Jinsong Han, Jun Miao, Jizhong Zhao, J. Huai, L. Ni
{"title":"Efficient data retrieving in distributed data-streaming environments","authors":"Jinsong Han, Jun Miao, Jizhong Zhao, J. Huai, L. Ni","doi":"10.1109/ICCCN.2005.1523944","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523944","url":null,"abstract":"In a potential distributed application, automobile tracking system (ATS), automobile location data is continuously generated, kept in a distributed manner. As large amount of traffic will be incurred during search process, it is critical to construct an efficient overlay multicast structure for the ATS so as to distribute traffic to all the physical links evenly, as well as balance the load among group members. In this paper, we propose a distributed protocol, MMT scheme, in which end hosts self-organize into multiple multicast trees. We evaluate the performance of MMT with comprehensive simulations. Experimental results show that MMT outperforms existing approaches in load balance, and its performance penalties are low from the network and the application perspectives.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A peer-to-peer overlay for context information search","authors":"T. Gu, H. Pung, Daqing Zhang","doi":"10.1109/ICCCN.2005.1523895","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523895","url":null,"abstract":"The widespread use of context information necessitates an efficient wide-area lookup service in pervasive computing. In this paper, we present semantic context space (SCS), a semantic overlay network that facilitates efficient search for context information in distributed environments. Peers in SCS are grouped based on the semantics of their local data and self-organized into a one-dimensional ring space. Context search requests are only routed to the appropriate semantic clusters, reducing unnecessary search cost on peers that have irrelevant context data, and increasing the chances that the context data will be found quickly. By exploring parallelism in a semantic cluster, search request can be found quickly. Our simulation studies demonstrate the effectiveness of SCS.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A resource-trading mechanism for efficient distribution of large-volume contents on peer-to-peer networks","authors":"S.G.M. Koo, C.S.G. Lee, Karthik N. Kannan","doi":"10.1109/ICCCN.2005.1523902","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523902","url":null,"abstract":"In recent years, the rapid growth of peer-to-peer (P2P) networks has provided a new paradigm for content distribution. To improve the efficiency of a P2P system, it is important to provide incentives for the peers to participate and contribute their resources. Various attempts have been made to reward/penalize peers by providing service differentiation based on a requesting peer's history or reputation. However, in a truly distributed, non-cooperative environment, maintaining and preventing the untruthful revealing of such information within the community impose larger computation and communication overheads to the system. These problems are further magnified when large-volume contents are being distributed because of the length distribution processes and the update of history or reputation has to keep up with the distribution process. In this paper, we address the incentive provisioning problem for distribution of large-volume content in P2P networks, and present a \"seeing-is-believing\" incentive-compatible mechanism (protocol) in which a peer will decide how much resources will be assigned to which neighbors based on what it has experienced. The protocol applies a utility-based resource-trading concept where peers will maximize their contributions for a fair or better return, and we show that by adopting this protocol, the system will achieve Cournot Equilibrium. Furthermore, our protocol is light-weight, completely decentralized, and cheat-proof. Experimental results illustrate significant improvements on the distribution efficiency of our protocol over other adopted alternatives.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing the user perceived delay of interactive TCP connections using a dynamic priority approach","authors":"P. Dimopoulos, P. Zeephongsekul, Z. Tari","doi":"10.1109/ICCCN.2005.1523901","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523901","url":null,"abstract":"Many interactive applications require continuous user interaction, for example ssh and many Web applications. The TCP connections created by these applications are therefore in a class called interactive. When interactive applications suffer from packet loss, the packet retransmission time severely increases the user perceived delay. This work introduces a dynamic priority RED queue (DPRQ) algorithm that dynamically changes the priority of queues instead of dropping packets when the queue is overloaded. The algorithm reduces the user perceived delay by reducing packet loss in interactive TCP connections. The DPRQ is compared to an existing class-based queue which incorporates RED (RCBQ) as would typically be used for assured forwarding. An analytical model of the DPRQ and RCBQ is presented with both experimental and analytical results. The DPRQ is found by simulation to decrease packet loss by up to eight times and therefore provide a lower user perceived delay even though queuing delay is increased by up to five times.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127236771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Kavimandan, Wonsuck Lee, M. Thottan, A. Gokhale, R. Viswanathan
{"title":"Network simulation via hybrid system modeling: a time-stepped approach","authors":"A. Kavimandan, Wonsuck Lee, M. Thottan, A. Gokhale, R. Viswanathan","doi":"10.1109/ICCCN.2005.1523932","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523932","url":null,"abstract":"The ever increasing complexity of networks dramatically increases the challenges faced by service providers to analyze network behavior and (re)provision resources to support multiple complex distributed applications. Accurate and scalable simulation tools are pivotal to this cause. The recently proposed hybrid systems model for data communication networks shows promise in achieving performance characteristics comparable to fluid models while retaining the accuracy of discrete models. Using the hybrid systems paradigm, this paper provides contributions to the modeling of TCP behavior and the analysis/simulation of data communication networks based on these models. An important distinguishing feature of our simulation framework is a faithful accounting of link propagation delays which has been ignored in previous work for the sake of simplicity. Other salient aspects of the work include a new finite state machine model for a drop-tail queue, a new model for fast recovery/fast retransmit mode, a revised sending rate model, and an embedded time-out mode transition mechanism all of which employ a time-stepped solution method to solve the hybrid system network models. Our simulation results are consistent with well-known packet based simulators such as ns-2, thus demonstrating the accuracy of our hybrid model. Our future efforts will be directed towards studying and improving the computational performance of hybrid model based simulations.