29th Annual IEEE International Conference on Local Computer Networks最新文献

筛选
英文 中文
Hierarchical policy based management architecture to support the deployment and the discovery of services in ubiquitous networks 基于分层策略的管理体系结构,支持无处不在的网络中服务的部署和发现
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.62
S. Ghamri-Doudane, N. Agoulmine
{"title":"Hierarchical policy based management architecture to support the deployment and the discovery of services in ubiquitous networks","authors":"S. Ghamri-Doudane, N. Agoulmine","doi":"10.1109/LCN.2004.62","DOIUrl":"https://doi.org/10.1109/LCN.2004.62","url":null,"abstract":"The most important issue in ubiquitous networks is to provide an efficient framework where services can be defined, managed and usage controlled. This work proposes a policy based management architecture as well as a new service discovery protocol called COPSSD which provides the necessary functional components to deploy and control ubiquitous services in the IT world.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124856234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Unifying micro sensor networks with the Internet via overlay networking [wireless networks] 通过覆盖网络(无线网络)将微传感器网络与互联网统一起来
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.131
Hui Dai, Richard Han
{"title":"Unifying micro sensor networks with the Internet via overlay networking [wireless networks]","authors":"Hui Dai, Richard Han","doi":"10.1109/LCN.2004.131","DOIUrl":"https://doi.org/10.1109/LCN.2004.131","url":null,"abstract":"Today's architecture for interconnecting wireless sensor networks (WSNs) and the Internet is based on treating a WSN as a separate entity from the Internet. Our approach to unifying sensor networks with the Internet is instead to decouple the relationship between the API-enforced database view and the gateway, making the gateway more general by introducing application-level overlay networking into the gateway. In our approach, sensor network packets, rather than being stopped at the gateway, are instead encapsulated into IP packets, and then directed from the gateway to any number of interested applications and services residing remotely on the Internet.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"27 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123077374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
A novel data encryption algorithm based on wavelet filter banks and the singular value decomposition 基于小波滤波器组和奇异值分解的数据加密算法
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.6
Min-Sung Koh, E. Rodriguez-Marek
{"title":"A novel data encryption algorithm based on wavelet filter banks and the singular value decomposition","authors":"Min-Sung Koh, E. Rodriguez-Marek","doi":"10.1109/LCN.2004.6","DOIUrl":"https://doi.org/10.1109/LCN.2004.6","url":null,"abstract":"We present an algorithm which performs data encryption by serially concatenating two transform stages. The outer stage uses one of the orthogonal matrices obtained from the singular value decomposition (SVD) of an arbitrary signal, such as white noise or the sum of cosines of different frequencies. The inner stage of encryption uses a fast, parallelized wavelet filter bank using our previously presented algorithm (Koh, M.S. and Rodriguez-Marek, E., Proc. IEEE Int. Symp. on Sig. Process. and Inform., 2003). This algorithm is generalized for an arbitrary number of nodes and decomposition levels. Past algorithms based on the wavelet packet tree structure present a drawback for band-limited signals, because attackers can guess the approximate frequency bands of the wavelet decomposition. Our algorithm uses orthogonal matrices generated by the SVD, which spread the frequency content of the signal into the available spectrum when applied to the original vector. Furthermore, the algorithm is based on parallelized filter banks, which provide a flexible and highly adaptive structure for encryption and decryption.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123324438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation and application of available bandwidth estimation techniques to improve TCP performance 评估和应用可用带宽估计技术,以提高TCP性能
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.55
Y. Easwaran, M. Labrador
{"title":"Evaluation and application of available bandwidth estimation techniques to improve TCP performance","authors":"Y. Easwaran, M. Labrador","doi":"10.1109/LCN.2004.55","DOIUrl":"https://doi.org/10.1109/LCN.2004.55","url":null,"abstract":"Several tools are available to estimate the available bandwidth in an end-to-end path. They use either the packet gap model or the packet rate model whereby probe packets are sent and analyzed at the destination to infer the available bandwidth in the tight link. Available bandwidth estimations can be very useful in many different scenarios and applications. We use available bandwidth estimation techniques (ABET) for flow and congestion control in TCP. We first evaluate the performance of Pathload, IGI and pathChirp in terms of their accuracy, intrusiveness, and overhead. Using simulations, we perform a 2/sup k/ factorial design to analyze the importance of the packet size, number of trains, number of packets per train and frequency of run in these performance metrics. Then we utilize these results to embed the most appropriate tool with the best set of parameters in a modified version of TCP SACK to solve the \"blindness\" of TCP when changing its congestion window and threshold values. Our simulations show that, using the available bandwidth estimates provided by IGI instead of the \"by half\" reduction rule of TCP, the throughput of the proposed ABET-based TCP version is improved compared to the plain TCP SACK.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
GAKAP, multicast key agreement protocol for ad hoc networks based on group activity probability GAKAP是一种基于组活动概率的自组网多播密钥协议
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.59
A. Boumso, B. A. Bensaber, Ismaïl Biskri
