{"title":"A Cross-Layer Fine-Tuning Scheduling Scheme to Provide Proportional Delay Differentiation in a Wireless LAN","authors":"Y. Lai, A. Chang, Ching-Neng Lai, Chih-Chung Lin","doi":"10.1109/AINA.2008.102","DOIUrl":"https://doi.org/10.1109/AINA.2008.102","url":null,"abstract":"This paper addresses how to provide the proportional delay differentiation (PDD) in a wireless LAN (WLAN) and proposes a cross-layer fine-tuning scheduling (CFS) scheme with the goal to maintain PDD among all wireless stations while improving performance in a WLAN. CFS additionally considers the time-varying channel capacity to schedule packets, finely tunes the contention window, and properly arbitrates the backoff time. Also, it operates in a fully distributed manner among all stations and in a cross- layer approach in each station. The simulation results demonstrate that the CFS scheme can provide more satisfactory PDD and higher performance in a WLAN, compared with 802.11e.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126032946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Quorum-Based Route Cache Maintenance Protocol for Mobile Ad-Hoc Networks","authors":"Gwo-Jong Yu","doi":"10.1109/AINA.2008.151","DOIUrl":"https://doi.org/10.1109/AINA.2008.151","url":null,"abstract":"The objective of this paper is to propose a quorum- based robust and efficient routing protocol (QRERP) for mobile Ad Hoc network. There are four phases in the proposed QRERP. They are initialization phase, route discovery phase, route reply phase and data transmission phases. In initialization phase, the entire network is partitioned into several connected subgraph. Each subgraph is represented by a host adjacency matrix (HAM) and a logical coterie tree. In the route discovery phase, a route can be discovered by local matrix computation, quorum-based routing table query or quorum-based flooding mechanism. When a route is established, a packet can be replied from destination to source node and the route information can be distributed to the set of coteries passed through by this routing path. Finally, after the routing path is confirmed by route reply packet, source node can communication with destination. During the data transmission, when route is broken due to node mobility or power exhausted, a route maintenance mechanism can be triggered to mainline the robustness of the routing path. The performance of the proposed QRERP is demonstrated by experimental results. From the results, we can conclude that the proposed approach has advantages of backup route, less control overhead, mobility maintenance and route maintenance.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"43 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126926149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Access Scheduling Algorithms in Wireless Mesh Networks","authors":"Hongju Cheng, N. Xiong, L. Yang","doi":"10.1109/AINA.2008.29","DOIUrl":"https://doi.org/10.1109/AINA.2008.29","url":null,"abstract":"In this paper we have considered the distributed scheduling problem for channel access in wireless mesh networks. The problem is to assign time-slots for each node in the network to access the control channels so that it is guaranteed that each node can broadcast the control packet to any one-hop neighbor in one scheduling cycle. The objective is to minimize the total number of different time-slots in the scheduling cycle. In the single-channel ad hoc networks, the known best result for this problem is proved to be (K2 + 1) in arbitrary graphs and 25K in unit disk graphs with K as the maximum node degree. The original contributions of this paper are that it has taken the large interference range problem into consideration for the first time and proposed two algorithms for the scheduling problem, namely, the one neighbor per cycle (ONPC) algorithm and the all neighbors per cycle (ANPC) algorithm. We prove that the number of time-slots by the second algorithm is upper-bounded by 2K in some special case. The fully distributed versions of these algorithms are given in this paper. Simulation results also show that the performance of ANPC is rather better than ONPC.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128469971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analytical Model for Priority-Based AQM in the Presence of Heterogeneous Network Traffic","authors":"Lan Wang, G. Min, I. Awan","doi":"10.1109/AINA.2008.140","DOIUrl":"https://doi.org/10.1109/AINA.2008.140","url":null,"abstract":"Active queue management (AQM) coupled with differentiated scheduling mechanism is an important and promising scheme for congestion control and quality-of-service (QoS) guarantee in communication networks. This paper develops a new analytical performance model for priority-based AQM subject to heterogeneous bursty traffic modelled by Markov-modulated Poisson processes (MMPP) and non-bursty traffic modelled by Poisson processes. Individual thresholds for each traffic class and pre-emptive resume (PR) priority scheduling mechanism are adopted to control traffic injection rate and support differential QoS. The model derives the expression of the aggregate and marginal performance metrics of the priority-based AQM system. The credibility of the model is demonstrated by comparing the analytic results with those obtained through extensive simulation experiments. The proposed model is used to investigate the impact of the squared coefficient of variation (SCV) of bursty traffic on the performance of AQM.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129731872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks","authors":"Furong Wang, Chen Huang, Jing Zhao, Chunming Rong","doi":"10.1109/AINA.2008.124","DOIUrl":"https://doi.org/10.1109/AINA.2008.124","url":null,"abstract":"An Ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure, so they are vulnerable to many attacks and the security of the network can not be ensued. In this paper, we present a novel Intrusion Detection Mechanism based on the Trust Model (IDMTM) for mobile Ad hoc networks. In IDMTM, we employ two new concepts: \"Evidence Chain (EC)\" and \"Trust Fluctuation (TF)\" to accurately evaluate the trust value of a node in the network for judging whether it is malicious or not. Comparing with other Intrusion Detection System, IDMTM can greatly decrease the possibility of false-alarm with by efficiently utilizing the information collected from the local node and the neighboring nodes. Also, IDMTM can efficiently isolate internal malicious nodes from the networks and enhance the security without compromising the performance of the networks.