Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.最新文献

筛选
英文 中文
Efficient data retrieving in distributed data-streaming environments 分布式数据流环境中的高效数据检索
Jinsong Han, Jun Miao, Jizhong Zhao, J. Huai, L. Ni
{"title":"Efficient data retrieving in distributed data-streaming environments","authors":"Jinsong Han, Jun Miao, Jizhong Zhao, J. Huai, L. Ni","doi":"10.1109/ICCCN.2005.1523944","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523944","url":null,"abstract":"In a potential distributed application, automobile tracking system (ATS), automobile location data is continuously generated, kept in a distributed manner. As large amount of traffic will be incurred during search process, it is critical to construct an efficient overlay multicast structure for the ATS so as to distribute traffic to all the physical links evenly, as well as balance the load among group members. In this paper, we propose a distributed protocol, MMT scheme, in which end hosts self-organize into multiple multicast trees. We evaluate the performance of MMT with comprehensive simulations. Experimental results show that MMT outperforms existing approaches in load balance, and its performance penalties are low from the network and the application perspectives.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A peer-to-peer overlay for context information search 用于上下文信息搜索的点对点覆盖
T. Gu, H. Pung, Daqing Zhang
{"title":"A peer-to-peer overlay for context information search","authors":"T. Gu, H. Pung, Daqing Zhang","doi":"10.1109/ICCCN.2005.1523895","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523895","url":null,"abstract":"The widespread use of context information necessitates an efficient wide-area lookup service in pervasive computing. In this paper, we present semantic context space (SCS), a semantic overlay network that facilitates efficient search for context information in distributed environments. Peers in SCS are grouped based on the semantics of their local data and self-organized into a one-dimensional ring space. Context search requests are only routed to the appropriate semantic clusters, reducing unnecessary search cost on peers that have irrelevant context data, and increasing the chances that the context data will be found quickly. By exploring parallelism in a semantic cluster, search request can be found quickly. Our simulation studies demonstrate the effectiveness of SCS.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A resource-trading mechanism for efficient distribution of large-volume contents on peer-to-peer networks 一种在点对点网络上有效分发大量内容的资源交易机制
S.G.M. Koo, C.S.G. Lee, Karthik N. Kannan
{"title":"A resource-trading mechanism for efficient distribution of large-volume contents on peer-to-peer networks","authors":"S.G.M. Koo, C.S.G. Lee, Karthik N. Kannan","doi":"10.1109/ICCCN.2005.1523902","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523902","url":null,"abstract":"In recent years, the rapid growth of peer-to-peer (P2P) networks has provided a new paradigm for content distribution. To improve the efficiency of a P2P system, it is important to provide incentives for the peers to participate and contribute their resources. Various attempts have been made to reward/penalize peers by providing service differentiation based on a requesting peer's history or reputation. However, in a truly distributed, non-cooperative environment, maintaining and preventing the untruthful revealing of such information within the community impose larger computation and communication overheads to the system. These problems are further magnified when large-volume contents are being distributed because of the length distribution processes and the update of history or reputation has to keep up with the distribution process. In this paper, we address the incentive provisioning problem for distribution of large-volume content in P2P networks, and present a \"seeing-is-believing\" incentive-compatible mechanism (protocol) in which a peer will decide how much resources will be assigned to which neighbors based on what it has experienced. The protocol applies a utility-based resource-trading concept where peers will maximize their contributions for a fair or better return, and we show that by adopting this protocol, the system will achieve Cournot Equilibrium. Furthermore, our protocol is light-weight, completely decentralized, and cheat-proof. Experimental results illustrate significant improvements on the distribution efficiency of our protocol over other adopted alternatives.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Reducing the user perceived delay of interactive TCP connections using a dynamic priority approach 使用动态优先级方法减少交互式TCP连接的用户感知延迟
P. Dimopoulos, P. Zeephongsekul, Z. Tari
