{"title":"Dimensioning WiMAX Mesh Networks with Multiple Channels","authors":"Salim Nahle, N. Malouch, S. Fdida","doi":"10.1109/INFCOMW.2009.5072129","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072129","url":null,"abstract":"In this paper, and for the purpose of optimizing the performance of WiMAX mesh networks using multiple channels, we search the minimum number of channels that maximizes the throughput capacity. WiMAX operates in the licensed bands, so it is important to use only the sufficent number of the scarce wireless channels. Moreover, it helps to decide whether or not to use frequency spatial reuse (FSR) that incurs additional control information, which is relatively large as an accurate knowledge of the interference state at each SS must be accumulated at a central entity that sets the schedule (which is the BS in our case). Numerical simulations show that in most of the cases, with 3 or 4 channels, the maximum throughput capacity can be obtained for single interface WiMAX mesh networks, and no gains are obtained if more channels are used.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125576566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Networks: Naming vs. Tunnelling","authors":"Devan Rehunathan, S. Bhatti","doi":"10.1109/INFCOMW.2009.5072163","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072163","url":null,"abstract":"Using data of passenger numbers and train schedules from the London Underground metropolitan railway system, we compare a Tunnelling-based to a Naming-based approach for supporting mobile networks. We show that, in terms of packet overhead, a naming based approach may have similar performance overhead to a tunnelling approach, and so may offer a viable alternative, whilst also offering other benefits.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125895105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Pocket Switched Networks","authors":"Anna-Kaisa Pietilainen, C. Diot","doi":"10.1109/INFCOMW.2009.5072190","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072190","url":null,"abstract":"Pocket Switched Network (PSN) communications paradigm builds on opportunistic contacts between mobile devices and human mobility to disseminate content without relying on any infrastructure. We propose MobiClique, a mobile social software that builds and maintains an ad hoc social network overlay over a Pocket Switched Network and allows users to exchange messages between each other and groups of users sharing similar interests. We describe MobiClique implementation and initial experimental results.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assuring QoS in Wireless Mesh Networks with Misbehaving Users","authors":"S. Szott","doi":"10.1109/INFCOMW.2009.5072116","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072116","url":null,"abstract":"This paper deals with the problem of QoS provisioning in wireless mesh networks in the presence of misbehaving users. To mitigate the impact of such users, a misbehavior-aware QoS architecture is proposed. The results of simulation studies show the most beneficial forms of misbehavior in mesh networks. Finally, the best method for detecting a particular type of misbehavior (backoff cheating) is suggested.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125024041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Kamiyama, Tatsuya Mori, R. Kawahara, Shigeaki Harada, H. Hasegawa
{"title":"ISP-Operated CDN","authors":"N. Kamiyama, Tatsuya Mori, R. Kawahara, Shigeaki Harada, H. Hasegawa","doi":"10.1109/INFCOMW.2009.5072157","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072157","url":null,"abstract":"The transmission bandwidth consumed by delivering rich content, such as movie files, is enormous, so it is urgent for ISPs to design an efficient delivery system minimizing the amount of network resources consumed. To efficiently deliver web content, a content delivery networks (CDNs) have been widely used. CDN providers collocate a huge number of servers within multiple ISPs without being informed the detailed network information, i.e., network topologies, from ISPs. Minimizing the amount of network resources consumed is difficult because a CDN provider selects a server for each request based on only rough estimates of response time. To serve users rich content economically and efficiently, an ISP itself should optimally provide servers with huge storage capacities at a limited number of locations within its network. In this paper, we investigate the content deployment method, the content delivery process, and the server allocation method that are desirable for this ISP-operated CDN. Moreover, we evaluate the effectiveness of the ISP-operated CDN using network topologies of actual ISPs.