{"title":"Fast update of forwarding tables in Internet router using AS numbers","authors":"Heo-Seong. Lee, Seokjae Ha, Yanghee Choi","doi":"10.1109/ICOIN.2001.905449","DOIUrl":"https://doi.org/10.1109/ICOIN.2001.905449","url":null,"abstract":"The updates of router forwarding tables can be made faster using the autonomous system number corresponding to a prefix as an intermediate number between the prefix and the next-hop address. At the cost of fast update, one table lookup introduces small additional delay, which can be eliminated by pipelining. This scheme is applicable to several routing table lookup algorithms for fast update.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance study of AAL2 protocol for low-bit-rate multimedia services","authors":"Jean-Lien C. Wu, Chi-Hong Huang, R. Sheu","doi":"10.1109/ICOIN.2001.905578","DOIUrl":"https://doi.org/10.1109/ICOIN.2001.905578","url":null,"abstract":"In order to support low-bit-rate delay-sensitive traffic consisting of short packets, typically the ATM adaptation layer type 2 (AAL2) has been proposed to provide both bandwidth efficiency and quality of services (QoS) delivery. To support multiple classes of low-bit-rate multimedia traffic, a packet scheduling discipline based on AAL2, referred as AAL2/SD, is proposed paper to efficiently carry multiple classes of traffic over ATM networks. Furthermore, to prevent serious performance degradation due to AAL2 multiplexing when there are cell losses, a buffer management scheme is also proposed to guarantee the QoS for each traffic type. We compare our proposed scheme to the AAL2 protocol using the static priority packet service discipline, called AAL2/SP, for different traffic types. Simulation results show that the AAL2/SD improves the throughput and average transfer delay compared to the AAL2/SP. Moreover, by using a simple buffer access control, packet loss can be effectively controlled.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124651448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constraint-based LSP setup by message reversing of CR-LDP","authors":"Byeongsik Kim, Woojik Chun, Jaeho Yoo","doi":"10.1109/ICOIN.2001.905622","DOIUrl":"https://doi.org/10.1109/ICOIN.2001.905622","url":null,"abstract":"We investigate the problem of constraint-based routing that is one key component of traffic engineering. In constraint-based routing, resource information in addition to topology information is maintained in a database on all participating nodes in the routing domain. Especially the resource information of the links is changed rapidly because the bandwidth availability, for example, is changed whenever new LSPs are established and terminated. Therefore, the information used to compute a constraint-based path may be out-of-date. This means an LSP setup request may be blocked because a link or a node along the selected LSP has insufficient resources. This paper discusses the impact of inaccurate link state information, an LSP setup method coping with the inaccuracies, a new mechanism that allows constraint-based LSP setup and restoration, and gains obtained by our new mechanism.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123292099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guaranteed versus controlled load: implications for service subscribers and providers in RSVP networks","authors":"Y. Lai, Ying-Dar Lin, Chih-Yu Chen, Huan-Yun Wey","doi":"10.1109/ICOIN.2001.905469","DOIUrl":"https://doi.org/10.1109/ICOIN.2001.905469","url":null,"abstract":"The IETF Integrated Service Working Group has specified two service classes: guaranteed quality (GQ) service and controlled load (CL) service. What concerns service subscribers and providers most is the cost of these two services and their performance. For service subscribers, the question is which application deserves which service. For service providers, the question is how to charge their users reasonably to obtain the maximum revenue and what kinds of mechanisms can achieve better resource utilization. We try to answer the above questions under conservative and well-performed admission control schemes, respectively. Simulation results based on the common models of traffic, signaling protocol, policer, classifier, and packet scheduler are presented. When the traffic burstiness increases, the cost difference between GQ and CL increases significantly but the average performances do not have much difference. Thus, subscribers are suggested to use the CL service when the traffic burstiness is high and the delay bound is not critical, and vice versa. For providers, a well-performed admission control scheme is important, especially when the traffic burstiness is high, in limiting the cost difference between GQ and CL. It is observed that, with well-performed admission control, the cost difference can be reduced from 20 times to 1.41 times and 8 times to 1.14 times for bursty and less-bursty traffic, respectively.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The A/sup 3/ fault-tolerant framework for distributed computing with multiple mobile agents over sizeable networks","authors":"Allan K. Y. Wong, Wilfred W. K. Lin","doi":"10.1109/ICOIN.2001.905451","DOIUrl":"https://doi.org/10.1109/ICOIN.2001.905451","url":null,"abstract":"We are proposing the A/sup 3/ fault-tolerant framework for distributed computing with multiple mobile agents over sizeable networks. A/sup 3/ fault tolerance includes three objectives, namely, access security, agent persistence, and avoidance of long queuing time. The last two objectives are achieved by agent mobility. The prototype for this framework was verified over the Internet, a typical sizeable network, with selected sites that include part of our university's intranet and other local Internet sites, as well as the stable Java-based Aglets mobile-agent platform. Results from the verification exercise with this prototype indicate unanimously that the A/sup 3/ framework is indeed a fault-tolerant solution for distributed computing with multiple mobile agents over sizeable networks. Access security is achieved by formation of communes, namely, villages and public intranets. These communes protect themselves by denying accesses by non-members to the shared communal resources. The smallest commune is a village, and different villages are interconnected automatically by mediators or connectors into a larger commune known as the public intranet, which has a different connotation from the conventional one that is formed for institutional privacy and integrity. Agent mobility for achieving agent persistence and avoidance of long queuing time depends on the instantaneous values of the migration indices, which are computed from the specific sets of run-time parameters.