Sethuraman Janardhanan, A. Mahanti, Debashis Saha, S. Sadhukhan
{"title":"A best first search based optimal wavelength assignment algorithm to minimize the number of SONET ADMs in WDM rings","authors":"Sethuraman Janardhanan, A. Mahanti, Debashis Saha, S. Sadhukhan","doi":"10.1109/ICCCN.2005.1523954","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523954","url":null,"abstract":"In WDM rings, determining minimum number of ADMs is NP-hard. The best known algorithm namely, breadth first least interference (BFLI) heuristic gives optimal results in only 77% cases. In this paper, we analyze the problem and suggest a new set covering formulation for minimizing the number of ADMs in WDM rings and use best first search algorithm (A*) with the help of a heuristic (h/sub LB/) to solve it optimally. We establish through experiments that the search algorithm with the heuristic function (h/sub LB/) performs better than BFLI by always giving optimal results.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131172039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-certified group key generation for ad hoc clusters in wireless sensor networks","authors":"O. Arazi, H. Qi","doi":"10.1109/ICCCN.2005.1523886","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523886","url":null,"abstract":"Dynamic formation of node clusters is inherently embedded in a wide range of emerging wireless sensor network (WSN) applications. It is expected that security will play a key role in the design and successful deployment of these, as well as many other, applications. The ad-hoc nature and unique power-constraint characteristics of WSN suggest that a prerequisite for achieving security is the ability to encrypt and decrypt confidential data among an arbitrary set of sensor nodes. Consequently, the nodes are required to generate a joint secret key. Elliptic curve cryptography (ECC) has emerged as a suitable public key cryptographic foundation for WSN. This paper describes a pragmatic ECC-based methodology for self-certified group key generation in ad hoc clusters of sensor nodes. A novel load-balancing technique and chained data exchange yield reduced overall communications and facilitate an efficient distribution of the computational effort involved.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple method for balancing network utilization and quality of routing","authors":"Yuxi Li, J. Harms, R. Holte","doi":"10.1109/ICCCN.2005.1523811","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523811","url":null,"abstract":"Applegate and Cohen (2003) computational complexity design demand oblivious routing schemes that achieve low oblivious ratio with no or approximate knowledge of traffic demands. We investigate the quality of oblivious routing with respect to path dispersion, which is concerned with the number of paths; and path variation, which is concerned with how far the paths are from the shortest paths and the variation of path lengths. The results show the dispersion and the variation are high in general. We propose a penalty method to improve the quality of oblivious routing. The penalty method strikes a good balance between the conflicting objectives of minimizing the oblivious ratio and optimizing the quality of oblivious routing. Moreover, we apply the simple penalty method to the problem of minimizing the maximum link utilization given a traffic matrix. With the penalty method, we can achieve almost the same maximum link utilization, and improve the quality of routing to almost perfect, i.e. one or two paths that are very close to the shortest paths between each pair of nodes.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123653968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scalable scheduling algorithm to avoid conflicts in switch-memory-switch routers","authors":"Yang Xu, Beibei Wu, Wenjie Li, B. Liu","doi":"10.1109/ICCCN.2005.1523809","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523809","url":null,"abstract":"Although output queued (OQ) switches are prominent for their high performance, they are not easy to implement due to the high speedup requirement. Using a special scheduling algorithm in the first stage switch, a more scalable switch-memory-switch (SMS) architecture can emulate an OQ switch, where cells must be transferred from the inputs to the shared memories per time slot without arrival and departure conflicts. Although scheduling algorithm achieves good performance, the time complexity for constructing the bipartite graph is too high to be used in practice. In this paper, we propose a new iterative random round-Robin matching (iRRM) algorithm together with its constrained version CiRRM, where no bipartite graph is required to be constructed in advance to solve the departure conflict, and thus high computation overhead is avoided. In our algorithms, both the arrival and the departure conflicts are melted in the iterations. Each iterations consist of two steps: request step and grant step, where randomness and more easily implemented round-robin principle are used respectively. Through theoretical analysis, we obtain that with M=2/spl phi/(N-1) shared memories, where N is the port number and /spl phi/ is a constant larger than (2N-1)/(2N-2), iRRM/CiRRM can complete a matching within O(logM) iterations with high probability in M and the time complexity of CiRRM is only O(log/sup 2/M/loglogM), which is much lower than prior algorithms.