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Unified Security Backplane for Trust and Reputation Systems in Decentralized Networks","authors":"F. Tegeler, Jun Lei, Xiaoming Fu","doi":"10.1109/INFCOMW.2009.5072105","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072105","url":null,"abstract":"Presented in this paper a preliminary proposal of a security framework for delivering security properties to Trust and Reputation management systems in decentralized networks. When TR metrics are used in this framework, nodes can be held responsible for their actions and identity spoofing is prevented. By protecting trust reply messages and/or the interaction with trust holding agents, false reporting or message alteration is not possible anymore. Therefore, the security backplane delivers a unified framework for TR metrics allowing easy secure deployment. We plan to evaluate our framework with different TR metrics using simulations with colluding malicious nodes. Furthermore, we will analyze in details how different views can impact the overall behavior of the network and the overhead imposed by our solution.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133367261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using NATO! for Partially Reliable Large Scale Multicast Streaming in Broadcast Wireless Networks","authors":"R. Cohen, Alexander Landau","doi":"10.1109/INFCOMW.2009.5072203","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072203","url":null,"abstract":"Streaming multicast is one of the most important Transport layer services in future broadcast wireless networks. This service enables the delivery of real-time voice and video applications to an almost unlimited number of mobile devices, by taking advantage of a base station's ability to transmit a single packet to all the nodes in its cell. While strict delivery assurance is not necessary and not possible for such applications, some level of assurance is provided using Transport layer FEC (Forward Error Correction) codes. In this paper we show how to improve the performance of large-scale partially reliable multicast streaming in broadcast wireless networks, using the NATO! scheme. NATO!, presented in another paper, is a generic real-time scheme that allows a node to estimate the size of any subset of nodes affected by the same event using a few messages received from this subset.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vincent Lucas, Jean-Jacques Pansiot, D. Grad, B. Hilt
{"title":"Fair Multicast Congestion Control (M2C)","authors":"Vincent Lucas, Jean-Jacques Pansiot, D. Grad, B. Hilt","doi":"10.1109/INFCOMW.2009.5072144","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072144","url":null,"abstract":"We propose a new TCP-friendly multicast congestion control for very large groups of receivers. This protocol named M2C is layered and receiver-driven. Like TCP, M2C is composed of a Congestion Avoidance and a Slow Start state. However, M2C can re-activate the Slow Start when the current rate is far below the fair one. This protocol is well designed for continuous and long lived data streams, such as multicast IPTV. We study M2C performances in terms of bandwidth-sharing fairness and loss rate. This evaluation shows that M2C is robust and TCP-friendly for most network situations. Besides, we also provide an analysis of the signaling generated. Finally, we compare M2C and WEBRC performances, showing significant improvements.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131955627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaohan Zhao, E. Lua, Yang Chen, Xiaoxiao Song, Beixing Deng, Xing Li
{"title":"Sniper: Social-Link Defense for Network Coordinate Systems","authors":"Xiaohan Zhao, E. Lua, Yang Chen, Xiaoxiao Song, Beixing Deng, Xing Li","doi":"10.1109/INFCOMW.2009.5072189","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072189","url":null,"abstract":"Recent work on securing the Network Coordinate (NC) service attempts to defend attacks based on nodes' past behavior and activities. They detect malicious nodes only after attacks occurred. In order to secure NC system before malicious nodes mount attacks, we propose a social-link defense system for NC service--Sniper. We are able to provide NC system with trusted neighbors (landmarks) using social-link filtering technique. Our preliminary results demonstrate that Sniper can protect NC system successfully before they are attacked by malicious nodes.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134418341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Traffic Routing of Optical Networks for Future Demands","authors":"K. Assis, K. Cruz","doi":"10.1109/INFCOMW.2009.5072137","DOIUrl":"https://doi.org/10.1109/INFCOMW.2009.5072137","url":null,"abstract":"We propose a linear formulation for the flow routing of packets in Virtual Topology Design (VTD) of optical networks. The formulation maximizes the established the future ability to accept additional traffic through optimization of the remaining idle capacity. The results suggest that t is feasible to preserve enough open capacity to avoid blocking of future traffic in networks with scarce resources.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132834638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}