2006 International Symposium on Computer Networks最新文献

筛选
英文 中文
Performance analysis of an efficient packet-based IEEE 802.16 MAC supporting adaptive modulation and coding 支持自适应调制和编码的高效基于分组的IEEE 802.16 MAC性能分析
2006 International Symposium on Computer Networks Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662501
M. Settembre, M. Puleri, S. Garritano, P. Testa, R. Albanese, M. Mancini, V. L. Curto
{"title":"Performance analysis of an efficient packet-based IEEE 802.16 MAC supporting adaptive modulation and coding","authors":"M. Settembre, M. Puleri, S. Garritano, P. Testa, R. Albanese, M. Mancini, V. L. Curto","doi":"10.1109/ISCN.2006.1662501","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662501","url":null,"abstract":"The challenge for broadband fixed wireless access (BFWA) systems, which represent an attractive solution for broadband access in the last mile and for wireless backhauling applications in the \"middle mile\", lies in providing high data rates and quality of service (QoS). Such requirements mainly derive from the need to provide new bandwidth consuming multimedia services and applications, efficient handling of IP traffic, effective use of the limited radio spectrum and a greater backhaul capacity to support the increased number of users per cell site. IEEE 802.16 family of standards and its associated consortium WiMAX are gaining more and more interest in the telecommunication areas as broadband fixed wireless access solution with possible extension in nomadic and mobile area. Its main leverages are an efficient handling of IP traffic, the support of channel adaptivity and advanced QoS management. This paper aims at defining a new packet-based scheduling strategy for an IEEE 802.16 system supporting variable length MAC protocol data units (PDUs) and adaptive coding and modulation while fulfilling QoS requirements. A performance analysis of the proposed scheduler is presented and discussed in terms of packet transfer delay, MAC overhead and average throughput","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"499 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Performance of the application of chaotic signals in IEEE 802.11b and wireless sensor networks 混沌信号在IEEE 802.11b和无线传感器网络中的应用性能
2006 International Symposium on Computer Networks Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662544
Grigorios Plitsis
{"title":"Performance of the application of chaotic signals in IEEE 802.11b and wireless sensor networks","authors":"Grigorios Plitsis","doi":"10.1109/ISCN.2006.1662544","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662544","url":null,"abstract":"Chaos engineering for wireless communications is an emerging field of research. There are certain advantages that chaotic dynamics could offer to conventional wireless access systems such as increased security and encryption, low-power communication, and hardware simplicity. This paper describes how chaotic spreading could be used in broadband wireless access systems such as IEEE 802.11b by replacing the spreading sequences with chaotic ones and thus improving the performance under narrowband sinusoidal jammer and Bluetooth interference. The results are being presented with the use of link level simulations. It also describes how quadrature chaos shift keying (QCSK) could be used for wireless sensor networks (WSNs) as the simplicity of hardware when using chaos in communication protocols could successfully lead to cubic millimeter scale sensor nodes and presents the performance of QCSK under narrowband sinusoidal jammer with the use of mathematical models","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116924213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Heart-like fair queuing algorithms (HLFQA) 类心公平排队算法(HLFQA)
2006 International Symposium on Computer Networks Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662534
R. Dragos, M. Collier
{"title":"Heart-like fair queuing algorithms (HLFQA)","authors":"R. Dragos, M. Collier","doi":"10.1109/ISCN.2006.1662534","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662534","url":null,"abstract":"We propose a new family of fair, work conserving traffic scheduling mechanisms that imitate the behavior of the human heart in the cardiovascular system. The algorithms have MAX (where MAX is the maximum packet size) fairness and O(log N) complexity and thus compare favorably with existing algorithms. The algorithms are simple enough to be implemented in hardware","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122317107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks 无线局域网的安全机制及其性能影响
2006 International Symposium on Computer Networks Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662520
Gulsum Zeynep Gurkas Aydin, A. Zaim, M. Aydin
