Shahram Mohrehkesh, S. Bastani, A. Shafigh, M. Fathy
{"title":"A Framework for providing QoS routing in MANETs","authors":"Shahram Mohrehkesh, S. Bastani, A. Shafigh, M. Fathy","doi":"10.1109/ISCN.2006.1662514","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662514","url":null,"abstract":"The aim of this work is to propose a framework for providing QoS routing in MANETs. The proposed framework uses local information of nodes such as node's speed, buffer, and power to select path for routing. Deploying these information, more stable paths are selected and hence QoS routing parameter could be satisfied. Moreover, routing performance has been improved, especially in terms of end-to-end delay. The proposed framework performs in a distributed fashion and uses only local information of nodes, so it does not generate any additional packets and does not impose any overhead on network. We provide some simulation results to show the efficiency of the framework","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121123708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constraint-Based Routing in Traffic Engineering","authors":"A. Karaman","doi":"10.1109/ISCN.2006.1662507","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662507","url":null,"abstract":"Traffic engineering (TE) describes a domain-wide perspective for traffic control as opposed to application-specific concerns of QoS. MPLS is today's most powerful architecture for TE. Constraint-based routing refers to the process of path assignment to flows to fulfill the TE objective which has been defined in a number of multi-constraint ways, and is the most significant component of TE. In this paper, we review constraint-based routing algorithms. We first provide an overview of MPLS/TE and place constraint-based routing within this approach. We then look into the potential path attributes and the underlying platform to characterize these algorithms before we present our review. Our study provides a comprehensive reference to the operational structure and specifications of constraint-based routing algorithms","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121594193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of two-level VPN service provisioning systems over MPLS networks","authors":"Li-Der Chou, M. Hong","doi":"10.1109/ISCN.2006.1662506","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662506","url":null,"abstract":"Virtual private network (VPN) services are getting important due to the expansion of enterprises and the requirement for securely transferring confidential data. The populations using VPN services include service provider administrators, local enterprise device managers, and end users. Service provider administrators provide interconnectivity among separated local devices, while local enterprise device managers provide network connectivity for end users. In the paper a two-level VPN service provisioning system is designed and implemented. In the system there are two parts: provider edge manager (PER) deployed in service provider backbone, and customer edge manager (CAR) deployed in local enterprise networks. PER deals with provisioning multi-protocol label switching (MPLS) VPN service to local device manager, and CAR takes charge of deploying customer premises edge-based (CPE-based) VPN services for end users. Local device managers can deploy CPE-based VPN services over MPLS VPN services provided by service provider administrators, through the exchanges of VPN status and control information between PER and CAR","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115040786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handoff Prioritizing Schemes in Cellular Wireless Networks","authors":"Vassily Abdulova, Isik Aybay","doi":"10.1109/ISCN.2006.1662512","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662512","url":null,"abstract":"This paper provides a detailed discussion of nonprioritized and prioritized handoff schemes. It presents a survey of published papers in this area. Moreover, an extensive classification of handoff prioritizing schemes is presented in this paper","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131680677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chaotic UWB quadrature chaos shift keying for wireless sensors and coexistence with direct sequence spread spectrum systems","authors":"G. Plitsis","doi":"10.1109/ISCN.2006.1662543","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662543","url":null,"abstract":"Chaos-based modulation schemes have been proposed as alternatives of conventional digital communication systems. Wireless dust sensor systems is a term describing cubic millimeter scale sensor nodes envisioned to fulfil large scale monitoring tasks. IEEE 802.15.4 is an under standardization air interface for low rate WPANs. The corresponding throughput and bit error rate of the QCSK coexistence with direct sequence spread spectrum systems are being presented with the use of mathematical models","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129344009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Competition-based load balancing for distributed systems","authors":"A. Abed, G. Oz, A. Kostin","doi":"10.1109/ISCN.2006.1662539","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662539","url":null,"abstract":"The aim of this paper is to propose a new competition-based load balancing scheme and investigate it. The