29th Annual IEEE International Conference on Local Computer Networks最新文献

筛选
英文 中文
Simulation-based performance comparison of TCP-variants over Mobile IPv6-based mobility management schemes 基于仿真的基于移动ipv6的移动性管理方案的tcp变体性能比较
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.115
S. Jaiswal, Sukumar Nandi
{"title":"Simulation-based performance comparison of TCP-variants over Mobile IPv6-based mobility management schemes","authors":"S. Jaiswal, Sukumar Nandi","doi":"10.1109/LCN.2004.115","DOIUrl":"https://doi.org/10.1109/LCN.2004.115","url":null,"abstract":"There has been a recent trend towards an all-IP network as it provides for cost-savings together with an optimized network and ease of use. But IP was designed for wired networks and the wireless scenario was not envisioned. Owing to the explosive growth of wireless users and growing demand of wireless services, the Internet body, IETF, has developed mobility management schemes to enhance IPv6 in mobility scenarios for wireless subscribers. These IPv6-based mobility management schemes, like MIPv6, HMIPv6 and fast handovers, adversely affect the performance of transport protocols like TCP during handoff. We evaluate the impact of these schemes on TCP variants, which differ from each other with respect to the congestion control algorithms used. The simulation results show that improving handoff latency through the fast handover approach does not necessarily improve the performance of TCP variants, like TCP SACK, in terms of throughput and goodput.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Multi-server content distribution scheme using erasure codes 使用擦除码的多服务器内容分发方案
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.82
T. Fujie, K. Kuno, J. Takahashi, H. Tode, T. Masaki, K. Murakami
{"title":"Multi-server content distribution scheme using erasure codes","authors":"T. Fujie, K. Kuno, J. Takahashi, H. Tode, T. Masaki, K. Murakami","doi":"10.1109/LCN.2004.82","DOIUrl":"https://doi.org/10.1109/LCN.2004.82","url":null,"abstract":"We focus on content delivery services using erasure codes. By using erasure codes, reliable content distribution can be performed without multi-server scheduling. Thus, for the efficient use of network resources, we propose dynamic rate control adapting to the change of the network conditions for multi-server content distribution.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134579850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Consensus: a system study of monitoring applications for wireless sensor networks 共识:无线传感器网络监测应用的系统研究
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.37
A. D. Chowdhury, Shivashankar Balu
{"title":"Consensus: a system study of monitoring applications for wireless sensor networks","authors":"A. D. Chowdhury, Shivashankar Balu","doi":"10.1109/LCN.2004.37","DOIUrl":"https://doi.org/10.1109/LCN.2004.37","url":null,"abstract":"The ease of deployment and the low cost of static ad-hoc wireless sensor networks, make them an ideal infrastructure of choice for various monitoring applications. The flexibility of expressing meaningful queries in terms of user defined regions form an important goal of any such monitoring and query framework. Towards efficient implementation of that goal, we emphasize upon the need for supporting application-defined regions, in contrast to network driven automatic cluster-formations (either flat or hierarchical - which are typically query-agnostic).","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124827786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Human mobility in MANET disaster area simulation - a realistic approach MANET灾害区域模拟中的人员移动性——一种现实方法
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.64
N. Aschenbruck, M. Frank, P. Martini, J. Tölle
{"title":"Human mobility in MANET disaster area simulation - a realistic approach","authors":"N. Aschenbruck, M. Frank, P. Martini, J. Tölle","doi":"10.1109/LCN.2004.64","DOIUrl":"https://doi.org/10.1109/LCN.2004.64","url":null,"abstract":"Disaster areas have been figured out as a typical usage scenario for mobile wireless ad-hoc networks (MANETs). In contrast to this, there are no specific mobility or traffic models for MANETs. We present a realistic approach to realize mobility in disaster areas based on tactical issues of civil protection. The new model is analyzed and compared to Gauss-Markov and random waypoint mobility models. Furthermore, we present first simulation results. The mobility model analysis as well as the simulation are based on two real disasters that occurred in Germany in 1999 and 2001. We show that disaster area scenarios have specific characteristics. Thus, they should be considered in MANET performance evaluation.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114697481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Efficient hybrid multicast routing protocol for ad-hoc wireless networks ad-hoc无线网络的高效混合组播路由协议