{"title":"Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks","authors":"Gulsum Zeynep Gurkas Aydin, A. Zaim, M. Aydin","doi":"10.1109/ISCN.2006.1662520","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662520","url":null,"abstract":"Rapidly growing 802.11 wireless local area networks continue to gain popularity in business and computer industry. This growing popularity and usage also caused many improvements on both physical layer and security mechanisms. In this study we investigated the performance of wireless local area networks (WLANs) and security mechanisms available for WLANs. These security mechanisms are wired equivalent privacy (WEP), Wi-Fi protected access (WPA) and 802.11i (WPA2). To examine the impacts of encryption and integrity protection mechanisms provided by WEP, WPA and WPA2, we developed a simulation software. In the first part of our study we tested the performance of IEEE 802.11b, 802.11g and 802.11i networks without security. In the second part we implemented the security mechanisms and investigated the impacts of these security mechanisms on the performance of wireless local area networks","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122479450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Effects of the triggering policy on the performance of an adaptive WR-OBS network with QoS support 触发策略对支持QoS的自适应WR-OBS网络性能的影响
2006 International Symposium on Computer Networks Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662527
N. Rikli, Khaled Al-Omran
{"title":"Effects of the triggering policy on the performance of an adaptive WR-OBS network with QoS support","authors":"N. Rikli, Khaled Al-Omran","doi":"10.1109/ISCN.2006.1662527","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662527","url":null,"abstract":"A wavelength-routed (WR) optical network using an adaptive burst size (ABS) optical burst switching (OBS) scheme is to be considered. The aim is to improve the offered QoS and offer distinctive class-of-service (CoS) separation for various network conditions in an adaptive way. Specifically, a hybrid triggering policy is suggested to achieve the required network performance, such as average packet loss, average packet delay, and average network utilization, under both light and heavy traffic conditions. Performance results under dynamic and bursty traffic conditions are presented and analyzed","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SeCond: a system for epidemic peer-to-peer content distribution 第二:一个流行的点对点内容分发系统
2006 International Symposium on Computer Networks Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662542
A. Alagoz, Öznur Özkasap, M. Çağlar
{"title":"SeCond: a system for epidemic peer-to-peer content distribution","authors":"A. Alagoz, Öznur Özkasap, M. Çağlar","doi":"10.1109/ISCN.2006.1662542","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662542","url":null,"abstract":"We propose an efficient cooperative content distribution protocol in which the cooperation among participants is based on a peer-to-peer (P2P) paradigm. Our main contribution to P2P content distribution is the use of an epidemic communication approach. Since epidemic algorithms are easy to use, robust and adaptive to dynamic conditions, they have found several application areas in distributed systems such as failure detection, data aggregation and database replication. However, they have not been used in cooperative content distribution before. In addition to the use of epidemic algorithms for state exchange among peers, we propose some methods in order to increase utilization of system resources during distribution of the files. We demonstrate effectiveness and scalability of the protocol through our simulation model","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115781219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The evaluation of high reliability in an autonomous decentralized IC card ticket system 自主分散式IC卡票务系统的高可靠性评估
2006 International Symposium on Computer Networks Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662535
A. Shiibashi, Takeyuki Yajima, Xiaodong Lu, K. Mori
{"title":"The evaluation of high reliability in an autonomous decentralized IC card ticket system","authors":"A. Shiibashi, Takeyuki Yajima, Xiaodong Lu, K. Mori","doi":"10.1109/ISCN.2006.1662535","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662535","url":null,"abstract":"Both high performance and high reliability are necessary for the automatic fare collection system. The IC card ticket system, developed in order to improve the passengers' satisfaction and to reduce the maintenance costs, cannot avoid the requirements, either. However, this new system has a problem; high performance on wireless communications lowers reliability. The solutions are the \"autonomous decentralized architecture,\" the \"autonomous decentralized algorithm,\" and the \"autonomous decentralized data consistency technology.\" This paper introduces the \"autonomous decentralized data consistency technology\" for high reliability and evaluates the effectiveness by the functional reliability, which depends on how many times this technology runs and how many data the IC card contains. The results show the decentralized processes competitive to the centralized processes under the particular conditions. These conditions are made use of the practical \"Suica\" system at East Japan Railway Company and the system is running satisfactorily, without any fatal errors","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133248747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IPSEC over satellite links: a new flow identification method 卫星链路上的IPSEC:一种新的流量识别方法
