29th Annual IEEE International Conference on Local Computer Networks最新文献

筛选
英文 中文
An evaluation of the Myrinet/GM2 two-port networks 对Myrinet/GM2双端口网络的评估
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.20
R. Zamani, Y. Qian, A. Afsahi
{"title":"An evaluation of the Myrinet/GM2 two-port networks","authors":"R. Zamani, Y. Qian, A. Afsahi","doi":"10.1109/LCN.2004.20","DOIUrl":"https://doi.org/10.1109/LCN.2004.20","url":null,"abstract":"It is important to systematically assess the features and performance of the new interconnects for high performance clusters. This work presents the performance of the two-port Myrinet networks at the GM2 and MPI layers using a complete set of microbenchmarks. We also present the communication characteristics and the performance of the NAS multi-zone benchmarks and SMG2000 application under the MPI and MPI-OpenMP programming paradigms. We found that the host overhead is very small in our cluster, and the Myrinet is sensitive to the buffer reuse patterns. Our applications achieved a better performance for MPI than the mixed-mode. All the applications studied use only nonblocking communications, thus are able to overlap their communications with the computations. Our experiments show that the two-port communication at the GM and MPI levels (except for the RDMA read, and overlap) outperforms the one-port communication for the bandwidth. However, this did not translate into a considerable improvement at least for our applications.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130200228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A parallel IP-address forwarding approach based on partitioned lookup table techniques 一种基于分区查找表技术的并行ip地址转发方法
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.7
Yiluo Song, E. Aboelela
{"title":"A parallel IP-address forwarding approach based on partitioned lookup table techniques","authors":"Yiluo Song, E. Aboelela","doi":"10.1109/LCN.2004.7","DOIUrl":"https://doi.org/10.1109/LCN.2004.7","url":null,"abstract":"As traffic on the Internet has increased exponentially, it is vital that Internet routers handle the received packets faster. When a router receives a packet, it has to make a decision where to send it next. To forward an IP packet, the routers need to lookup the destination address of the received packet in the forwarding table, implement forwarding algorithms, then forward the packet to the appropriate next hop or outgoing port. We discuss a parallel approach that combines an IP packet forwarding technique based on a partitioned lookup table with linear search on prefix lengths, binary search on prefix lengths, and LC (level-compressed) trie. Simulation results show that the proposed partition schemes speeds up the IP address lookup process.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125265325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SPIE-IPv6: single IPv6 packet traceback SPIE-IPv6:单IPv6报文回溯
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.118
W. Strayer, C. Jones, F. Tchakountio, R. Hain
{"title":"SPIE-IPv6: single IPv6 packet traceback","authors":"W. Strayer, C. Jones, F. Tchakountio, R. Hain","doi":"10.1109/LCN.2004.118","DOIUrl":"https://doi.org/10.1109/LCN.2004.118","url":null,"abstract":"The source path isolation engine (SPIE), developed at BBN, provides accurate tracing of single IP packets through a network. The SPIE system calculates several small hash values for each packet as it traverses a router, then stores these values in a data structure called a Bloom filter. Given a packet and an approximate time that packet was in the network, the SPIE system queries routers along the potential reverse path; a packet was \"seen\" at a router if the Bloom filter has stored the packet's hash values. The SPIE system has been proven to work effectively and efficiently for IP version 4, largely because an IPv4 packet has sufficient entropy in the first 28 bytes to allow the hash functions to \"uniquely\" identify each packet. We extend the traceback architecture to IP version 6, with the interesting result that the packet structure of IPv6 does not provide as much entropy in the field values as IPv4.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128298264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Design and performance evaluation of a new spatial reuse FireWire protocol 一种新的空间复用火线协议的设计与性能评价
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.43
V. Chandramohan, Kenneth J. Christensen
