consumption of IEEE 802.11 cards in isolated, contention-free channels (i.e., single sender/receiver pair), this paper investigates the extreme opposite case, i.e., when nodes need to contend for channel access under saturation conditions. In such scenarios, our main findings include: (1) contrary to what most previous results indicate, the radio's transmit mode has marginal impact on overall energy consumption, while other modes (receive, idle, etc.) are responsible for most of the energy consumed; (2) the energy cost to transmit useful data increases almost linearly with the network size; and (3) transmitting large payloads is more energy efficient under saturation conditions","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High-performance MAC for high-capacity wireless LANs","authors":"Yuan Yuan, Daqing Gu, W. Arbaugh, Jinyun Zhang","doi":"10.1109/ICCCN.2004.1401615","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401615","url":null,"abstract":"The next-generation wireless technologies, e.g., 802.11n and 802.15.3a, offer a physical-layer speed at least an-order-of-magnitude higher than the current standards. However, direct application of current MACs leads to high protocol overhead and significant throughput degradation. In this paper, we propose ADCA, a high-performance MAC that works with high-capacity physical layer. ADCA exploits two ideas of adaptive batch transmission and opportunistic selection of high-rate hosts to simultaneously reduce the overhead and improve the aggregate throughput. It opportunistically favors high-rate hosts by providing higher access probability and more access time, while ensuring each low-rate host certain minimum amount of channel access time. Simulations show that the ADCA design increases the throughput by 112% and reduces the average delay by 55% compared with the legacy DCF. It delivers more than 100 Mbps MAC-layer throughput as compared with 35 Mbps offered by the legacy MAC","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123611530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A genetic-algorithm-based neighbor-selection strategy for hybrid peer-to-peer networks","authors":"Simon G. M. Koo, C.S.G. Lee, Karthik N. Kannan","doi":"10.1109/ICCCN.2004.1401710","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401710","url":null,"abstract":"BitTorrent is a popular, open-source, hybrid peer-to-peer content distribution system that is conducive for distribution of large-volume contents. In this paper, we propose a genetic-algorithm-based neighbor-selection strategy for hybrid peer-to-peer networks, which enhances the decision process performed at the tracker for transfer coordination. We also investigate how the strategy affects system throughput and distribution efficiency as well as peer contributions. We show through computer simulations that by increasing content availability to the clients from their immediate neighbors, it can significantly improve the system performance without trading off users' satisfaction. The proposed strategy can significantly improve the efficiency of distribution, especially for low-connectivity peers, and it is suitable to deploy for online decisions","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127499463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AUM: auto-update micromobility for IPv6 networks","authors":"Aurbind Sharma, A. Ananda","doi":"10.1109/ICCCN.2004.1401734","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401734","url":null,"abstract":"Fast and seamless localized mobility management is one of the key challenges for future \"all IP\" based communication networks. Although several proposals for micromobility management have been made in the recent past, almost all of them propose a proxy based solution for location management. In this work, we present a novel approach for providing micromobility in IPv6 networks called auto-update micromobility (AUM). AUM exploits the IPv6 addressing structure to simplify location management and also provides full support for seamless, fast handoff","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130099631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent extensible routing for overlay networks with embedded constraint resource planning shell: a case study with deadline based packet forwarding","authors":"J. Khan, Nouman Bantan","doi":"10.1109/ICCCN.2004.1401597","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401597","url":null,"abstract":"This paper presents a fast near linear run-time system for customizable criteria based packet forwarding and route lookup. It presents the case for deadline line based packet forwarding. This system has been designed after the constraint resource planning (CRP) methodology for algorithm designs. The resulting near-optimum algorithm operates within an extensible CRP shell and uses two pluggable scheduling and forwarding heuristics to produce near-optimal performance. In this paper, we present the shell architecture, the algorithm, and the simulation results of this system for dead-line based packet forwarding","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"15 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132462143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An empirical evaluation of landmark placement on Internet coordinate schemes","authors":"Sridhar Srinivasan, E. Zegura","doi":"10.1109/ICCCN.2004.1401661","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401661","url":null,"abstract":"Many