system is composed of a set of workstation clusters. The paper deals with balancing for multi-task concurrent applications, as well as for independent tasks. We developed a simulation load balancing system (LOBAS) that was used to test a competition driven load balancing algorithm. The results obtained show viability of such algorithm. The algorithm has a potential for scalability with respect to the number of tasks","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116490190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimistic fair e-commerce protocol for large e-goods","authors":"Cagil Can Oniz, E. Savaş, A. Levi","doi":"10.1109/ISCN.2006.1662536","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662536","url":null,"abstract":"Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything. In this paper, a fair e-commerce protocol for large e-goods is proposed and implemented. The proposed protocol provides a method for the fair exchange of e-money for e-products, and a method for verifying the contents of the exchanged items. The protocol is optimistic and efficient such that when none of the parties tries to cheat, only three messages are sufficient. In case of disputes, three more messages are needed. Furthermore, the customer remains anonymous after the transaction; thus, no information about the customers' shopping habits can be gathered through the protocol. The implementation results show that the protocol is efficient and secure and that only a small number of cryptographic operations is sufficient","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131917850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DST: delay sensitive transport in wireless sensor networks","authors":"V. C. Gungor, Ö. Akan","doi":"10.1109/ISCN.2006.1662519","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662519","url":null,"abstract":"In this paper, the delay sensitive transport (DST) protocol is presented for wireless sensor networks (WSN). The objective of the DST protocol is to timely and reliably transport event features from the sensor field to the sink with minimum energy consumption. In this regard, the DST protocol simultaneously addresses congestion control and timely event transport reliability objectives in WSN. In addition to its efficient congestion detection and control algorithms, it incorporates the time critical event first (TCEF) scheduling mechanism to meet the application-specific delay bounds at the sink node. Importantly, the algorithms of the DST protocol mainly run on resource rich sink node, with minimal functionality required at resource constrained sensor nodes. Performance evaluation via simulation experiments show that the DST protocol achieves high performance in terms of real-time communication requirements, reliable event detection, and energy consumption in WSN","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A practical approach to scatternet formation and routing on Bluetooth","authors":"S. Altundağ, M. Gokturk","doi":"10.1109/ISCN.2006.1662503","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662503","url":null,"abstract":"Bluetooth is a mobile ad-hoc network aiming to serve voice, video, and data applications. Piconet is the smallest Bluetooth network unit that can be formed by a group of nodes. Scatternets are formed by joining piconets. In this paper, a practical scatternet formation protocol and an application utilizing this protocol are introduced. Scatternet formation protocols proposed until now are slow to establish the network for many application types. The suggested protocol is built on the experience gained from other scatternet formation protocols, ad-hoc routing protocols and sensor network routing protocols. It is practical, quick to establish, and easy to operate when data is flowing across the network","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134072416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bounpadith Kannhavong, Hidehisa Nakayama, N. Kato, Y. Nemoto, A. Jamalipour
{"title":"Analysis of the node isolation attack against OLSR-based mobile ad hoc networks","authors":"Bounpadith Kannhavong, Hidehisa Nakayama, N. Kato, Y. Nemoto, A. Jamalipour","doi":"10.1109/ISCN.2006.1662504","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662504","url":null,"abstract":"Recent advances in wireless networking technologies have made it possible to construct a mobile ad hoc network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, they are much more vulnerable to malicious attacks than a conventional wired network. In MANET, routing plays an important role in providing connectivity for mobile nodes who are not within the same radio range. Existing routing protocols in MANET assume a trusted and reliable environment. However, in hostile environment mobile nodes are susceptible to various types of routing attacks. This paper identifies a new routing attack, called node isolation attack, against optimized link state routing (OLSR) protocol, one of the four standard routing protocols for MANETs. We analyze in detail and demonstrate the impact of this attack in order to show the necessity for a countermeasure to guard against the attack. As a first step to defend against the attack, we present a simple technique to detect the attack and identify the source of the attack","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129083732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}