Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)最新文献

筛选
英文 中文
IMSH: an iterative heuristic for SRLG diverse routing in WDM mesh networks WDM网状网络中SRLG不同路由的迭代启发式算法
A. Todimala, B. Ramamurthy
{"title":"IMSH: an iterative heuristic for SRLG diverse routing in WDM mesh networks","authors":"A. Todimala, B. Ramamurthy","doi":"10.1109/ICCCN.2004.1401627","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401627","url":null,"abstract":"Survivable routing of a connection involves computation of a pair of diverse routes such that at most one route fails when failures occur in the network topology. A subset of links in the network that share the risk of failure at the same time are said to belong to a shared risk link group (SRLG) [J. Strand et al., Feb 2001]. A network with shared risk link groups defined over its links is an SRLG network. A failure of an SRLG is equivalent to the failure of all the links in the SRLG. For a connection to be survivable in an SRLG network, its working and protection paths must be routed on SRLG diverse paths. SRLG diverse routing problem has been proved to be NP-complete in J.Q. Hu (2003). According to the quality of service requirement of a survivable connection request, dedicated protection or shared protection can be used to establish the connection request. With dedicated protection, the connection is established on both the SRLG diverse working and protection paths. The simplest heuristic for computing SRLG diverse path pair is the two-step approach, but it suffers from the trap topology problem. In the previous study by Pin-Han Ho, an iterative heuristic (ITSH) using the two-step approach was proposed to compute the least cost SRLG diverse path pair. Suurballe's algorithm computes a pair of least cost link-disjoint paths between a node pair. In this work, we present a modified Suurballe's heuristic for computing the SRLG diverse routes between a node pair. We then propose an iterative heuristic (IMSH) which uses the modified Suurballe's heuristic for computing the least cost SRLG diverse routes. We also present an 1/2-cost-improvement optimality check criterion for dedicated protection","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124218203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Optical network design with optical constraints in multi-hop WDM mesh networks 多跳WDM网状网络中具有光约束的光网络设计
Kwangil Lee, M. Shayman
{"title":"Optical network design with optical constraints in multi-hop WDM mesh networks","authors":"Kwangil Lee, M. Shayman","doi":"10.1109/ICCCN.2004.1401694","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401694","url":null,"abstract":"In this paper we consider algorithms for the logical topology design and traffic grooming problem in WDM networks with router interface constraints as well as optical constraints. The optical constraints include restricted transmission range due to optical impairments as well as limits on the number of available wavelengths. We formulate this problem as an integer linear program which is NP-complete. We then introduce heuristic algorithms which use a graphical modeling tool called the virtual neighbor graph and add lightpaths sequentially. The best performing heuristic uses a so-called resource efficiency factor to determine the order in which paths are provisioned for the traffic demands. By giving priority to demands that can be routed over paths that make efficient use of network resources, it is able to achieve good performance both in terms of weighted hop count and network throughput. For finding optimal multi-hop paths sequentially, we introduce interface constraint shortest path problem and solve it using minimum weight perfect matching","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126402197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Network adaptive packet scheduling for streaming video over error-prone networks 网络自适应分组调度的流视频在易出错的网络
Jong-ok Kim, H. Tode, K. Murakami
{"title":"Network adaptive packet scheduling for streaming video over error-prone networks","authors":"Jong-ok Kim, H. Tode, K. Murakami","doi":"10.1109/ICCCN.2004.1401637","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401637","url":null,"abstract":"In packet networks including the Internet and commercial 3G wireless bearers, network conditions that a streaming application experiences are not known a priori and exhibit time-varying characteristics. For such environments, network-adaptive techniques are important to efficiently stream video. In this paper, we propose an adaptive packet scheduling algorithm for streaming video over error-prone networks. A MAP (maximum a posteriori) framework is incorporated for adapting to time-varying network loss rate. By MAP-based dynamic network estimation, the proposed scheduler adaptively performs video packet transmissions over time-varying networks. Also, packet transmission schedules are optimally determined in a distortion-optimized way. For low computational complexity, the proposed packet scheduling algorithm is based on a new and simple distortion measure which is referred to the EFS (expected frame-rate reduction). Simulation results for standard video sequence show that the proposed scheduling outperforms conventional ARQ-based schemes from a view point of frame loss rate and reconstructed video quality. In particular, the proposed scheduling algorithm shows significant improvement over highly lossy channel","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An accounting management system building on network processor 基于网络处理器的会计管理系统
