{"title":"EDS: a new scalable service differentiation architecture for Internet","authors":"B. Gaidioz, P. Primet","doi":"10.1109/ISCC.2002.1021761","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021761","url":null,"abstract":"Today, flows crossing the Internet are not equally sensitive to loss or delay variations. For several years, a lot of research has been done to enhance the IP stack to solve the problem of the different needs of heterogeneous traffic. In the light of the frustrating experience of existing IP QoS approaches, we present a new differentiated service scheme called EDS : \"Equivalent Differentiated Services\". The EDS can be deployed incrementally and provides \"different but equal services\". This new scheme allows us to differentiate a number of N traffic classes on loss and delay without giving an absolute better service to anyone. This proposition represents a radical departure from traditional \"DiffServ\" architectures which rely on bounded domain concept and pricing models. In this paper we look at the goals of this \"soft\" quality of service architecture. We present the principles and implementation details of the EDS scheme. Finally we examine the transport layer issues and perspectives within our framework.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet topology modeler based on map sampling","authors":"D. Magoni, Jean-Jacques Pansiot","doi":"10.1109/ISCC.2002.1021797","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021797","url":null,"abstract":"Creating a network topology is the first step in building a scenario for a network protocol simulation. The simulation results usually depend on the topology layout, especially for routing and multicasting protocols. Therefore the topology used should be generated with the highest possible accuracy. In particular, protocols designed for the Internet should be simulated over Internet-like topologies. Many topology generators currently exist but the discovery of power laws in the Internet has brought new constraints upon the generated topologies. We introduce a flexible novel way to create Internet-like topologies. It is based on an algorithm that performs a sampling on a measured Internet map. The created topologies accurately comply with the newly found power laws as well as other more common topology properties such as the average path length.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114585198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MAC layer packet-length adaptive CLSP/DS-CDMA radio networks: performance in flat Rayleigh fading channel","authors":"V. Phan, S. Glisic","doi":"10.1109/ISCC.2002.1021673","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021673","url":null,"abstract":"We analyse throughput-delay performance of an unslotted DS-CDMA packet radio network (PRN) using the channel load sensing protocol (CLSP) and packet-length adaptation. This paper shows that while error-correcting channel coding has not yet been effective in heavily correlated flat fading environments, adapting the length of radio packets to time-varying channel conditions is a simple adaptive technique for maintaining and improving the system performance and the energy efficiency of mobile terminals. In our modeling we study the correlation between fade duration statistics and packet length in a flat Rayleigh fading channel under the effects of imperfect power control and user mobility. The results are used to derive practical and robust adaptation mechanisms and performance characteristics. A number of numerical results is presented. This paper lays the groundwork for exploiting adaptive radio possibilities on media access control (MAC) layer in unslotted DS-CDMA PRN.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power and cost aware localized routing with guaranteed delivery in wireless networks","authors":"I. Stojmenovic, S. Datta","doi":"10.1109/ISCC.2002.1021654","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021654","url":null,"abstract":"In a localized routing algorithm, each node currently holding message makes routing decision solely based on the information about itself its neighbors and destination. In a unit graph, two nodes can communicate if and only if the distance between them is no more than the transmission radius, which is the same for each node. A localized routing algorithm that guarantees delivery in connected unit graphs has been described previously. Also, several power, cost and power-cost aware metrics and localized loop-free routing algorithms for wireless networks based on the exact power needed for transmission between two nodes, and/or remaining battery power at nodes were proposed. However, these algorithms did not guarantee the delivery of a message in connected unit graphs. This paper proposes such localized routing algorithms, aimed at minimizing total power for routing a message, or maximizing the total number of routing tasks that a network can perform before a partition. The algorithms are combinations of known greedy power and/or cost aware localized routing algorithms and an algorithm that guarantees delivery. A shortcut procedure is introduced in later algorithm to enhance its performance. The efficiency of proposed algorithms is verified experimentally by comparing their power savings, and the number of routing tasks a network can perform before a node loses all its energy, with, the corresponding shortest weighted path algorithms, and localized algorithms that use fixed transmission power at each node. Significant energy savings (which depend mainly on network density and maximum transmission radius) are obtained.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131355949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling constant bit rate flows in data over cable networks","authors":"Nir Naaman, R. Rom","doi":"10.1109/ISCC.2002.1021732","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021732","url":null,"abstract":"The Data Over Cable Systems Interface Specification (DOCSIS) is the leading standard for data over cable networks. We consider the problem of scheduling constant bit rate (CBR) flows in a DOCSIS compliant cable network. CBR flows are required to support the delivery of voice and other real-time applications that generate fixed size data packets on a periodic basis. The primary application of CBR flows is voice over IP (VoIP) which cable operators intend to use in order to provide cable telephony services. DOCSIS 1.1 is enhanced with quality of service (QoS) capabilities; it defines the unsolicited grant service as the mechanism for supporting CBR flows. The scheduling algorithms, however, are not defined by the standard. We present the scheduling problem and examine several interesting special cases of it. We show that deciding whether a set of CBR flows can be legally scheduled is NP-complete whenever there are two or more different grant intervals. We model the scheduling problem as a variant of bin packing where bin sizes can be modified in a constrained manner This model enables the development of scheduling algorithms which are based on known algorithms for bin packing. We present an algorithm based on the next-fit algorithm and investigate its performance. We show that under certain assumptions which typically hold for VoIP and many other practical applications, a simple polynomial time scheduling algorithm is sufficient.