{"title":"Procedure for multicast tree maintenance based on member time duration","authors":"K. Mnif, M. Kadoch","doi":"10.1109/ICCCN.2004.1401736","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401736","url":null,"abstract":"In this paper we propose a new maintenance procedure for dynamic multicasting. With this procedure, we can guarantee that we add/delete a node to the existing tree without the need to rebuild the entire tree. Our approach finds the best route for a new member taking into consideration the time duration of each member in the group. Simulations results show that tree cost is very close to other algorithm that does not consider the dynamic of members in the group","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121638885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental evaluations of open-source Linux-based VPN solutions","authors":"Shashank Khanvilkar, A. Khokhar","doi":"10.1109/ICCCN.2004.1401619","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401619","url":null,"abstract":"Virtual private networks (VPNs) provide a low-cost alternative to leased lines and as such, are becoming increasingly popular among commercial and defense organizations for providing vital inter-office connectivity. Several commercial and open-source VPN products are now available that mainly differ in their capabilities to provide safe and secure services. In this paper, we study fifteen popular open-source Linux-based VPN solutions (OSLVs) and compare them with respect to network performances (bandwidth, delay and latency/jitter), supported features & functionalities (algorithm plug-ins and routing) and operational concerns (security and scalability). Experiments suggest that there is no single OSLV that excels in all the considered aspects and a combination of different solutions and/or tradeoff among desired characteristics may be required to deliver an optimal performance. Also network performance results suggest that OSLVs using UDP tunnels introduce 50% lower overhead, utilize 80% higher bandwidth and have 40-60% lower latency/jitter than those based on TCP","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126823367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective network monitoring","authors":"Y. Breitbart, F. Dragan, Hassan Gobjuka","doi":"10.1109/ICCCN.2004.1401682","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401682","url":null,"abstract":"Various network monitoring and performance evaluation schemes generate considerable amount of traffic, which affects network performance. In this paper we describe a method for minimizing network monitoring overhead based on shortest path tree (SPT) protocol. We describe two different variations of the problem: the A-problem and the E-problem, and show that there is a significant difference between them. We prove that finding optimal solutions is NP-hard for both variations, and propose a theoretically best possible heuristic for the A-problem and three different heuristics for the E-problem, one of them being also theoretically best possible. We show that one can compute in polynomial time an O(ln|V|)-approximate solution for each of these problems. Then, we analyze the performance of our heuristics on large graphs generated using Waxman and power-law models as well as on real ISP topology maps. Experiment results show more than 80% improvement when using our heuristics on real topologies over the naive approaches","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115969536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PAGER: a distributed algorithm for the dead-end problem of location-based routing in sensor networks","authors":"Leping Zou, Mi Lu, Zixiang Xiong","doi":"10.1109/ICCCN.2004.1401720","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401720","url":null,"abstract":"The dead-end problem is an importance issue of location-based routing in sensor networks, which occurs when a message falls into a local minimum using greedy forwarding. Current methods for this problem are insufficient either in eliminating traffic/path memorization or finding satisfied short paths. In this paper, we propose a novel algorithm, named partial-partition avoiding geographic routing (PAGER), to solve the problem. The basic idea of PAGER is to divide a sensor network graph into functional sub-graphs, and provide each sensor node with message forwarding directions based on these sub-graphs. That results in loop-free short paths without memorization of traffics/paths in sensor nodes. We implement our algorithm in a protocol and evaluate it in sensor networks with different parameters. Results show that PAGER generates considerably shorter paths, higher delivery ratio and lower energy consumption than the greedy perimeter stateless routing protocol. At the same time, PAGER achieves better performance in handling large-scale networks than the ad-hoc on-demand distance vector protocol","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126144545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fairness and delay guarantees of the new pipelined-sections buffer management method","authors":"C. S. Pencea, S. Y. Cheung","doi":"10.1109/ICCCN.2004.1401607","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401607","url":null,"abstract":"The buffer manager provides the first line of defense against abusive flows that transmit excessive number of packets. The pipelined-sections buffer management scheme described in our earlier work [S.Y. Cheung et al., April 2001] can discriminate between compliant and abusive flows. It can also provide a lossless guarantee to compliant leaky bucket rate constrained flows using very low buffer reservations. In this paper, we present an improved version of the pipelined sections buffer management method that has O(1) run time complexity and can also provide a fairness and delay guarantee to leaky bucket compliant flows","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131462251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating dual-failure restorability in mesh-restorable WDM optical networks","authors":"Michael T. Frederick, P. Datta, Arun Kumar Somani","doi":"10.1109/ICCCN.2004.1401655","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401655","url":null,"abstract":"Double link failure models, in which any two links in the network fail in an arbitrary order, are becoming critical in survivable optical network design. A significant finding is that designs offering complete dual-failure restorability require almost triple the amount of spare capacity. In this paper, networks are designed to achieve 100% restorability under single link failures, while maximizing coverage against any second link failure in the network. In the event of a single link failure, the restoration model