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131436944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Care Communication System with Space Sharing Function","authors":"A. Koyama, Yosuke Takenaka, J. Arai, L. Barolli","doi":"10.1109/AINA.2008.20","DOIUrl":"https://doi.org/10.1109/AINA.2008.20","url":null,"abstract":"Recently there are a lot research works for multimedia communication systems. Especially, the space sharing communication is one of research trends for multimedia communication. By using the space sharing technology, the users feel as they are in the same space, even if they are in different locations. This can be done taking each video image of two remote points into one space. In this paper, we propose a care communication system with space sharing function. The implemented care communication system supports the communication and information sharing among in-patients, family members, doctors and helpers. In the proposed system, we have developed not only integration of two video images but also a warmth transmission function. By using this function, two persons in different locations can transmit their feelings as they are in the same space. We verified the proposed system effectiveness by conducting some experiments.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132375356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System","authors":"Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung","doi":"10.1109/AINA.2008.119","DOIUrl":"https://doi.org/10.1109/AINA.2008.119","url":null,"abstract":"Network intrusion detection system (NIDS) is a system developed for identifying attacks by using a set of rules. NIDS is an efficient way to provide the security protection for today's Internet. Pattern match algorithm plays an important role in NIDS that performs searches against multiple patterns for a string match. Pattern matching is a computationally expensive task. Traditional software-based NIDS solutions usually can not achieve a high-speed required for ever growing Internet attacks. In order to satisfy high-speed packet content inspection, hardware-implementable pattern match algorithm is required. In this paper, we propose a hardware-based pattern match architecture that employs a multi-character processor array. The proposed multi-character processor array is a parallel and pipelined architecture which can process multiple characters of the input stream per cycle. The proposed architecture can reduce a lot of unnecessary computations and thus it is power efficient. We use snort pattern sets and DEFCON packet traces to perform our simulations. Our experiment results show that, with a 3-character processor array, we can reduce 83% of the computations compared with the brute force approach.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131095441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. S. Alam, Michael Cohen, Ashir Ahmed, J. Villegas
{"title":"Figurative Privacy Control of SIP-Based Narrowcasting","authors":"M. S. Alam, Michael Cohen, Ashir Ahmed, J. Villegas","doi":"10.1109/AINA.2008.128","DOIUrl":"https://doi.org/10.1109/AINA.2008.128","url":null,"abstract":"In traditional conferencing systems, participants have little or no privacy, as their voices are by default shared with all others in a session. Such systems cannot offer participants the options of muting and deafening other members. The concept of narrowcasting can be applied to make these kinds of filters available in multimedia conferencing systems. Our system treats media sinks (in the simplest case, listeners) as full citizens, peers of the media sources (con- versants' voices), and we defined therefore duals of mute & select : deafen & attend, which respectively block a sink or focus on it to the exclusion of others. In this article, we describe our prototyped system, which uses existing standard Session Initiation Protocol (SIP) methods to control fine-grained narrowcasting sessions. The design considers the policy configured by the participants and provides a policy evaluation algorithm for media mixing and delivery. We have integrated a \"virtual reality\"-style interface with this SIP backend to display and control articulated narrowcasting with figurative avatars.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123884422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Suganuma, K. Yamanaka, Yoshikazu Tokairin, Hideyuki Takahashi, N. Shiratori
{"title":"A Ubiquitous Supervisory System Based on Social Context Awareness","authors":"T. Suganuma, K. Yamanaka, Yoshikazu Tokairin, Hideyuki Takahashi, N. Shiratori","doi":"10.1109/AINA.2008.123","DOIUrl":"https://doi.org/10.1109/AINA.2008.123","url":null,"abstract":"We propose a supervisory system that deals with actual situations and social aspects of users in ubiquitous computing environment in this paper. To realize a gentle and safe supervision, we have to consider social relationships between observers and the watched person to give adequate level of privacy to the services. We propose \"uEyes\", a ubiquitous supervisory system that introduces a new feature for the supervision, i.e., social context awareness. By using this feature, environmental information acquired from real world and knowledge on social activities of people are integrated effectively. From experimental results using a prototype of uEyes for supervising elderly people, we show that the social context awareness, as well as other components of the system, effectively works to support the supervision.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122878985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Mao, D. Feng, Suzhen Wu, Jianxi Chen, Lingfang Zeng
{"title":"Performance-Directed iSCSI Security with Parallel Encryption","authors":"Bo Mao, D. Feng, Suzhen Wu, Jianxi Chen, Lingfang Zeng","doi":"10.1109/AINA.2008.91","DOIUrl":"https://doi.org/10.1109/AINA.2008.91","url":null,"abstract":"ISCSI has been paid much attention since it allows the storage data to be transported over the popular TCP/IP networks and takes advantage of the networks. Carrying data over the TCP/IP networks introduces the security problem. The IP security mechanisms, such as IPSec, always degrade the performance greatly. In this paper we introduced a parallel encryption method, combined with the IPSec A,H to provide the security and high performance for the iSCSI storage system. We have implemented parallel encryption with IPSec AH in the UNH iSCSI software. Numerical results using popular benchmark program and OLTP traces have shown dramatic performance gain and the average response time reduced greatly.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127461448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}