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.47
J. Biswas, M. Barai, S. Nandy
{"title":"Efficient hybrid multicast routing protocol for ad-hoc wireless networks","authors":"J. Biswas, M. Barai, S. Nandy","doi":"10.1109/LCN.2004.47","DOIUrl":"https://doi.org/10.1109/LCN.2004.47","url":null,"abstract":"An ad hoc network is composed of mobile nodes without any infrastructure. Mobile nodes self organize themselves to form a network over radio links. The trend of applications of mobile ad hoc networks requires increased group oriented services. Hence multicast support is critical for ad hoc networks. As the number of participating nodes increase, scalability becomes an important issue. The on demand multicast routing protocol (ODMRP) provides high packet delivery ratio in presence of high mobility. But ODMRP suffers from higher control overhead as the network size and the number of source nodes increase. In this paper we present an efficient hybrid multicast routing protocol suitable for high mobility applications which addresses the scalability issue of the ODMRP protocol. This protocol separates out the data forwarding path from the join-query forwarding path. We incorporate a low overhead local clustering technique to classify all nodes into core and normal categories. When multicast routes to destination nodes are unavailable, join-query messages are sent to all nodes in the network and data packets are forwarded by the core nodes to the destination nodes using differential destination multicast. Through simulations we show that this protocol reduces control overhead and increases packet delivery ratio by 20-50% for different network scenarios.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Introducing a hybrid Fast and Hierarchical MIPv6 scheme in a UMTS-IP converged architecture 在UMTS-IP融合架构中引入快速和分层混合的MIPv6方案
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.68
L. Dimopoulou, G. Leoleis, I. Venieris
{"title":"Introducing a hybrid Fast and Hierarchical MIPv6 scheme in a UMTS-IP converged architecture","authors":"L. Dimopoulou, G. Leoleis, I. Venieris","doi":"10.1109/LCN.2004.68","DOIUrl":"https://doi.org/10.1109/LCN.2004.68","url":null,"abstract":"IP technology will play a key role in beyond 3G systems, which face the great challenge of integration so as to provide seamless services to users anywhere and anytime. Apart from its natural role as a unifier, IP also comprises the main drive for network evolution towards all-IP network infrastructures. In this regard, we exploit IP as an enabler for the evolution of the UMTS packet-switched core network, eliminating its duality at user and transport level. We focus on mobility management in the core network, which is handled by pure IP mechanisms, and on the support of fast handoff across UMTS access networks by means of a hybrid Fast and Hierarchical Mobile IPv6 (F/HMIPv6) proposal. Emphasis is also put on identifying the proper points of interaction between the F/HMIPv6 operation and the UMTS-specific serving radio network subsystem (SRNS) relocation procedure in order to provide a seamless handoff service to the user while not compromising the network's performance and scalability.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An adaptive distributed ID assignment scheme for CSMA/IC 一种CSMA/IC自适应分布式ID分配方案
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.16
Tiantong You, C. Yeh, H. Hassanein
{"title":"An adaptive distributed ID assignment scheme for CSMA/IC","authors":"Tiantong You, C. Yeh, H. Hassanein","doi":"10.1109/LCN.2004.16","DOIUrl":"https://doi.org/10.1109/LCN.2004.16","url":null,"abstract":"We investigate a new collision-free MAC protocol for ad hoc wireless networks, namely carrier sense media access/ID countdown (CSMA/IC), which can achieve 100% collision-free performance by solving both the \"hidden terminal\" and the concurrent sending problems. Furthermore, we propose an efficient ID assignment mechanism for CSMA/IC. With the new ID assignment mechanism, the length of the medium competition period before data transmission is greatly decreased. This further leads to an increase in network throughput, especially in high speed wireless networks.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124554039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identification of intrusion scenarios through classification, characterization and analysis of firewall events 通过对防火墙事件的分类、表征和分析,识别入侵场景