attempts to dynamically find a second alternate link-disjoint end-to-end path to provide coverage against a sequential overlapping link failure. Sub-graph routing (M. T. Frederick et al., Feb. 2003) is extended to provide dual-failure restorability for a network provisioned to tolerate all single-link failures. This strategy is compared with shared-mesh protection. The results indicate that sub-graph routing can achieve overlapping second link failure restorability for 95-99% of connections. It is also observed that sub-graph routing can inherently provide complete dual-failure coverage for ~72-81% of the connections","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134536311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Group switching for DWDM optical networks","authors":"Yuanyuan Yang, S. Zheng, D. Verchère","doi":"10.1109/ICCCN.2004.1401626","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401626","url":null,"abstract":"A new class of interconnection networks called group connectors are introduced. A group connector G (N,n) is a switching network that consists of N inputs and N outputs such that (1) its N outputs are divided into N/n groups with n outputs in each group, and (2) it can provide any simultaneous one-to-one connections from the N inputs to the N outputs, possibly without the ability of distinguishing the permutation of the outputs within each group. Note that a group connector is able to distinguish among groups of outputs. Group connectors has applications in the switching matrices in dense wavelength-division multiplexing (DWDM) networks. Clearly, an N times N permutation network can be used as an N times N group connector. We show that a group connector can be built at a lower hardware cost than that of a permutation network of the same size","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131026371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leping Huang, Hongyuan Chen, T. Sivakumar, K. Sezaki
{"title":"Cross-layer optimized routing for Bluetooth personal area network","authors":"Leping Huang, Hongyuan Chen, T. Sivakumar, K. Sezaki","doi":"10.1109/ICCCN.2004.1401613","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401613","url":null,"abstract":"In this paper, we present some observations and analysis on Bluetooth PAN's performance degradation in multi hop network based on our experiments. We highlight a situation in which control packets can be received properly but not data packets, as well as its effects on scatternet performance. Based on our analysis, we propose a cross-layer optimized routing protocol for Bluetooth (CORB), which outperforms AODV based routing protocols. CORB is a QoS-extended AODV routing protocol that is optimized for Bluetooth MAC. It has two unique characteristics. First, it uses a new load metric (LM) in QoS routing protocol instead of the number of hops as in conventional best effort routing. LM reflects nodes' link bandwidth with respect to Bluetooth nodes' role in the scatternet. This helps the CORB to bypass heavily the loaded nodes, and find routes with larger bandwidth. Second, LM and some MAC layer parameters are dynamically adjusted in response to the changes in radio conditions. These two characteristics of CORB contribute to its improved stability, and rapid response to changing radio conditions","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131264858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of traffic and quality characteristics of rate-controlled wavelet and DCT video","authors":"Beshan Kulapala, P. Seeling, M. Reisslein","doi":"10.1109/ICCCN.2004.1401638","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401638","url":null,"abstract":"Wavelet-based encoding is now emerging as an efficient way to encode video for streaming over the Internet and for wireless applications. \"Wavelet-based video coding has been recently added to the JPEG-2000 video standards. As wavelet encoded video emerges as the next generation video encoding method, it is vital to compare the efficiency of wavelet encoded video against the widely used DCT-based MPEG encoded video. However, due to the lack of long wavelet encoded video streams, most research has so far been based on short video traces. This paper presents a comparison study on MPEG vs wavelet encoded video traces for one hour movie excerpts with rate control. These long video sequences allow for the evaluation of long range dependency and self similarity of the generated video traffic, which has not been studied before in the context of comparing DCT and wavelet-based encoding. We focus on the elementary as well as self-similar traffic characteristics of the encoded video. A hump behavior for the variability of frame sizes is observed for increasing video bit rates for both wavelet and MPEG encoded video. In addition, the quality characteristics of the encoded video is examined and related to the traffic. Our results indicate that the wavelet encoded video results in higher video quality than MPEG encoded video. For the frame size variability we find different characteristics depending on the aggregation level for a given data rate. The results also indicate that the variation of quality resulting from the wavelet encoding is lower than for the MPEG encoded video","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132261454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast restoration of signaling packet transportation in WDM networks under multiple failures","authors":"Kang Xi, S. Arakawa, M. Murata","doi":"10.1109/ICCCN.2004.1401574","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401574","url":null,"abstract":"With the increase of capacity and functionality in WDM networks, the control planes have become more and more important in state monitoring, resource management, and connection maintenance. The capability of fast failure restoration in a control plane not only enables effective network management but also helps efficient recovery of the transport plane. This work presents a signaling network that is able to achieve fast restoration under multiple failures. The mechanism employs distributed path restoration and introduces path probe using failure notification packets, which brings the benefits of low computation as well as short restoration time. Parallel processing architecture is developed and the complexity is analyzed. It is shown that the computation time can be easily controlled below 1 ms for a network with 256 nodes, which means the total restoration time for a wide area network is dominated by the propagation delay. Simulations show that the restored network provides good delay performance for the signaling traffic.","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130124134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}