32nd IEEE Conference on Local Computer Networks (LCN 2007)最新文献

筛选
英文 中文
Improving the Bandwidth Sharing in IEEE 802.11 改进IEEE 802.11的带宽共享
32nd IEEE Conference on Local Computer Networks (LCN 2007) Pub Date : 2007-10-15 DOI: 10.1109/LCN.2007.125
Yassine Chetoui, N. Bouabdallah, J. Ben-othman
{"title":"Improving the Bandwidth Sharing in IEEE 802.11","authors":"Yassine Chetoui, N. Bouabdallah, J. Ben-othman","doi":"10.1109/LCN.2007.125","DOIUrl":"https://doi.org/10.1109/LCN.2007.125","url":null,"abstract":"In this paper, we propose a new solution to cope with the unfairness limitations of the distributed coordination function (DCF) algorithm. Our solution is based on multiple backoff windows principle. We demonstrate through simulations the efficiency of our proposal that enables fair bandwidth sharing and increase total network throughput.","PeriodicalId":333233,"journal":{"name":"32nd IEEE Conference on Local Computer Networks (LCN 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115674246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Real-Time Communication in IEEE 802.11 Networks: Timing Analysis and a Ring Management Scheme for the VTP-CSMA Architecture IEEE 802.11网络中的实时通信:VTP-CSMA架构的时序分析和环管理方案
32nd IEEE Conference on Local Computer Networks (LCN 2007) Pub Date : 2007-10-15 DOI: 10.1109/LCN.2007.74
R. Moraes, P. Portugal, S. Vitturi, F. Vasques, P. Souto
{"title":"Real-Time Communication in IEEE 802.11 Networks: Timing Analysis and a Ring Management Scheme for the VTP-CSMA Architecture","authors":"R. Moraes, P. Portugal, S. Vitturi, F. Vasques, P. Souto","doi":"10.1109/LCN.2007.74","DOIUrl":"https://doi.org/10.1109/LCN.2007.74","url":null,"abstract":"Keeping up with the timing constraints of real-time traffic in wireless environments is a hard task. One of the reasons is that the real-time stations have to share the same communication medium with stations that are out of the sphere-of control of the real-time architecture. That is, with stations that generate timing unconstrained traffic. The VTP-CSMA architecture targets this problem in IEEE 802.11 wireless networks. It is based on a Virtual Token Passing procedure (VTP) that circulates a virtual token among real-time stations, enabling the coexistence of real-time and non realtime stations in a shared communication environment. The worst-case timing analysis of the VTP-CSMA mechanism shows that the token rotation time is upper-bounded, even when the communication medium is shared with timing unconstrained stations. Additionally, the simulation analysis shows that the token rotation mechanism behaves adequately, even in the presence of error-prone communication channels. Therefore, the VTP-CSMA architecture enables the support of real-time communication in shared communication environments, without the need to control the timing behavior of every communicating device. A ring management procedure for the VTP-CSMA architecture is also proposed, allowing real-time stations to adequately join/leave the virtual ring. This ring management procedure is mandatory for dynamic operating scenarios, such as those found in VoIP applications.","PeriodicalId":333233,"journal":{"name":"32nd IEEE Conference on Local Computer Networks (LCN 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114484930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Bloom Filters: One Size Fits All? 布隆滤镜:一刀切?