applications can benefit from knowledge of latency between hosts. Recently, there have been proposals such as global network positioning (GNP) (T. S. E. Ng et al., 2002) and Internet coordinate system (ICS) (H. Lim et al., 2003) that attempt to provide this for hosts on the Internet. The schemes work by using a small set of nodes called \"landmarks\" to compute the coordinates of other hosts. In this paper, we investigate the effect of placement of landmarks on the performance of these proposals. We show that with random placement, the estimation error of these schemes varies widely. We propose heuristics for placing landmarks that show good performance. We also investigate the behaviour of these schemes with measurement errors and show that GNP is less affected by measurement errors than ICS","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differentiated quality of service: slotted ALOHA","authors":"Douglas Dillon","doi":"10.1109/ICCCN.2004.1401664","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401664","url":null,"abstract":"This paper shows how the diversity slotted ALOHA multiple access scheme can very simply be extended to offer a premium quality of service to a subset of users. Diversity slotted ALOHA is a generalization of the classic slotted ALOHA in which a user transmits multiple copies of the same message. Premium users obtain a better quality of service by utilizing higher diversity, that is, by transmitting more copies of their messages than basic users","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122194017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TKGS: verifiable threshold-based key generation scheme in open wireless ad hoc networks","authors":"Mohammed A. Moharrum, R. Mukkamala, M. Eltoweissy","doi":"10.1109/ICCCN.2004.1401580","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401580","url":null,"abstract":"Secure group-based communication services are gaining momentum in wireless ad hoc networks (WAHNs). The efficiency and scalability of these services make them suitable for supporting the inherently collaborative computing and communications activities among peer WAHN nodes as well as the growing number of group-based WAHN applications. Key management, which is comprised of dynamic key generation, assignment, and distribution, is at the heart of secure group communications. This work proposes TKGS; an efficient threshold-based key generation scheme for open WAHNs based on collaborative reconstruction of key-generation keys. To mitigate node mal-behavior, a verifiable secret sharing technique is employed, where an (authenticated) dealer node is selected to collect a set number of valid shares and generate new administrative keys. While most existing key management schemes assume reliable and trusted nodes, TKGS provides a distributed solution that is resilient to node failure and mal-behavior. A major advantage of TKGS is its small overhead; collaborative key construction is done in less than two rounds with a very high probability of success.","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"15 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133575169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CWT: an efficient queue urgency metric with application to high-speed packet switching","authors":"M. Kahane, U. Barzilai, I. Elhanany","doi":"10.1109/ICCCN.2004.1401732","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401732","url":null,"abstract":"Determining queue urgency (or weight) is a fundamental challenge, particularly in the context of high-speed packet switching. Weighting schemes have significant impact on the decisions made by arbitration and/or scheduling mechanism, thus directly shaping the overall performance of the system. Various weight functions, including iterative longest-queue-first (iLQF) and iterative oldest-cell-first (iOCF) have been presented in the literature. However, existing schemes suffer from limited performance in the presence of non-ideal traffic patterns. In this paper, we introduce the cumulative waiting-time (CWT) queue-weighting scheme, which is a pragmatic mechanism for dynamically determining the queue weight based on its aggregated cells waiting time","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126979844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting autonomous system information in structured peer-to-peer networks","authors":"Ji Li, K. Sollins","doi":"10.1109/ICCCN.2004.1401686","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401686","url":null,"abstract":"With the rise of peer-to-peer networks, two problems have become prominent: (1) significant network traffic among peers, to probe the latency among those peers to improve lookup performance; (2) the need for increased information flow across protocol layer boundaries, to allow for cross-layer adaptations. The particular work here focuses on improvements in structured peer-to-peer networks based on autonomous system information. We find that by using autonomous system information effectively we can achieve lookup performance approaching that based on proximity neighbor selection, but with much less network traffic. We also demonstrate improvements in replication in structured peer-to-peer networks using AS topology and scoping information. Finally, we review this approach in the context of network architecture","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122693998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}