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Future of wireless networks","authors":"G. Rittenhouse","doi":"10.1109/ICCCN.2005.1523918","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523918","url":null,"abstract":"The wireless industry is undergoing a transition. We see the evolution from cellular 2G to 3G standards, the migration from circuit to packet applications, and the procession of voice to data. We also see the industry incorporating new wireless access technologies such as WiFi and WiMAX. All of this is occurring in a market place where voice subscriber penetration levels in many parts of the world are saturating and there is incredible pressure to reduce network capital and operating costs. These conditions present significant technology challenges to increase customer demand and further increase network capacity to lower network costs. In this talk we will review the market drivers and applications that will drive the next-generation services. We note that in response to these the network architecture will migrate to having more control at the edge with substantially more direct base station to base station communication. We will then present several technologies that address these issues.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128967208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Least-cost disjoint paths with dependent cost structure in wavelength continuous optical WDM networks","authors":"A. Todimala, B. Ramamurthy","doi":"10.1109/ICCCN.2005.1523875","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523875","url":null,"abstract":"One of the important issues in establishing a fault tolerant connection in a wavelength division multiplexing optical network is computing a pair of disjoint working and protection paths and a free wavelength along the paths. While most of the earlier research focused only on computing disjoint paths, in this work we consider computing both disjoint paths and a free wavelength along the paths. The concept of dependent cost structure (DCS) of protection paths to enhance their resource sharing ability was proposed in our earlier work. In this work we extend the concept of DCS of protection paths to wavelength continuous networks. We formalize the problem of computing disjoint paths with DCS in wavelength continuous networks and prove that it is NP-complete. We present an iterative heuristic that uses a layered graph model to compute disjoint paths with DCS and identify a free wavelength.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124579909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Ghani, D. Benhaddou, W. Alanqar, Krishna Amimireddygari, Satish Dandu
{"title":"Dynamic shared Layer 1 VPN provisioning in next-generation SONET/SDH networks","authors":"N. Ghani, D. Benhaddou, W. Alanqar, Krishna Amimireddygari, Satish Dandu","doi":"10.1109/ICCCN.2005.1523935","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523935","url":null,"abstract":"Rapid advances in next-generation SONET/SDH and optical switching along with GMPLS control have enabled many new service provisioning capabilities. In particular, a key paradigm is the new Layer 1 virtual private network (L1 VPN) framework, which allows clients to directly provision their own services without deploying expensive infrastructures. This paper proposes novel L1 VPN resource management schemes for virtual concatenation-enabled next-generation SONET/SDH networks, using both centralized and distributed control. Detailed performance analysis results are also presented.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127691872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Honda, H. Ohsaki, M. Imase, J. Murayama, K. Matsuda
{"title":"Scalable IP-VPN flow control mechanism supporting arbitrary fairness criteria. Part 1. Architecture design","authors":"O. Honda, H. Ohsaki, M. Imase, J. Murayama, K. Matsuda","doi":"10.1109/ICCCN.2005.1523837","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523837","url":null,"abstract":"In recent years, IP-based virtual private networks (IP-VPNs), which provide a virtual privately owned network over an IP network, have attracted attention. With existing IP-VPNs, however, there is a serious problem that fairness among IP-VPN customers is not satisfied. In this paper, we first discuss design objectives of a control mechanism for achieving fair IP-VPN services: achieving inter-VPN fairness, achieving intra-VPN fairness, easy deployment into existing IP networks, and achieving a high scalability. We then propose an IP-VPN fairness control called 12FVC (inter-and intra-VPN fairness control) for realizing a fair IP-VPN service in a scalable way. The core of 12VFC is an AIMD (additive increase and multiplicative decrease) window flow control operating among IP-VPN service provider's edge routers. 12VFC has the advantage that an IP-VPN service provider can arbitrarily specify inter-VPN fairness criteria by utilizing analytic results of AIMD window flow control. Moreover, 12VFC can be easily deployed into existing IP networks by simply modifying edge routers. Through several simulation experiments, we demonstrate that 12VFC realizes both inter-VPN fairness and intra-VPN fairness with extremely high accuracy.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131898291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart PSK provisioning: a key-management and authentication scheme for wireless LANs","authors":"Dario S. Tonesi, L. Salgarelli","doi":"10.1109/ICCCN.2005.1523823","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523823","url":null,"abstract":"The majority of the authentication methods used in modern wireless local area networks (WLANs) are inherited from protocols designed for wired networks. They provide a good level of security, but they do not support mobility well and they are not computationally efficient. More efficient and mobility-friendly mechanisms, based on pre-shared keys (PSK), are beginning to appear, but they present significant issues with the provisioning and management of the credentials they need. In this paper we introduce smart PSK provisioning (SPP), a combination of two classes of authentication methods. By taking advantage of the combined features of TLS-based and PSK-based authentication mechanisms, SPP provides security, network and computational efficiency, manageability of credentials and modularity. Qualitative and quantitative analysis show how SPP satisfies all these requirements, and how its performance compares very favorably with that of TLS-based authentication mechanisms.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130587941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}