32nd IEEE Conference on Local Computer Networks (LCN 2007) Pub Date : 2007-10-15 DOI: 10.1109/LCN.2007.17
P. Hurley, M. Waldvogel
{"title":"Bloom Filters: One Size Fits All?","authors":"P. Hurley, M. Waldvogel","doi":"10.1109/LCN.2007.17","DOIUrl":"https://doi.org/10.1109/LCN.2007.17","url":null,"abstract":"Bloom filters impress by their sheer elegance and have become a widely and, perhaps, indiscriminately used tool in network applications, although, as we show, their performance can often be far from optimal. Notably in application areas where false negatives are tolerable, other techniques can clearly be better. We show that, at least for a specific area in the parameter space, Bloom filters are significantly outperformed even by a simple scheme. We show that many application areas where Bloom filters are deployed do not require the strong policy of no false negatives and sometimes even prefer false negatives. We analyze, through modelling, how far Bloom filters are from the optimal and then examine application specific issues in a distributed web caching scenario. We hope to open up and seed discussion towards domain-specific alternatives to Bloom filters while perhaps sparking ideas for a general-purpose alternative.","PeriodicalId":333233,"journal":{"name":"32nd IEEE Conference on Local Computer Networks (LCN 2007)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123397400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing Heterogeneous Access Networks Coordinated policy based decision engines for mobility management 异构接入网络的管理。基于策略的移动性管理决策引擎
32nd IEEE Conference on Local Computer Networks (LCN 2007) Pub Date : 2007-10-15 DOI: 10.1109/LCN.2007.115
C. Fan, M. Schläger, A. Udugama, Varaporn Pangboonyanon, A. C. Toker, Gökhan Coskun
{"title":"Managing Heterogeneous Access Networks Coordinated policy based decision engines for mobility management","authors":"C. Fan, M. Schläger, A. Udugama, Varaporn Pangboonyanon, A. C. Toker, Gökhan Coskun","doi":"10.1109/LCN.2007.115","DOIUrl":"https://doi.org/10.1109/LCN.2007.115","url":null,"abstract":"Next generation networks will consist of heterogeneous access networks and will provide a variety of services. In such an environment the question of the assignment of terminals to access networks and mobility management becomes a challenging problem. This is especially true when one takes the user goals and network operator goals into account. Users would like to be connected to their services over the best available access technology, where the users should be able to define what \"best\" means for themselves, in other terms users want to be Always-Best-Connected (ABC). The network operator has to satisfy ABC property for users who are essentially competing for resources and has to maintain the best possible utility out of its investment. This can be coined as Always-Best-Managed (ABM) networks. Taking into account that what best means for different users will be different in practice that it will not be possible to fulfill the requirements of each of the users simultaneously, and that the network itself is dynamic in nature, one can imagine the difficulty of achieving ABC and ABM continuously and simultaneously. In this paper we introduce a new approach to policy based mobility management based on two coordinated decision engines, one residing in the terminal and one in the network. We describe our architecture enabling network controlled policy based mobility management and discuss first results observed with our prototype implementation of this architecture.","PeriodicalId":333233,"journal":{"name":"32nd IEEE Conference on Local Computer Networks (LCN 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122044924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Discovering Network Topology of Large Multisubnet Ethernet Networks 发现大型多子网以太网的网络拓扑
32nd IEEE Conference on Local Computer Networks (LCN 2007) Pub Date : 2007-10-15 DOI: 10.1109/LCN.2007.25
Hassan Gobjuka, Y. Breitbart
{"title":"Discovering Network Topology of Large Multisubnet Ethernet Networks","authors":"Hassan Gobjuka, Y. Breitbart","doi":"10.1109/LCN.2007.25","DOIUrl":"https://doi.org/10.1109/LCN.2007.25","url":null,"abstract":"In this paper we investigate the problem of finding the physical layer network topology of large, heterogeneous multisubnet Ethernet networks that may include uncooperative network elements. Our approach utilizes only generic MIB information and does not require any hardware or software modifications of the underlying network elements. We propose here the first O(n3) algorithm that guarantees discovering a topology that is compatible with the given set of input MIBs, provided that the input is complete. We prove the correctness of the algorithms and the necessary and sufficient conditions for the uniqueness of the restored topology. Finally, we demonstrate the application of the algorithm on several examples.","PeriodicalId":333233,"journal":{"name":"32nd IEEE Conference on Local Computer Networks (LCN 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124052372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Simulation Study of Multi-Color Marking of TCP Aggregates TCP聚合体多色标记的仿真研究
