{"title":"Analysis on Routing Convergence in Optical Network","authors":"Ning Zhang, Hong Bao, Aibo Liu","doi":"10.1109/NPC.2007.145","DOIUrl":"https://doi.org/10.1109/NPC.2007.145","url":null,"abstract":"Today wavelength division multiplexing (WDM) technology, optical amplifiers, and simple optical switching elements like optical add-drop multiplexers (OADMs) are used in the backbone networks of all operators worldwide. The optical network has its own distinct routing features, topology aggregation and abstraction used in inter-domain routing make the view of network topology different to each routing layer, all these factors demand a creative way to converge and synchronize the hierarchical network. This paper tries to bring forward a kind of parallel topology convergence mechanism depending on the exchange of topology abstracts information, which is suitable for inter-domain routing in multiple layers and domains ASON network. Optical systems nowadays provide the basis for cost-effective transmission of large amounts of bandwidth over the Internet, and will enable its future growth and the spreading of new applications and services.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TLDFS: A Distributed File System based on the Layered Structure","authors":"Lei Wang, Chen Yang","doi":"10.1109/NPC.2007.147","DOIUrl":"https://doi.org/10.1109/NPC.2007.147","url":null,"abstract":"This paper presents a novel distributed file system TLDFS, which consists of two layers. One is the block device layer, which makes the distributed file system manage the consistency of data easily by choosing an appropriate granularity of lock. We implement the distributed interfaces and the new data organization at the block level, which is different from most distributed file systems. The other is the file system layer that consists of three parts: interconnecting module, locking module and distributed file system module. Our prototype system proves the feasibility of the two-layered structure and the experiments show several advantages of TLDFS.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132486079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Study of Cryptographic Storage Area Network","authors":"Tao Cai, Shiguang Ju, JunJie Zhao, Wei Zhong","doi":"10.1109/NPC.2007.56","DOIUrl":"https://doi.org/10.1109/NPC.2007.56","url":null,"abstract":"Encryption is the basis and important method to ensure security of storage area network. And it is very expensive and will drop off performance of storage area network system to unacceptable situation. We evaluate performance of encrypted storage area network using some current cryptographic algorithms, and want to observe some useful result to help researching and designing security system for storage area network.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Request-Driven Role Mapping for Secure Interoperation in Multi-Domain Environment","authors":"Zhuo Tang, Ruixuan Li, Zhengding Lu","doi":"10.1109/NPC.2007.33","DOIUrl":"https://doi.org/10.1109/NPC.2007.33","url":null,"abstract":"This paper proposes a request-driven role mapping framework for secure interoperation in multi-domain environment. To support flexible policy expression and inter-domain policy mapping, we propose a more convenient and effective method to complete the privilege query in a general hybrid role hierarchy for all special external requests. To describe the practical relationship between roles, we partition the role- mappings into three types. These mappings describe the forms of the hierarchy between the mapping roles respectively. With our analysis, for the conflicts which arise from the role-mapping among multi-domains, the effective way is to choose a suitable type of role mapping.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123301334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A delay critical value in TCP Fluid Control","authors":"Hong-yong Yang, Qun-san Xu","doi":"10.1109/NPC.2007.129","DOIUrl":"https://doi.org/10.1109/NPC.2007.129","url":null,"abstract":"A class of Internet TCP fluid control algorithms with communication delays is studied. A critical value of the delay to ensure the stability of Internet is presented by analyzing the algorithm. By enlarging the delay across the critical value, we prove that the TCP-like algorithm exhibits periodic oscillation. Finally, a numerical simulation is used to verify the theoretical results. Our results have shown that the communication delay is one of the key factors to affect the quality of service (Qos) of Internet and plays an important role in communicating process of Internet.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114154663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology Control for Wireless Sensor Networks","authors":"Zhao Tao, Wandong Cai, Liu Gang","doi":"10.1109/NPC.2007.10","DOIUrl":"https://doi.org/10.1109/NPC.2007.10","url":null,"abstract":"Topology control in wireless networks is important to maintain reliable communication links between base stations and nodes, and to maximize the battery life. This paper analyzes how the power control technology affects the MAC layer, network topology, routing, and energy efficiency. Then an energy aware degree-based transmission power control protocol is presented in this paper. We augment our distributed protocol with a heuristic that considers neighbor load information when making power control decisions. It limits the accretion of transmission power, particularly in loose network. Compared to traditional protocol, our protocol can improve energy efficiency and prolong network lifetime significantly, while networks connectivity is still maintained in extreme scenarios. Simulation results demonstrate our conclusion.