{"title":"Reducing the user perceived delay of interactive TCP connections using a dynamic priority approach","authors":"P. Dimopoulos, P. Zeephongsekul, Z. Tari","doi":"10.1109/ICCCN.2005.1523901","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523901","url":null,"abstract":"Many interactive applications require continuous user interaction, for example ssh and many Web applications. The TCP connections created by these applications are therefore in a class called interactive. When interactive applications suffer from packet loss, the packet retransmission time severely increases the user perceived delay. This work introduces a dynamic priority RED queue (DPRQ) algorithm that dynamically changes the priority of queues instead of dropping packets when the queue is overloaded. The algorithm reduces the user perceived delay by reducing packet loss in interactive TCP connections. The DPRQ is compared to an existing class-based queue which incorporates RED (RCBQ) as would typically be used for assured forwarding. An analytical model of the DPRQ and RCBQ is presented with both experimental and analytical results. The DPRQ is found by simulation to decrease packet loss by up to eight times and therefore provide a lower user perceived delay even though queuing delay is increased by up to five times.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127236771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network simulation via hybrid system modeling: a time-stepped approach 通过混合系统建模的网络仿真:一种时间步进方法
A. Kavimandan, Wonsuck Lee, M. Thottan, A. Gokhale, R. Viswanathan
{"title":"Network simulation via hybrid system modeling: a time-stepped approach","authors":"A. Kavimandan, Wonsuck Lee, M. Thottan, A. Gokhale, R. Viswanathan","doi":"10.1109/ICCCN.2005.1523932","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523932","url":null,"abstract":"The ever increasing complexity of networks dramatically increases the challenges faced by service providers to analyze network behavior and (re)provision resources to support multiple complex distributed applications. Accurate and scalable simulation tools are pivotal to this cause. The recently proposed hybrid systems model for data communication networks shows promise in achieving performance characteristics comparable to fluid models while retaining the accuracy of discrete models. Using the hybrid systems paradigm, this paper provides contributions to the modeling of TCP behavior and the analysis/simulation of data communication networks based on these models. An important distinguishing feature of our simulation framework is a faithful accounting of link propagation delays which has been ignored in previous work for the sake of simplicity. Other salient aspects of the work include a new finite state machine model for a drop-tail queue, a new model for fast recovery/fast retransmit mode, a revised sending rate model, and an embedded time-out mode transition mechanism all of which employ a time-stepped solution method to solve the hybrid system network models. Our simulation results are consistent with well-known packet based simulators such as ns-2, thus demonstrating the accuracy of our hybrid model. Our future efforts will be directed towards studying and improving the computational performance of hybrid model based simulations.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Future of wireless networks 无线网络的未来
G. Rittenhouse
{"title":"Future of wireless networks","authors":"G. Rittenhouse","doi":"10.1109/ICCCN.2005.1523918","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523918","url":null,"abstract":"The wireless industry is undergoing a transition. We see the evolution from cellular 2G to 3G standards, the migration from circuit to packet applications, and the procession of voice to data. We also see the industry incorporating new wireless access technologies such as WiFi and WiMAX. All of this is occurring in a market place where voice subscriber penetration levels in many parts of the world are saturating and there is incredible pressure to reduce network capital and operating costs. These conditions present significant technology challenges to increase customer demand and further increase network capacity to lower network costs. In this talk we will review the market drivers and applications that will drive the next-generation services. We note that in response to these the network architecture will migrate to having more control at the edge with substantially more direct base station to base station communication. We will then present several technologies that address these issues.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128967208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Least-cost disjoint paths with dependent cost structure in wavelength continuous optical WDM networks 波长连续光WDM网络中具有相关代价结构的最小代价不相交路径
A. Todimala, B. Ramamurthy