{"title":"Design and performance evaluation of a new spatial reuse FireWire protocol","authors":"V. Chandramohan, Kenneth J. Christensen","doi":"10.1109/LCN.2004.43","DOIUrl":"https://doi.org/10.1109/LCN.2004.43","url":null,"abstract":"Building large-scale video surveillance systems is of importance to national security. To support economical installation of video cameras, there is a need for new shared-medium protocols. This paper describes the new spatial reuse FireWire protocol (SFP). SFP is a bus arbitration protocol for an acyclic daisy-chained network topology. SFP is an extension of IEEE 1394b FireWire. SFP preserves the simple repeat path functionality of FireWire while offering two significant advantages: (1) SFP supports spatial reuse of bandwidth in order to increase effective throughput; and (2) SFP provides support for priority traffic to be able to support real-time applications (e.g., video) and data traffic. Simulation results show that for a uniform traffic pattern, SFP improves upon the throughput of IEEE 1394b by a factor of 1.7. For a traffic pattern typical of video surveillance applications, throughput increases by a factor of 6.8.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127785782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CineMA: cooperation enhancement in MANETs 电影:加强在移动网络领域的合作
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.33
M. Frank, P. Martini, M. Plaggemeier
{"title":"CineMA: cooperation enhancement in MANETs","authors":"M. Frank, P. Martini, M. Plaggemeier","doi":"10.1109/LCN.2004.33","DOIUrl":"https://doi.org/10.1109/LCN.2004.33","url":null,"abstract":"Mobile ad hoc networks are based on the assumption that all participants of the network cooperate and forward packets towards destinations. Unfortunately, there are no mechanisms to enforce cooperation. Thus, altruism and trust are two of the most important characteristics in mobile ad hoc networks. However what happens if there are selfish or even malicious nodes? Those nodes do not forward all packets to the next station. If the fraction of misleading nodes becomes too big, the throughput decreases significantly. This paper presents CineMA, a group based approach to improve the cooperation in mobile ad hoc networks.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121350811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Supporting MAC layer multicast in IEEE 802.11 based MANETs: issues and solutions 在基于IEEE 802.11的manet中支持MAC层组播:问题和解决方案
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.119
Hrishikesh Gossain, N. Nandiraju, K. Anand, D. Agrawal
{"title":"Supporting MAC layer multicast in IEEE 802.11 based MANETs: issues and solutions","authors":"Hrishikesh Gossain, N. Nandiraju, K. Anand, D. Agrawal","doi":"10.1109/LCN.2004.119","DOIUrl":"https://doi.org/10.1109/LCN.2004.119","url":null,"abstract":"In IEEE 802.11 based mobile ad hoc networks (MANET) multicast packets are generally forwarded as one hop broadcast; mainly to reach all the multicast members in the neighborhood in a single transmission. Because of the broadcast property of the forwarding, packets suffer from increased instances of the hidden terminal problem. Mobility of nodes makes things more difficult, and unlike unicast transmissions where MAC can detect the movement of a nexthop by making several retries, it is not possible in case of multicast forwarding. To address these issues, we propose a multicast aware MAC protocol (MMP) for MANET. The basic objective of MMP is to provide a MAC layer support for multicast traffic. This is done by attaching an extended multicast header (EMH) by the multicast agent, which provides the address of the nexthop nodes that are supposed to receive the multicast packet. The MAC layer in MMP uses the EMH field to support an ACK based data delivery. After sending the data packet, the transmitter waits for the ACK from each of its destinations in a strictly sequential order. A retransmission of the multicast packet is performed only if the ACK from any of the nodes in EMH is missing. We compare MMP with IEEE 802.11 and results show that MMP substantially improves the performance of multicast packet delivery in MANET without creating much MAC overhead. In addition, MMP provides a better mechanism to detect the movement of its nexthop members.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116117612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
An efficient pseudo random number generator for low-power sensor networks [wireless networks] 一种用于低功耗传感器网络的高效伪随机数生成器[无线网络]
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.18
D. Seetharam, S. Rhee
{"title":"An efficient pseudo random number generator for low-power sensor networks [wireless networks]","authors":"D. Seetharam, S. Rhee","doi":"10.1109/LCN.2004.18","DOIUrl":"https://doi.org/10.1109/LCN.2004.18","url":null,"abstract":"We have designed an ultra-low power sensor networking platform called the i-bean network. The i-bean network requires a reliable RNG (random number generator) for various purposes such as random backoffs, random transmission delays and random packet sequence numbers. We could not use the existing RNGs because they require special purpose hardware and/or involve complex computations. We have designed a simple PRNG based on a free-running timer. Although this PRNG was specifically designed for the i-bean network, it could be used in other low-power embedded networks.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126232086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Multilevel hierarchical mobility management scheme in complicated structured networks 复杂结构网络中的多层次移动性管理方案