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.65
L. Gaspary, Cristina Melchiors, Fábio Elias Locatelli, F. Dillenburg
{"title":"Identification of intrusion scenarios through classification, characterization and analysis of firewall events","authors":"L. Gaspary, Cristina Melchiors, Fábio Elias Locatelli, F. Dillenburg","doi":"10.1109/LCN.2004.65","DOIUrl":"https://doi.org/10.1109/LCN.2004.65","url":null,"abstract":"The content analysis of firewall logs is essential (i) to quantify and identify accesses to external and private networks, (ii) to follow the historical growth of accesses volume and applications used, (iii) to debug problems on the configuration of filtering rules and (iv) to recognize suspicious event sequences that indicate strategies used by intruders in attempts to obtain non-authorized access to stations and services. The paper presents an approach to classify, characterize and analyze events generated by firewalls. The proposed approach explores the case-based reasoning technique to identify possible intrusion scenarios. The paper also describes the validation of our approach carried out based on real logs generated during one week by the university firewall.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134329816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel approach to quality of service in active networks 主动网络服务质量的一种新方法
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.4
David Fuin, Éric Garcia, H. Guyennet
{"title":"A novel approach to quality of service in active networks","authors":"David Fuin, Éric Garcia, H. Guyennet","doi":"10.1109/LCN.2004.4","DOIUrl":"https://doi.org/10.1109/LCN.2004.4","url":null,"abstract":"This work presents the two approaches usually chosen in order to obtain quality of service (QoS) in active networks. The first one, we call the \"active approach\", allows us to define protocols (or services) adapted to flow contents (in particular their semantics) but does not permit us to set priorities to flows. The second one uses QoS provided by the IP network layer (under active networks). The weakness of this latter approach is then identified: while it simplifies the implementation of QoS in active networks, the obtained QoS is almost as flexible as the service offered by IP layer. We propose a new approach where QoS is managed at \"active network\" layer rather than at IP layer. This new approach is far more flexible and allows us to provide QoS mechanisms not limited by those at the IP layer. We show that our solution offers QoS with a better granularity: packet-grained rather than flow-grained We have performed many experiments that validate this flexible approach of QoS at the active network layer in particular on the high-speed active node Tamanoir.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127589924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel data encryption algorithm based on wavelet filter banks and the singular value decomposition 基于小波滤波器组和奇异值分解的数据加密算法
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.6
Min-Sung Koh, E. Rodriguez-Marek
{"title":"A novel data encryption algorithm based on wavelet filter banks and the singular value decomposition","authors":"Min-Sung Koh, E. Rodriguez-Marek","doi":"10.1109/LCN.2004.6","DOIUrl":"https://doi.org/10.1109/LCN.2004.6","url":null,"abstract":"We present an algorithm which performs data encryption by serially concatenating two transform stages. The outer stage uses one of the orthogonal matrices obtained from the singular value decomposition (SVD) of an arbitrary signal, such as white noise or the sum of cosines of different frequencies. The inner stage of encryption uses a fast, parallelized wavelet filter bank using our previously presented algorithm (Koh, M.S. and Rodriguez-Marek, E., Proc. IEEE Int. Symp. on Sig. Process. and Inform., 2003). This algorithm is generalized for an arbitrary number of nodes and decomposition levels. Past algorithms based on the wavelet packet tree structure present a drawback for band-limited signals, because attackers can guess the approximate frequency bands of the wavelet decomposition. Our algorithm uses orthogonal matrices generated by the SVD, which spread the frequency content of the signal into the available spectrum when applied to the original vector. Furthermore, the algorithm is based on parallelized filter banks, which provide a flexible and highly adaptive structure for encryption and decryption.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123324438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信