{"title":"Implementation and evaluation of the robust high-quality video transfer system on the broadband Internet","authors":"T. Kondo, K. Nishimura, R. Aibara","doi":"10.1109/SAINT.2004.1266108","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266108","url":null,"abstract":"High-quality motion picture increases the Internet traffic because of the wide spread deployment of high-speed applications over the Internet. Nevertheless, since the Internet is a best effort network, it has no reliable end-to-end communication. FEC (forward error correction) can be used to repair the damage to communication quality due to packet loss. The growing requirement of FEC for high-quality video transmission is inevitable on broadband Internet. We have designed and implemented FEC, and integrated it to our developed video transfer system named \"mpeg2ts\". Our goal is to make it possible to deploy this system on the broadband Internet. However, the problem with constant redundancy of FEC is that weakness to fluctuation of network condition. To resolve this problem, in this paper, we design and evaluate an efficient FEC method for high-quality video transmission, and integrate it into a system to deploy it on the real broadband Internet. Moreover, transmission experiment demonstrates availability of developed system on the network.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130385709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ubiquitous services and networking: monitoring the real world","authors":"Kei Suzuki","doi":"10.1109/SAINT.2004.1266092","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266092","url":null,"abstract":"Sensor-Net is a sensing system using small wireless devices with sensors. Pouring real-time real-world phenomena into the worldwide IT network, it will be a new interface between that network and the real world. This paper introduces the concept of the Sensor-Net system.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130746488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Antonatos, K. Anagnostakis, E. Markatos, M. Polychronakis
{"title":"Performance analysis of content matching intrusion detection systems","authors":"S. Antonatos, K. Anagnostakis, E. Markatos, M. Polychronakis","doi":"10.1109/SAINT.2004.1266118","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266118","url":null,"abstract":"Although network intrusion detection systems (nIDS) are widely used, there is limited understanding of how these systems perform in different settings and how they should be evaluated. This paper examines how nIDS performance is affected by traffic characteristics, rulesets, string matching algorithms and processor architecture. The analysis presented in this paper shows that nIDS performance is very sensitive to these factors. Evaluating a nIDS therefore requires careful consideration of a fairly extensive set of scenarios. Our results also highlight potential dangers with the use of workloads based on combining widely-available packet header traces with synthetic packet content as well as with the use of synthetic rulesets.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131712444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolving the internet addressing architecture","authors":"J. Kempf","doi":"10.1109/SAINT.2004.1266085","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266085","url":null,"abstract":"This paper summarizes discussion from the open architecture meeting on the Internet addressing architecture held by the IAB at IETF 57 in July, 2003 [1].","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"81 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128098703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Inayat, R. Aibara, K. Nishimura, Takahiro Fujita, Kaori Maeda
{"title":"Realizing high mobility through an end-to-end network architecture with IP diversity support for real time Internet applications","authors":"R. Inayat, R. Aibara, K. Nishimura, Takahiro Fujita, Kaori Maeda","doi":"10.1109/SAINT.2004.1266122","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266122","url":null,"abstract":"This paper presents a mobile-controlled handoff with an end-to-end communication architecture that helps to provide high mobility without requiring any special service from the visiting networks. The handoff utilizes the IP diversity created by dual network interfaces at the mobile node and exploits the overlapping area between subnets. The end-to-end network architecture is particularly suitable for low bit rate delay sensitive real time applications, where payload tends to be short and packet header overhead is particularly significant. We describe the network architecture and show the mobility support by prototype implementation and its performance evaluation. We also develop an analytical model of handoff and compare the performance of handoff in proposed network architecture and mobile IPv6. Performance evaluation shows that the handoff quality not only depends on the location but also on the implementation design of the location database servers. We see significant latency improvement due to our implementation as compare to mobile IPv6.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127581982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad J. Rashti, H. Rabiee, A. Foroutan, Meisam Lavasani
{"title":"A multi-dimensional packet classifier for NP-based firewalls","authors":"Mohammad J. Rashti, H. Rabiee, A. Foroutan, Meisam Lavasani","doi":"10.1109/SAINT.2004.1266123","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266123","url":null,"abstract":"In this paper we present design and implementation of a new multi-dimensional packet classifier engine using network processor technology. Our classification algorithm is fast and is based on hierarchical trie search for multi-dimensional rules. Moreover, we propose a technique to optimize the memory usage of our classifier. We have used the Intel/spl reg/ IXP1200 network processor pipeline architecture for implementation of the classifier. The final system is targeted to be a fast firewall packet filtering engine that uses the filtering policies as its classification rules. Our experimental result shows that the packet classification throughput results for various distribution of packet sizes, is above 800Mbps.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kawarasaki, K. Ooto, T. Nakanishi, Hikaru Suzuki
{"title":"Metadata driven seamless content handover in ubiquitous environment","authors":"M. Kawarasaki, K. Ooto, T. Nakanishi, Hikaru Suzuki","doi":"10.1109/SAINT.2004.1266130","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266130","url":null,"abstract":"Seamless content handover across different terminal devices achieved by the association of metadata and network functions is discussed in terms of service, architecture and prototype system (MetaPORT). A network recognizes the context so that the content is automatically adapted to handovered terminal device. This is achieved by using TV-Anytime server-type broadcasting infrastructure as well as IETF presence management infrastructure as underlying capabilities. In order to deliver broadcast content over ubiquitous network, usage environment metadata (UEM) that describes terminal capabilities and presence is introduced and managed by UEM server, in addition to content metadata. The network recognizes terminal state and content at the same time to enable user-friendly content handover.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research directions for ubiquitous services","authors":"K. Yamazaki","doi":"10.1109/SAINT.2004.1266093","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266093","url":null,"abstract":"Summary form only given. This paper discusses the characteristics of ubiquitous services, their technical issues and research directions for the future.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114957053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Endpoint admission control enhanced systems for VoIP networks","authors":"Abdulkhalig A. Bilhaj, K. Mase","doi":"10.1109/SAINT.2004.1266126","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266126","url":null,"abstract":"This paper presents QoS control enhanced architecture for VoIP networks. In this architecture we use both the probe flow delay and average loss rate measurement systems. First we apply the probability-based EMBAC scheme on our delay system. Then we propose a new probability-based EMBAC with a severe congestion consideration scheme to improve the admission control scheme in both measurement systems. We compare the performance of the enhanced systems in terms of blocking probability under the same condition of achieving average packet loss rate no greater than the certain target by setting an appropriate admission threshold in each system under each scenario. In this study, it is shown through simulations that the enhanced systems proposed in this paper can be a powerful and reliable EMBAC tool for VoIP networks with minimum blocking probability and minimum average loss rates.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Twin Agents: network-assisted disconnected operation and distributed processing for mobile communication","authors":"D. Ochi, K. Yamazaki","doi":"10.1109/SAINT.2004.1266096","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266096","url":null,"abstract":"Mobile end nodes cannot achieve stable communication if they use the end-to-end communication model due to the instability of wireless links. Moreover, mobile nodes will always have lower performance than fixed nodes, so the mobile node user needs some assistants. Our solution is the Twin Agents architecture, a network-assisted distributed processing architecture for mobile nodes. Its main point is the establishment of a pair of agents, one runs on the mobile node, and the other is placed on a stable part of the network and acts as an alter ego of the mobile node. These agents support flexible and programmable disconnected operations, and offset the low performance of the mobile node and the wireless link. We also propose a programming model for applications that will run on Twin Agents.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130509371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}