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.83
K. Kawano, K. Kinoshita, K. Murakami
{"title":"Multilevel hierarchical mobility management scheme in complicated structured networks","authors":"K. Kawano, K. Kinoshita, K. Murakami","doi":"10.1109/LCN.2004.83","DOIUrl":"https://doi.org/10.1109/LCN.2004.83","url":null,"abstract":"Micromobility management is a key issue for achieving enhanced mobile Internet services. Many micromobility management schemes supporting fast handover, e.g., Hierarchical Mobile IPv6 (HMIPv6), have been proposed to minimize the packet loss during handover and the handover latency. We have previously proposed a multilevel hierarchical mobility management scheme that enhances HMIPv6 mobility management. Our scheme manages the micromobility of a mobile terminal (MT) using a mobility management router (the mobility anchor point, or MAP), with a management domain matched to the MT's mobility. This usage of MAP aims to efficiently decentralize the load of mobility management. In our previous work, we have confirmed the effectiveness of our scheme in a network having a simple tree-based hierarchy. The actual networks, however, have some local variation and/or some redundancy in structure. In such a complicated structured network, the MAP domains intricately overlap each other. This causes difficulty in selecting the MAP suitable for managing the MT mobility because the suitable MAP for an MT changes according to the complicated local conditions. This paper proposes a method to allow an MT to select the suitable MAP for the MT in such a network by adjusting the selection criteria individually configured for use at a particular place. Finally, the performance of our scheme is evaluated using simulation experiments. The simulation results show that our scheme works well in complicated structured networks by using the proposed additional method.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122323345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Access delay analysis in reservation multiple access protocols for broadband local and cellular network 宽带局部网和蜂窝网预留多址协议的接入延迟分析
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.11
A. Doha, H. Hassanein
{"title":"Access delay analysis in reservation multiple access protocols for broadband local and cellular network","authors":"A. Doha, H. Hassanein","doi":"10.1109/LCN.2004.11","DOIUrl":"https://doi.org/10.1109/LCN.2004.11","url":null,"abstract":"This work analyzes reservation request access delay in reservation multiple access protocols in light of frame contention slot allocation. Variations of the reservation MAC protocol are widely used in local and cellular network technologies. We derive an analytical model for access delay of reservation request packets that reflects the impact of per-frame number of contention slots on access delay of a request packet. We obtain insightful observations on this relation and as a result show that a new family of delay and throughput constrained dynamic contention slot allocation schemes can be developed.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SWAN: a secure wireless LAN architecture SWAN:一种安全的无线局域网架构
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.120
M. Virendra, S. Upadhyaya
{"title":"SWAN: a secure wireless LAN architecture","authors":"M. Virendra, S. Upadhyaya","doi":"10.1109/LCN.2004.120","DOIUrl":"https://doi.org/10.1109/LCN.2004.120","url":null,"abstract":"Existing wireless LAN (WLAN) security schemes are few and product specific. While there exist some schemes for information integrity related problems, there are few standard solutions for quality of service and network health maintenance related problems in wireless networks. In this paper we propose an architecture model for secure WLAN that is generic in its design, so that it can easily be incorporated into existing systems at low cost, thus making it feasible and easy to implement. Our secure wireless LAN (SWAN) architecture first describes an admission control mechanism and deals with intrusion detection, malicious behavior detection, and maintaining quality of service and network health. We then introduce a novel infrastructure for an ad-hoc migration scheme (IAMS) to deal with denial of service (DOS) attacks on WLAN, and describe a unique traffic distribution protocol (TDP) for routing traffic when an access point is under attack, thus ensuring network survivability in the case of a DOS attack. We simulate the IAMS and the TDP using the network simulator GloMoSim.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132972033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信