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125917529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of gateway system between different signalling protocols of the multimedia session on the Internet","authors":"K. Takei, K. Okamura, K. Araki","doi":"10.1109/ICOIN.2001.905443","DOIUrl":"https://doi.org/10.1109/ICOIN.2001.905443","url":null,"abstract":"We present the functions of the general multimedia session. We consider the mapping of the fundamental functions for the multimedia session of ITU-T H.323 Recommendation and SIP (Session Initiation Protocol), which are the major signalling protocols of the multimedia session. We also consider the behavior of specific functions of each protocol, and design the gateway which provides the interconnection between these protocols, and then we discuss the applied operation of the gateway in the multipoint conference using these two protocols.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of AF and EF services interaction","authors":"T. Yang, Zhao Chen, D. Makrakis, A. Hafid","doi":"10.1109/ICOIN.2001.905470","DOIUrl":"https://doi.org/10.1109/ICOIN.2001.905470","url":null,"abstract":"Assured forwarding (AF) service allows the Internet service provider (ISP) to offer different levels of forwarding assurances to IP packets received from a customer. However, in a basic AF service-capable network, it is not possible to guarantee low latency and low jitter to IP packets. To support the transport of video/audio traffic with acceptable delay and jitter, the AF service is not sufficient. To rectify this, the Internet Engineering Task Force (IETF) has proposed the expedited forwarding (EF) service for the support of latency and jitter sensitive traffic. We examine the possibility of using AF service-capable networks to support the EF service. The implication of a positive answer to this question is that it will be possible to use AF service-capable networks to provide low delay and low delay jitter guarantees to video/audio-like traffic. We also analyze the impact of the EF service traffic on AF and best-effort traffic.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129325721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graphical techniques in intrusion detection systems","authors":"Boaz Gelbord","doi":"10.1109/ICOIN.2001.905436","DOIUrl":"https://doi.org/10.1109/ICOIN.2001.905436","url":null,"abstract":"As coordinated attacks on networks become more frequent, the study of systems that can identify unlawful attempts to penetrate a network, or so called intrusion detection systems (IDS), has become increasingly popular. IDS traditionally suffer from an inability to detect an attack that is built from a sequence of valid network activity. For this reason it is important to develop a system capable of analyzing the global nature of the network activity. One such system is GrIDS-a graph based intrusion detection system for large networks, being developed at the University of California, Davis, California. This system constructs graphs based on the network activity and then detects attacks based on an analysis of the characteristics of these graphs. One of the bottlenecks in this process is the inability to efficiently compare characteristics of very large networks. This often becomes necessary because the increasing complex nature of network traffic generates graphs with multiple nodes and edges. We propose using a new result on subgraph isomorphism due to Eppstein (see Journal of Graph Algorithms and Applications, vol.3, no.3, p.1-27, 1999) to maximize the efficiency of this analysis. This provides the IDS with the ability to analyze traffic on a broader level and thus increases the overall performance of the system.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130943738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. He, Zixue Cheng, Tongjun Huang, Ryouhei Nakatani, Yuichi Amadatsu, A. Koyama, Yue Zhao, S. Noguchi
{"title":"Design of a real-time interactive tele-exercise classroom for computer exercises over a Gigabit Network","authors":"A. He, Zixue Cheng, Tongjun Huang, Ryouhei Nakatani, Yuichi Amadatsu, A. Koyama, Yue Zhao, S. Noguchi","doi":"10.1109/ICOIN.2001.905564","DOIUrl":"https://doi.org/10.1109/ICOIN.2001.905564","url":null,"abstract":"This paper proposes a tele-exercise classroom for computer exercises over the Japan Gigabit Network. The requirements for constructing the tele-exercise classroom be discussed. The main features of the classroom are (1) a teacher can monitor a strident's operations, (2) give instructions to the student, (3) show a demonstration to the student. Besides, exercise materials and/or problems happening during the exercise class can be presented by using a synchronous/asynchronous white board, and discussions between the teacher and a student (students) can be carried out through interactive real-time video/audio. We present a systems model which shows the configuration of the system, user computer terminal types, system modes, and action modes. In addition, the extendibility of the system is considered in the model.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128890460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The performance of QoS-aware IP multicast routing protocols","authors":"Chih-Jen Tseng, Chyouhwa Chen","doi":"10.1109/ICOIN.2001.905426","DOIUrl":"https://doi.org/10.1109/ICOIN.2001.905426","url":null,"abstract":"Much research has been done on supporting real-time IP multicast applications with dynamic group member joining and QoS requirements. Various existing greedy QoS-aware routing protocols, such as YAM and QoSMIC have been shown to outperform shortest-path heuristics, such as PIM and DVMRP. However they still suffer from the problem of poor scalability resulting from high control overhead, un-robustness for centralized group manager, and longer than necessary join latency. In addition, most existing dynamic join protocols perform best when group members are either densely populated or sparsely populated, but not both. In this paper, we introduce a distributed candidates selection protocol, named DSDMR, that is capable of self-adaptation depending on sensed group densities by ways of an adaptive two-direction join mechanism. We evaluate our scheme using extensive simulations and found that DSDMR can create low cost tree close to optimal greedy strategy with very low control overhead and join latency.","PeriodicalId":332734,"journal":{"name":"Proceedings 15th International Conference on Information Networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}