{"title":"Least-cost disjoint paths with dependent cost structure in wavelength continuous optical WDM networks","authors":"A. Todimala, B. Ramamurthy","doi":"10.1109/ICCCN.2005.1523875","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523875","url":null,"abstract":"One of the important issues in establishing a fault tolerant connection in a wavelength division multiplexing optical network is computing a pair of disjoint working and protection paths and a free wavelength along the paths. While most of the earlier research focused only on computing disjoint paths, in this work we consider computing both disjoint paths and a free wavelength along the paths. The concept of dependent cost structure (DCS) of protection paths to enhance their resource sharing ability was proposed in our earlier work. In this work we extend the concept of DCS of protection paths to wavelength continuous networks. We formalize the problem of computing disjoint paths with DCS in wavelength continuous networks and prove that it is NP-complete. We present an iterative heuristic that uses a layered graph model to compute disjoint paths with DCS and identify a free wavelength.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124579909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic shared Layer 1 VPN provisioning in next-generation SONET/SDH networks 下一代SONET/SDH网络中的动态共享第一层VPN供应
N. Ghani, D. Benhaddou, W. Alanqar, Krishna Amimireddygari, Satish Dandu
{"title":"Dynamic shared Layer 1 VPN provisioning in next-generation SONET/SDH networks","authors":"N. Ghani, D. Benhaddou, W. Alanqar, Krishna Amimireddygari, Satish Dandu","doi":"10.1109/ICCCN.2005.1523935","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523935","url":null,"abstract":"Rapid advances in next-generation SONET/SDH and optical switching along with GMPLS control have enabled many new service provisioning capabilities. In particular, a key paradigm is the new Layer 1 virtual private network (L1 VPN) framework, which allows clients to directly provision their own services without deploying expensive infrastructures. This paper proposes novel L1 VPN resource management schemes for virtual concatenation-enabled next-generation SONET/SDH networks, using both centralized and distributed control. Detailed performance analysis results are also presented.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127691872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Scalable IP-VPN flow control mechanism supporting arbitrary fairness criteria. Part 1. Architecture design 可扩展的IP-VPN流量控制机制,支持任意公平标准。第1部分。体系结构设计
O. Honda, H. Ohsaki, M. Imase, J. Murayama, K. Matsuda
{"title":"Scalable IP-VPN flow control mechanism supporting arbitrary fairness criteria. Part 1. Architecture design","authors":"O. Honda, H. Ohsaki, M. Imase, J. Murayama, K. Matsuda","doi":"10.1109/ICCCN.2005.1523837","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523837","url":null,"abstract":"In recent years, IP-based virtual private networks (IP-VPNs), which provide a virtual privately owned network over an IP network, have attracted attention. With existing IP-VPNs, however, there is a serious problem that fairness among IP-VPN customers is not satisfied. In this paper, we first discuss design objectives of a control mechanism for achieving fair IP-VPN services: achieving inter-VPN fairness, achieving intra-VPN fairness, easy deployment into existing IP networks, and achieving a high scalability. We then propose an IP-VPN fairness control called 12FVC (inter-and intra-VPN fairness control) for realizing a fair IP-VPN service in a scalable way. The core of 12VFC is an AIMD (additive increase and multiplicative decrease) window flow control operating among IP-VPN service provider's edge routers. 12VFC has the advantage that an IP-VPN service provider can arbitrarily specify inter-VPN fairness criteria by utilizing analytic results of AIMD window flow control. Moreover, 12VFC can be easily deployed into existing IP networks by simply modifying edge routers. Through several simulation experiments, we demonstrate that 12VFC realizes both inter-VPN fairness and intra-VPN fairness with extremely high accuracy.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131898291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart PSK provisioning: a key-management and authentication scheme for wireless LANs 智能PSK发放:无线局域网的密钥管理和认证方案
Dario S. Tonesi, L. Salgarelli
{"title":"Smart PSK provisioning: a key-management and authentication scheme for wireless LANs","authors":"Dario S. Tonesi, L. Salgarelli","doi":"10.1109/ICCCN.2005.1523823","DOIUrl":"https://doi.org/10.1109/ICCCN.2005.1523823","url":null,"abstract":"The majority of the authentication methods used in modern wireless local area networks (WLANs) are inherited from protocols designed for wired networks. They provide a good level of security, but they do not support mobility well and they are not computationally efficient. More efficient and mobility-friendly mechanisms, based on pre-shared keys (PSK), are beginning to appear, but they present significant issues with the provisioning and management of the credentials they need. In this paper we introduce smart PSK provisioning (SPP), a combination of two classes of authentication methods. By taking advantage of the combined features of TLS-based and PSK-based authentication mechanisms, SPP provides security, network and computational efficiency, manageability of credentials and modularity. Qualitative and quantitative analysis show how SPP satisfies all these requirements, and how its performance compares very favorably with that of TLS-based authentication mechanisms.","PeriodicalId":379037,"journal":{"name":"Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130587941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信