{"title":"GAKAP, multicast key agreement protocol for ad hoc networks based on group activity probability","authors":"A. Boumso, B. A. Bensaber, Ismaïl Biskri","doi":"10.1109/LCN.2004.59","DOIUrl":"https://doi.org/10.1109/LCN.2004.59","url":null,"abstract":"We address the problem of multicast secure data over a multihop wireless ad hoc network. Many protocols that have been proposed are not really convenient for mobile ad hoc networks. We propose a group activity key agreement protocol (GAKAP) that aims to solve problems, such as mobility, unreliable links, and multihop communication cost, that are specific to ad hoc networks. The main idea is to focus on group dynamics and complete node mobility in the ad hoc environment to develop an adaptive protocol that is suitable for the network and group changes. Doing so, we extend and adapt the proposed tree based group Diffie-Hellman (TGDH) protocol to the pure mobile ad hoc network. We simulated our protocol over the Opnet environment under various mobility, group size, and group dynamic scenarios.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116399854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimizations of client's side communications in a distributed file system within a Myrinet cluster Myrinet集群中分布式文件系统客户端通信的优化
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.92
Brice Goglin, L. Prylli, Olivier Glück
{"title":"Optimizations of client's side communications in a distributed file system within a Myrinet cluster","authors":"Brice Goglin, L. Prylli, Olivier Glück","doi":"10.1109/LCN.2004.92","DOIUrl":"https://doi.org/10.1109/LCN.2004.92","url":null,"abstract":"High performance applications running on high-speed interconnects require both efficient communication between computing nodes and fast access to the storage system. Making the most of these networks to access remote files requires a good interaction between their highly specific software interface and the special requirements of distributed file systems. We show how non-buffered and buffered remote file access may be improved by modifying the network programming interface and firmware and by adding the required infrastructure in the operating system. Our modifications in Myrinet/GM show no performance penalty while the network usage in our ORFA (optimized remote file access) protocol is improved.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115794631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A novel carrier frequency tracking scheme for time domain differential OFDM 一种新的时域差分OFDM载波频率跟踪方案
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.5
Huilin Xu, Guo Wei, Jinkang Zhu
{"title":"A novel carrier frequency tracking scheme for time domain differential OFDM","authors":"Huilin Xu, Guo Wei, Jinkang Zhu","doi":"10.1109/LCN.2004.5","DOIUrl":"https://doi.org/10.1109/LCN.2004.5","url":null,"abstract":"We develop a novel scheme to track carrier frequency offset in time domain differential modulation and demodulation OFDM systems. Compared with existing methods, this scheme is more bandwidth efficient and easier to implement. Simulation results in the Rayleigh fading channel show that this frequency tracking scheme can work robustly under relatively low SNR conditions.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126383458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing the weak link between layer 2 and layer 3 in the Internet architecture 解决了Internet架构中第2层和第3层之间的薄弱环节
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.13
H. Altunbasak, S. Krasser, H. Owen, J. Sokol, J. Grimminger, Hans-Peter Huth
{"title":"Addressing the weak link between layer 2 and layer 3 in the Internet architecture","authors":"H. Altunbasak, S. Krasser, H. Owen, J. Sokol, J. Grimminger, Hans-Peter Huth","doi":"10.1109/LCN.2004.13","DOIUrl":"https://doi.org/10.1109/LCN.2004.13","url":null,"abstract":"With the rapid expansion and evolution of the Internet, the methodology of addressing in the data link layer and mapping between the network and data link layers has become inadequate to provide secure services in networks. In this paper, we examine the weak link between the network and data link layers in local area networks (LANs) with possible approaches to improve the network security.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
AUM - an IPv6 based approach for micromobility AUM——一种基于IPv6的微移动方法
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.26
Aurbind Sharma, A. Ananda
{"title":"AUM - an IPv6 based approach for micromobility","authors":"Aurbind Sharma, A. Ananda","doi":"10.1109/LCN.2004.26","DOIUrl":"https://doi.org/10.1109/LCN.2004.26","url":null,"abstract":"A number of micromobility protocols have been proposed in the recent past for IPv4 based networks. We present auto-update micromobility (AUM) - a novel approach for providing micromobility in IPv6 environments. The proposed scheme exploits the basic IPv6 feature of a hierarchical addressing structure for efficient location management and provides specialized mechanisms for seamless mobility support. AUM takes an end-to-end approach to micromobility rather than the proxy approach taken by current proposals. This results in much simplified routing and a scalable architecture.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Increasing the throughput of the HomePNA MAC protocol 提高了HomePNA MAC协议的吞吐量
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.67
Aurelio Amodei, L. Costa, O. Duarte
{"title":"Increasing the throughput of the HomePNA MAC protocol","authors":"Aurelio Amodei, L. Costa, O. Duarte","doi":"10.1109/LCN.2004.67","DOIUrl":"https://doi.org/10.1109/LCN.2004.67","url":null,"abstract":"The paper proposes a new mechanism to increase the HomePNA 2.0 MAC protocol throughput. First, we review the HomePNA (Home Phone-line Network Alliance) MAC protocol and its collision resolution mechanism. Then, we use simulations to evaluate the throughput of HomePNA using a module that we implemented in the ns-2 simulator We propose a priority aggregation mechanism that uses the eight HomePNA priority levels in a more efficient way. The simulation results show that the proposed mechanism is able to increase the throughput up to 44%. Moreover, our mechanism does not require modifying the HomePNA specification, and can be easily implemented as a new sublayer above the MAC sublayer.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134215165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书