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128710035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An anchor-based routing protocol with cell ID management system for ad hoc networks","authors":"Huaizhi Li, M. Singhal","doi":"10.1109/ICCCN.2005.1523853","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523853","url":null,"abstract":"Ad hoc networks, which do not rely on any infrastructure such as access points or base station, can be deployed rapidly and inexpensively even in situations with geographical or time constraints. So ad hoc networks have attractive applications in both military and disaster situations and also in commercial uses like sensor networks or conferencing. In ad hoc networks, each node acts both as a router and as a host. The topology of an ad hoc network may change dynamically, which makes it difficult to design an efficient routing protocol. Nowadays, more and more wireless devices are being used, which can form large ad hoc networks. It is important to design a scalable routing protocol for ad hoc networks. In this paper, we propose anchor-based routing protocol with cell ID management system (ARPC), a scalable routing protocol for ad hoc networks. ARPC is a hybrid routing protocol, which combines the advantages of table-based routing strategy and geographic routing strategy, and avoids the burden-GPS (Global Positioning System) (E. D. Kaplan, 1996) support. Simulation results show that ARPC is efficient and scales well to large networks. Especially for large networks (1000 and 1600 nodes), ARPC achieves 21 percent higher packet delivery ratio than AODV, and has 19 percent lower overhead. This denotes that ARPC has better scalability than AODV.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130729700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack diagnosis: throttling distributed denial-of-service attacks close to the attack sources","authors":"Ruiliang Chen, J. Park","doi":"10.1109/ICCCN.2005.1523866","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523866","url":null,"abstract":"Attack mitigation schemes actively throttle attack traffic generated in distributed denial-of-service (DDoS) attacks. This paper presents attack diagnosis (AD), a novel attack mitigation scheme that combines the concepts of Pushback and packet marking. AD's architecture is inline with the ideal DDoS attack countermeasure paradigm, in which attack detection is performed near the victim host and attack mitigation is executed close to the attack sources. AD is a reactive defense that is activated by a victim host after an attack has been detected. A victim activates AD by sending AD-related commands to its upstream routers. On receipt of such commands, the AD-enabled upstream routers deterministically mark each packet destined for the victim with the information of the input interface that processed that packet. By collecting the router interface information recorded in the packet markings, the victim can trace back the attack traffic to the attack sources. Once the traceback is complete, the victim issues messages that command AD-enabled routers to filter attack packets close to the source. The AD commands can be authenticated by the TTL field of the IP header without relying on any global key distribution infrastructure in Internet. Although AD can effectively filter traffic generated by a moderate number of attack sources, it is not effective against large-scale attacks. To address this problem, we propose an extension to AD called parallel attack diagnosis (PAD) that is capable of throttling traffic coming from a large number of attack sources simultaneously. AD and PAD are analyzed and evaluated using a realistic network topology based on the Skitter Internet map. Both schemes are shown to be robust against IP spoofing and incur low false positive ratios.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130487864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Roaming, hand-off and services continuity for voice services in converged wireless networks","authors":"G. Mandyam","doi":"10.1109/ICCCN.2005.1523916","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523916","url":null,"abstract":"The success of Wi-Fi and emergence of Wi-MAX creates exciting technology and business challenges for the communication industry. Roaming, seamless voice and data hand-offs, in conjunction with continuity of voice services such as messaging, push-to-talk, and voicemail, are posing the next technology and business challenges. Services convergence among Wi-Fi, Wi-MAX, and cellular networks is creating opportunities for both wireless, and wireline service providers. Similar opportunity exists for enterprises for the first time. Services convergence can give enterprises the freedom similar to \"PBX\"es for wireless access on and off campuses. As the business cases for enterprises and wireline service providers are pitted against each other on the commercial front, the technologies will evolve out of market leverage, presence and acceptance. This poses a challenge for technologists to create a technology that is easily deployable in target scenarios. The requirements exist for a solution that, independently of the end user and service providing entity, can fulfil the \"service quality\" expectations of users and providers. In this talk, we discuss the requirements of voice service convergence solutions, protocols, standardization effort, and challenges for solution development. We also allude to the opportunities for research and development of newer technologies. These innovations will breach the current gaps in convergence of services beyond packet to circuit call control mechanisms and extend them across different access technologies, such as Wi-Fi, Wi-MAX, GSM, CDMA, and others.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123250809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Calyam, Dima Krymskiy, M. Sridharan, P. Schopis