Jiang Liu, Tao He, Xing Li
{"title":"An accounting management system building on network processor","authors":"Jiang Liu, Tao He, Xing Li","doi":"10.1109/ICCCN.2004.1401730","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401730","url":null,"abstract":"This work presents a high performance, software programmable and low cost accounting management system building on a network processor. In order to achieve this, the hicuts algorithm was also improved to adapt for packet classification in accounting management system. An optimization method was made in order to reduce the IP flow number to enhance the system by dropping the first packet with a SYN flag and recovering its size in the following processing.","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131754138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology based packet marking 基于拓扑的分组标记
Basheer Al-Duwairi, Thomas E. Daniels
{"title":"Topology based packet marking","authors":"Basheer Al-Duwairi, Thomas E. Daniels","doi":"10.1109/ICCCN.2004.1401609","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401609","url":null,"abstract":"Recently, several schemes have been proposed for IP traffic source identification for tracing attacks that employ source address spoofing such as denial of service (DoS) attacks. Most of these schemes are based on packet marking (i.e., augmenting IP packets with partial path information). A major challenge to packet marking schemes is the limited space available in the IP header for marking purposes. In this paper, we focus on this issue and propose a topology based encoding schemes supported by real Internet measurements. In particular, we propose an idealized deterministic edge append scheme in which we assume that the IP header can be modified to include the marking option field of fixed size. Also, we propose a deterministic pipelined packet marking scheme that is backward compatible with IPv4 (i.e., no IP header modification). The validity of both schemes depends directly on the statistical information that we extract from large data sets that represent Internet maps. Our studies show that it is possible to encode an entire path using 52 bits","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132039501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Multiobjective multicast routing algorithm for traffic engineering 交通工程中的多目标组播路由算法
J. Crichigno, B. Barán
{"title":"Multiobjective multicast routing algorithm for traffic engineering","authors":"J. Crichigno, B. Barán","doi":"10.1109/ICCCN.2004.1401652","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401652","url":null,"abstract":"This paper presents a new version of a multiobjective multicast routing algorithm (MMA) for traffic-engineering, based on the strength Pareto evolutionary algorithm (SPEA), which simultaneously optimizes the maximum link utilization, the cost of the tree, the maximum end-to-end delay and the average delay. In this way, a set of optimal solutions, known as Pareto set, is calculated in only one run, without a priori restrictions. Simulation results show that MMA is able to find Pareto optimal solutions. They also show that for dynamic multicast routing, where the traffic requests arrive one after another, MMA outperforms other known algorithms","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124985743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
A systematic approach for providing end-to-end probabilistic QoS guarantees 提供端到端概率QoS保证的系统方法
S. Ayyorgun, Wu-chun Feng
{"title":"A systematic approach for providing end-to-end probabilistic QoS guarantees","authors":"S. Ayyorgun, Wu-chun Feng","doi":"10.1109/ICCCN.2004.1401602","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401602","url":null,"abstract":"We propose a probabilistic characterization of network traffic. This characterization can handle traffic with heavy-tailed distributions in performance analysis. We show that queue size, output traffic, virtual delay, aggregate traffic, etc. at various points in a network can easily be characterized within the framework. This characterization is measurable and allows for a simple probabilistic method for regulating network traffic. All of these properties of the proposed characterization enable a systematic approach for providing end-to-end probabilistic QoS guarantees","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115423012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A mobility model for cost analysis in integrated cellular/WLANs 集成蜂窝/无线局域网成本分析的移动模型