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123803766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pitch modification based on syllable units for voice morphing system","authors":"Yinqiu Gao, Zhen Yang","doi":"10.1109/NPC.2007.11","DOIUrl":"https://doi.org/10.1109/NPC.2007.11","url":null,"abstract":"An innovative scheme of voice morphing is proposed to make the speech of a source speaker sound like uttered by a target speaker. The morphing technique can hide people 's identity, age, gender while chatting and doing other things related to the transformation of speech streams online, which can ensure the privacy on the prevalent internet. Speaker individuality transformation is achieved by altering the spectral envelope and estimating the excitation signal by modifying the fundamental pitch frequency in syllable units of the residual signal of the source speech based on linear prediction coding (LPC) model. The main advantage of this scheme relies in the aspect of having considered the dynamic characteristic of the pitch frequency, not just focusing on the average level, which enhances the performance of the whole conversion system compared with general concepts such as discrete pitch frequency mapping and so on. Moreover, in the aspect of the alignment of line spectral frequencies (LSFs) vectors, an advanced technique based on isolated syllables rather than the general dynamic time warping algorithm (DTW) is introduced. The experimental results show that the system is capable of effectively transforming speaker identity whilst the converted speech maintains high quality.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MSF: A Session-Oriented Adaptive Load Balancing Algorithm","authors":"Yijiao Chen, Xicheng Lu, Zhigang Sun","doi":"10.1109/NPC.2007.40","DOIUrl":"https://doi.org/10.1109/NPC.2007.40","url":null,"abstract":"Some content-oriented applications, such as IDS and IPS; require keeping session integrality when scheduling the workload, otherwise, the semantic integrality of the session will be destroyed. The traditional load balancing algorithms focus on parallel processing and have less consideration for session integrality. In this paper, we proposed an adaptive load balancing algorithm named MSF (minimum sessions first). The algorithm integrates the static workload pre-distribution scheme based on flow table with adaptive scheduling scheme, can obtain the session level load balancing by dynamic scheduling the flow-bundles in which the session number are minimum. The simulation results show that the scheduler achieves significant improvement in session integrality disruption and has a fairly good load balance both in packets level and bits level. It's a sample algorithm and appropriate for the application of session-oriented load balancing. .","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122419781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Implementation on Event Notification Service of ForCES Routers","authors":"Wengping Zhang, Weiming Wang, Ligang Dong","doi":"10.1109/NPC.2007.28","DOIUrl":"https://doi.org/10.1109/NPC.2007.28","url":null,"abstract":"This paper introduces the architecture of the ForCES routers. Furthermore, it specifies the research and implementation of the event notification service of ForCES routers. We can implement the event asynchronous notification of ForCES routers by using the doubly linked list. And we introduce two other features of ForCES routers, (1) the simplification of the events subscription and unsubscription, (2) the simplification and effectiveness of the filtering criteria. Finally, this paper has carried out the test about the port link status event. The experiment result testifies the feasibility of the event notification service of ForCES routers.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bus-based Anonymous Multicast in Peer-to-Peer Overlay","authors":"Jian Wang, Changyong Niu, R. Shen","doi":"10.1109/NPC.2007.67","DOIUrl":"https://doi.org/10.1109/NPC.2007.67","url":null,"abstract":"Peer-to-peer overlay is self-organized by individual hosts in the Internet. The overlay usually serves for collaboration-oriented applications and necessitates group communication. Consequently, anonymity is demanded in scenarios such as military, government applications for privacy protection. It prevents communicating party identity from being revealed by others. In this paper we propose Bus-based anonymous multicast upon peer-to-peer overlay, which delivers message from originator to consumers anonymously. The Bus rotates over an Euler tour formed by hosts and takes intentional messages to respective consumers. Theoretical analysis demonstrates that bus-based anonymous multicast gets higher anonymity level comparing to existing ones.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122939649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}