32nd IEEE Conference on Local Computer Networks (LCN 2007) Pub Date : 2007-10-15 DOI: 10.1109/LCN.2007.43
M. Allalouf, Y. Shavitt
{"title":"A Simulation Study of Multi-Color Marking of TCP Aggregates","authors":"M. Allalouf, Y. Shavitt","doi":"10.1109/LCN.2007.43","DOIUrl":"https://doi.org/10.1109/LCN.2007.43","url":null,"abstract":"Service level agreements (SLAs) are contracts signed between a provider and a customer to govern the amount of traffic that will be serviced. This work pinpoints an important problem faced by the Internet service provider (ISP) which is to be able to differentiate between the services given to aggregates of multiple TCP connections. The metro-Ethernet access network, the differentiated services (DiffServ) architecture and the ATM reference model are three architectural models where edge routers perform traffic metering and coloring of aggregated flows according to the SLA. Finer color marking was suggested to improve differentiation quality. We observe that increasing the number of colors indeed provides a good differentiation between the aggregates according to the committed and the excess rates. We also show that the token bucket coloring policies, which are widely used for this purpose, prefer short packets and mark them with higher priority colors. The differentiation process is more difficult for the short TCP connections that remain in the slow start phase, than for the long connections that are usually in the congestion avoidance phase.","PeriodicalId":333233,"journal":{"name":"32nd IEEE Conference on Local Computer Networks (LCN 2007)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124613150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol 电话网关注册协议的建模与性能分析
32nd IEEE Conference on Local Computer Networks (LCN 2007) Pub Date : 2007-10-15 DOI: 10.1109/LCN.2007.99
K. Kumaran, A. Sahoo
{"title":"Modeling and Performance Analysis of Telephony Gateway REgistration Protocol","authors":"K. Kumaran, A. Sahoo","doi":"10.1109/LCN.2007.99","DOIUrl":"https://doi.org/10.1109/LCN.2007.99","url":null,"abstract":"Telephony gateways are devices that interface between IP telephony networks and the PSTN. A telephony proxy or location server (LS) that attempts to connect a call for an end user may need to choose between multiple candidate gateways. Gateways need to send updates of their dynamic resource information periodically to the LS which is used by LS while choosing a gateway. Telephony gateway registration protocol (TGREP) is an IETF proposed standard used by gateways for this purpose. To the best of our knowledge, there is no study done on the performance of TGREP and we believe that this is the first paper on performance modeling of TGREP system. In this paper, we propose an analytical model for TGREP system and then use the model to evaluate different gateway selection algorithms proposed by us in this paper. We validate our model using simulation results. We also present an adaptive update mechanism in which the overhead of sending dynamic resource information is reduced without significant effect on call blocking probability. We outline a few important conclusions from this study that are quite contrary to what IP telephony providers might resort to while deploying TGREP.","PeriodicalId":333233,"journal":{"name":"32nd IEEE Conference on Local Computer Networks (LCN 2007)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130617206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Node Connectivity in Vehicular Ad Hoc Networks with Structured Mobility 具有结构化移动性的车辆自组织网络中的节点连接
32nd IEEE Conference on Local Computer Networks (LCN 2007) Pub Date : 2007-10-15 DOI: 10.1109/LCN.2007.22
I. W. Ho, K. Leung, J. Polak, R. Mangharam