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":" 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114101716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The interrelation of TCP responsiveness and smoothness in heterogeneous networks","authors":"Chi Zhang, V. Tsaoussidis","doi":"10.1109/ISCC.2002.1021692","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021692","url":null,"abstract":"TCP(/spl alpha/,/spl beta/) protocols trade the congestion window increase value /spl alpha/ for the decrease ratio /spl beta/, to generate smoother traffic patterns and to maintain a friendly behavior. We study the design assumptions of TCP(/spl alpha/,/spl beta/) protocols and discuss the impact of equation-based modulation of /spl alpha/ and /spl beta/ on application efficiency. We confirm experimentally that, in general, smoothness and responsiveness constitute a tradeoff; however, we uncover undesirable dynamics of the protocols when the network or flow characteristics do not follow a prescribed and static behavior. For example, we show that smooth backward adjustments confine the protocol's capability to exploit resources that become available rapidly, and embarrass the fair and efficient growth of incoming flows. Furthermore, we show that in the context of wireless networks with high error rate, a low /spl alpha/ dictates a conservative behavior that degrades the protocol performance with both delay-tolerant and delay-sensitive applications; and in the context of high contention of heterogeneous flows, a low /spl alpha/ does not contribute to efficiency and friendliness.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114137123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mechanism for multi-domain marking in DiffServ architecture","authors":"I. Niang, F. Jacquet, D. Seret","doi":"10.1109/ISCC.2002.1021652","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021652","url":null,"abstract":"In a DiffServ domain, several marking mechanisms for packets have been proposed. They make it possible to downgrade or to remove the packets from flows which are not in conformity with the traffic contract. However, all these mechanisms are adapted to operate in intra-domain rather than in multi-domain marking. We propose a mechanism called multi-domain marker (MDM) for flows crossing one or more DiffServ domains in order to reduce the impact of losses on packets which have significant semantic value. The marking is carried out at the entrance to the DiffServ domain and at the exit where the initial priority of the downgraded packets is restored. Simulation results show a reduction in the losses of significant packets. We compare this mechanism to already existing mechanisms by measurements of QoS parameters (delay, jitter, packet losses) of the various real-time flows.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114171718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new method for finding generalized frequent itemsets in generalized association rule mining","authors":"Kritsada Sriphaew, T. Theeramunkong","doi":"10.1109/ISCC.2002.1021800","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021800","url":null,"abstract":"Generalized association rule mining is an extension of traditional association rule mining to discover more informative rules, given a taxonomy. We describe a formal framework for the problem of mining generalized association rules. In the framework, The subset-superset and the parent-child relationships among generalized itemsets are introduced to present the different views of generalized itemsets, i.e. the lattice of generalized itemsets and the taxonomies of k-generalized itemsets respectively. We present an optimization technique to reduce the time consumed by applying two constraints each of which corresponds to each view of generalized itemsets. In the mining process, a new set enumeration algorithm, named SET is proposed. It utilizes these constraints to speed up the mining of all generalized frequent itemsets. By experiments on synthetic data, the results show that SET outperforms the current most efficient algorithm, Prutax, by an order of magnitude or more.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114238079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting the structure of space-time codes","authors":"N. Al-Dhahir","doi":"10.1109/ISCC.2002.1021795","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021795","url":null,"abstract":"We describe key receiver signal processing algorithms for space-time-coded transmissions over broadband wireless channels. These include channel estimation, equalization, and interference cancellation. Our main theme is exploiting the rich structure of space-time codes to enhance the performance and reduce the complexity of receiver signal processing. The third generation TDMA system EDGE is taken as a case study.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121075090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing security and availability of an Internet voting system","authors":"G. Dini","doi":"10.1109/ISCC.2002.1021700","DOIUrl":"https://doi.org/10.1109/ISCC.2002.1021700","url":null,"abstract":"We present a secure and available voting system suitable for a large-scale distributed system such as the Internet. The proposed service is based on replication and tolerates both benign and fully arbitrary failures of servers. If enough servers are correct, service availability and security are ensured despite the presence of faulty servers and any number of faulty voters. A voter that suffers a crash failure can vote after recovery. The proposed service satisfies common voting requirements including voter eligibility and privacy, and tally accuracy. In addition, the service satisfies a further important requirement, namely tally verifiability without any intervention of voters. Anyone, including an external observer can easily be convinced that the election outcome is fairly computed from the ballots that were correctly cast. It follows that the proposed voting scheme strengthens the security properties of the electronic voting procedure, and simplifies the interaction of voters with the electronic voting system.","PeriodicalId":261743,"journal":{"name":"Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications","volume":"423 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131750565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}