2006 International Symposium on Computer Networks Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662523
Dilek Demirel Isci, Fatih Alagöz, M. Çaglayan
{"title":"IPSEC over satellite links: a new flow identification method","authors":"Dilek Demirel Isci, Fatih Alagöz, M. Çaglayan","doi":"10.1109/ISCN.2006.1662523","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662523","url":null,"abstract":"Acknowledgment based transport protocols such as TCP have low performance in satellite links, which are characterized by high latencies and high bit error rates. Low performance of TCP in satellite links is due to the fact that TCP packet losses are assumed to be the cause of congestion in the network, which turns out to be an invalid assumption for satellite links. TCP performance enhancing proxies (PEPs) are widely used to overcome the limitations of TCP over satellite links. However, when end-to-end security mechanisms, such as IPSEC, are used, TCP PEP mechanisms can not be used. IPSEC encrypts and/or authenticates the packet header fields that the PEP needs to read or modify. We propose a novel mechanism to integrate IPSEC with TCP PEPs. In our approach, a cryptographic hash of flow identification information is generated and stored in the IP header. The TCP sequence number is also stored in the IP header. Using the hash value and sequence numbers, the PEP is able to match packets and corresponding acknowledgements to regulate the flow. This approach is applicable to PEP mechanisms that need read access to the IP and TCP headers","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133770668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Raptor versus Reed Solomon forward error correction codes 猛禽对里德·所罗门的纠错码
2006 International Symposium on Computer Networks Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662545
U. Demir, Özlem Aktaş
{"title":"Raptor versus Reed Solomon forward error correction codes","authors":"U. Demir, Özlem Aktaş","doi":"10.1109/ISCN.2006.1662545","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662545","url":null,"abstract":"Network conditions generally cause errors on network packets. Correction of these errors is in the subject of \"forward error correction.\" Forward error correction is divided into two categories: bit-level forward error correction and packet-level forward error correction. These two categories are unfamiliar. The aim of this study is to make a literature comparison of two alternative packet-level forward error correction codes: Raptor and Reed Solomon. Nowadays when packet-level error correction codes are mentioned, these two techniques are remembered. Reed Solomon FEC codes are found on the Internet and are tested with different network conditions. Raptor codes are commercial and not used broadly yet. But several new technologies (MBMS, DVB and etc.) uses Raptor. This study shows the cases, where Raptor and Reed Solomon are appropriate to use","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128388861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
A time-threshold based multi-guard bandwidth allocation scheme for cellular networks 一种基于时间阈值的蜂窝网络多保护带宽分配方案
2006 International Symposium on Computer Networks Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662517
I. Candan, M. Salamah
{"title":"A time-threshold based multi-guard bandwidth allocation scheme for cellular networks","authors":"I. Candan, M. Salamah","doi":"10.1109/ISCN.2006.1662517","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662517","url":null,"abstract":"In this paper, a time-threshold based multi-guard bandwidth allocation scheme for voice calls is presented. The main idea of the new scheme is based on monitoring the elapsed real time of handoff calls and according to a time threshold (te), a handoff call is either slightly-prioritized or fully-prioritised. A slightly-prioritized handoff call has higher priority than a new call and lower priority than a fully-prioritized handoff call. Also in this paper, the performances of different bandwidth allocation schemes are measured using a crucial general performance metric Z. Z, which is a performance/cost ratio, is a function of the new call blocking probability, handoff call dropping probability and system utilization all together. The results indicate that our scheme outperforms other traditional schemes in terms of performance/cost ratio, and maintains its superiority under different network circumstances","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126557681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信