{"title":"Node Connectivity in Vehicular Ad Hoc Networks with Structured Mobility","authors":"I. W. Ho, K. Leung, J. Polak, R. Mangharam","doi":"10.1109/LCN.2007.22","DOIUrl":"https://doi.org/10.1109/LCN.2007.22","url":null,"abstract":"Vehicular Ad hoc NETworks (VANETs) is a subclass of Mobile Ad hoc NETworks (MANETs). However, automotive ad hoc networks will behave in fundamentally different ways than the predominated models in MANET research. Driver behaviour, mobility constraints and high speeds create unique characteristics in the network. All of these constraints have implications on the VANET architecture at the physical, link, network, and application layers. To facilitate the cross-layer designs for VANETs, understanding of the relationship between mobility and network connectivity is of paramount importance. In this paper, we focus on studying transport systems with structured mobility (e.g., bus systems), which have unique characteristics on the road such as fixed routes that have never been explored in previous work. The main contributions of this paper are three-fold: 1) we provide an analytical framework including the design requirements of the mobility model for realistic vehicular network studies, and metrics for evaluating node connectivity in vehicular networks; 2) we demonstrate, through simulation, the impacts of marco- and micro-mobility models, and various transport elements on network connectivity; and 3) we show that multi-hop paths perform dramatically poorer than single-hop links in vehicular networks. Specifically, two- hop and three-hop (communication) paths can only respectively achieve less than 27% and 13% of the average duration of single-hop links. Such kind of knowledge of the performance of multi-hop transmission will be significant for the studies of routing algorithm and other networking functions in vehicular networks.","PeriodicalId":333233,"journal":{"name":"32nd IEEE Conference on Local Computer Networks (LCN 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132470159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Packet Filtering Based on Source Router Marking and Hop-Count 基于源路由器标记和跳数的包过滤
32nd IEEE Conference on Local Computer Networks (LCN 2007) Pub Date : 2007-10-15 DOI: 10.1109/LCN.2007.128
Kashif Ali, Mohammad Zulkernine, H. Hassanein
{"title":"Packet Filtering Based on Source Router Marking and Hop-Count","authors":"Kashif Ali, Mohammad Zulkernine, H. Hassanein","doi":"10.1109/LCN.2007.128","DOIUrl":"https://doi.org/10.1109/LCN.2007.128","url":null,"abstract":"Denial of service (DoS) attacks impose an increasingly growing threat to the Internet These attacks result in wastage of scarce Internet resources and service disruptions. Existing packet filtering schemes are deployable at either source, intermediate or victim networks. In this paper, we propose a hybrid of the source and the victim networks-based packet filtering approach, source router marking and hop-count (SRHC), to detect and filter high-rate traffic flows and IP-spoofing attacks. Packets are marked at the source network based on their arrival rate threshold. At a victim network, the spoofed packets are marked based on the IP source arrival rate using their respective TTL value. Both source and victim networks collaborate to filter high-rate and IP-spoofing attacks. The ns-2 simulator is used to generate attack scenarios. Our simulation results show that the SRHC scheme effectively filters out high-rate and IP-spoofing attack packets, with minimal collateral damage.","PeriodicalId":333233,"journal":{"name":"32nd IEEE Conference on Local Computer Networks (LCN 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132997588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards Stateless Single-Packet IP Traceback 迈向无状态单包IP回溯
32nd IEEE Conference on Local Computer Networks (LCN 2007) Pub Date : 2007-10-15 DOI: 10.1109/LCN.2007.15
R. Laufer, P. B. Velloso, D. Cunha, I. Moraes, M. Bicudo, M. D. D. Moreira, O. Duarte
{"title":"Towards Stateless Single-Packet IP Traceback","authors":"R. Laufer, P. B. Velloso, D. Cunha, I. Moraes, M. Bicudo, M. D. D. Moreira, O. Duarte","doi":"10.1109/LCN.2007.15","DOIUrl":"https://doi.org/10.1109/LCN.2007.15","url":null,"abstract":"The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes is IP traceback. In this paper, we introduce and analyze a lightweight single-packet IP traceback system that does not store any data in the network core. The proposed system relies on a novel data structure called Generalized Bloom Filter, which is tamper resistant. In addition, an efficient improved path reconstruction procedure is introduced and evaluated. Analytical and simulation results are presented to show the effectiveness of the proposed scheme. The simulations are performed in an Internet-based scenario and the results show that the proposed system locates the real attack path with high accuracy.","PeriodicalId":333233,"journal":{"name":"32nd IEEE Conference on Local Computer Networks (LCN 2007)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114072917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信