N. Shenoy, Bruce Hartpence, R. Mantilla
{"title":"A mobility model for cost analysis in integrated cellular/WLANs","authors":"N. Shenoy, Bruce Hartpence, R. Mantilla","doi":"10.1109/ICCCN.2004.1401646","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401646","url":null,"abstract":"In this article, we propose a model that can be used to study the costs and benefits of integrating cellular and wireless LANs, from a vendor and a user perspective. We explain the model and the approach to calculate the costs for a simple handoff topology that supports a voice call across a cellular and a WLAN. The mobility model, which can be used to estimate the probability of a cellular user entering a WLAN while moving within the \"location area\" of the cellular network, is the main contribution of this work. The mobility model takes into account a normal user movement and a biased user movement based on a 2D random walk model. We show how this model could be used to study the costs and benefits to the vendor and the user, especially if a user were to be supported with call continuity across the two networks and the vendor had to bear the extra costs of handing over an active call. We have restricted our analysis to a scenario where the user with an active voice call moves from the cellular network to the WLAN. Graphs and discussions are provided to demonstrate the use of the model to study the integration benefits, from a vendor and a user perspective","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115448247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
CBRBrain: provide content based routing service over Internet backbone CBRBrain:在互联网主干上提供基于内容的路由服务
Wenzhan Song, Xiangyang Li
{"title":"CBRBrain: provide content based routing service over Internet backbone","authors":"Wenzhan Song, Xiangyang Li","doi":"10.1109/ICCCN.2004.1401598","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401598","url":null,"abstract":"Peer-to-peer (P2P) networking came from a family of technologies and techniques for organizing distributed applications that takes advantage of the resources available at the Internet edges. In this paper, we propose an innovative P2P system architecture, called CBRBrain, to implement the content based routing (CBR) service over the backbone routers instead of at the terminal hosts. Hence CBRBrain avoids some drawbacks in previous P2P systems and significantly improves the efficiency and security. Data locating process is easily implemented on CBRBrain by associating a hashed key with each data item and storing the (key, address) pair in routers. The cost for topology update is neglectful since the routers is almost static in the Internet and is not affected by the frequent joining and leaving of hosts at all. The traffic generated by CBRBrain system over the Internet is also expected to be significantly smaller as compared with the other P2P systems. The logical topology of CBRBrain backbone can be any self-routing structure to enable the content based routing service. In the paper, we recommend to construct the underlying logical topology based on the pseudo-balanced de Bruijn graph, since it has many nice properties such as bounded degrees, low diameters and fault tolerance. As an illustration, we describe the mechanism of P2P file sharing application under CBRBrain architecture. Our work is a first step in building an intelligent backbone of the next generation Internet and facilitates the emergence of various intelligent applications over the Internet besides P2P file sharing","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123482589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparison of TCP-friendly congestion control protocols tcp友好型拥塞控制协议的比较
Surekha Biyani, James J. Martin
{"title":"A comparison of TCP-friendly congestion control protocols","authors":"Surekha Biyani, James J. Martin","doi":"10.1109/ICCCN.2004.1401641","DOIUrl":"https://doi.org/10.1109/ICCCN.2004.1401641","url":null,"abstract":"Using the ns simulator, we perform a detailed study of the fairness and the smoothness properties of SimdNR, an enhanced version of SIMD. Our study includes TFRC and TCP congestion control protocols in both steady-state and highly dynamic network conditions through RED and DropTail routers. Our results show that SimdNR is fair to TCP through RED routers in steady-state scenario. But, SimdNR is not fair to TCP over drop tail routers. Also our results show that SimdNR demonstrates less smoothness than TFRC in steady-state scenario and superior smoothness than TFRC in dynamic network conditions","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128501401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信