{"title":"Active and passive measurements on campus, regional and national network backbone paths","authors":"P. Calyam, Dima Krymskiy, M. Sridharan, P. Schopis","doi":"10.1109/ICCCN.2005.1523933","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523933","url":null,"abstract":"It has become a common practice for Internet service providers (ISPs) to instrument their networks with network measurement infrastructures (NMIs). These NMIs support network-wide \"active\" and \"passive\" measurement data collection and analysis to: 1) identify end-to-end performance bottlenecks in network paths and 2) broadly understand Internet traffic characteristics, on an ongoing basis. In this paper, we present our analysis of the active and passive measurement data collected along network backbone paths within typical campus, regional and national networks which carry traffic of cutting-edge Internet applications such as high-quality voice and video conferencing, multimedia streaming and distributed file sharing. The active measurement data has been obtained by using \"ActiveMon\" software, which we have developed and deployed along the above network backbone paths. The passive measurement data has been obtained using SNMP, Syslog and NetFlow data available at the intermediate routers located at strategic points along the same network backbone paths. Our analysis of the measurement data includes studying notable trends, network events and relative performance issues of the network backbone paths which are reflected in the active and passive measurement data collected regularly over several months. Our results thus provide valuable insights regarding traffic dynamics in the different academic network backbones and can be used for better design and control of networks and also to develop traffic source models based on empirical data from real-networks.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synergy: an overlay internetworking architecture","authors":"Minseok Kwon, S. Fahmy","doi":"10.1109/ICCCN.2005.1523896","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523896","url":null,"abstract":"A multitude of overlay network designs for resilient routing, multicasting, quality of service, content distribution, storage, and object location have been recently proposed. Overlay networks offer several attractive features, including ease of deployment, flexibility, adaptivity, and an infrastructure for collaboration among hosts. In this paper, we explore cooperation among co-existing, possibly heterogeneous, overlay networks. We design Synergy, a utility-based overlay internetworking architecture that fosters overlay cooperation. Our architecture promotes fair peering relationships to achieve synergism. Results from Internet experiments with cooperative forwarding overlays indicate that our Synergy prototype improves delay, throughput, and loss performance, while maintaining the autonomy and heterogeneity of individual overlay networks.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid based two transmission range strategy for MANETs","authors":"Zhijun Wang, Jingyuan Zhang","doi":"10.1109/ICCCN.2005.1523856","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523856","url":null,"abstract":"In a mobile ad hoc network (MANET), it becomes practically viable to use virtual infrastructures to improve energy efficiency. The square-based infrastructure divides the network area into squares of the same size. Fourand eight-directional forwarding are two popular forwarding methods in the square-based infrastructure. In four-directional (or eight-directional) forwarding, packets can be forwarded from a square to its four (or eight) neighboring squares. Previous research shows, to achieve the maximum energy saving, each forwarding method must choose a proper square size for the infrastructure, and each method has its advantageous directions in terms of energy saving. That indicates an adaptive strategy combining both methods will save more energy in every direction. However, it is costly for nodes to maintain two infrastructures. Instead of maintaining two infrastructures, this paper proposes to use two different power levels for transmitting packets. The low power level is used for transmission of packets to horizontal or vertical neighbors and the high power level for transmission to diagonal neighbors. The proposed two transmission range scheme has the advantages of both four- and eight-directional forwarding schemes, yet only one infrastructure needs to be maintained. The paper compares the energy efficiency between the proposed scheme and related schemes analytically and numerically. It shows that the two transmission range strategy outperforms both eight- and four-directional forwarding in terms of path optimality, network lifetime, and average node power consumption.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132747480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}