2007 16th International Conference on Computer Communications and Networks最新文献

筛选
英文 中文
Performance of a Priority-Weighted Round Robin Mechanism for Differentiated Service Networks 差分业务网中优先级加权轮询机制的性能研究
2007 16th International Conference on Computer Communications and Networks Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317983
Helen Yu-Zhang, P. Harrison
{"title":"Performance of a Priority-Weighted Round Robin Mechanism for Differentiated Service Networks","authors":"Helen Yu-Zhang, P. Harrison","doi":"10.1109/ICCCN.2007.4317983","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317983","url":null,"abstract":"Strict priority queueing and weighted round robin are two common scheduling schemes for differentiation of services in telecommunication networks. A combination of these is the priority weighted round robin (PWRR) scheme, which serves three classes of traffic with distinct quality requirements, namely expedited forwarding (EF), assured forwarding (AF) and best effort forwarding (BF). The response time of the AF class is analysed under a worst case scenario and an expression for its mean value is obtained using a queueing model. Numerical results are validated by simulation and implications on service level agreements are discussed.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Analysis of Discrete Time Queueing Networks under Buffer Threshold Scheme 缓冲阈值方案下离散时间排队网络分析
2007 16th International Conference on Computer Communications and Networks Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317996
I. Awan, L. Guan, X. Wang
{"title":"Analysis of Discrete Time Queueing Networks under Buffer Threshold Scheme","authors":"I. Awan, L. Guan, X. Wang","doi":"10.1109/ICCCN.2007.4317996","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317996","url":null,"abstract":"This paper presents a framework for the performance analysis of queueing networks under active queue management scheme. The analysis is based on a queue-by-queue decomposition technique where each queue is modelled as a GGeo/GGeo/1/{N1, N2} queue with single server, R (R = 2) distinct traffic classes, N1 as the buffer threshold and N2 as full buffer capacity under first-come-first-serve (FCFS) service rule. Two classes of traffic represent the arrival of the single class Internet traffic before and after the threshold N1, respectively. The use of queue thresholds is a well known technique for network traffic congestion control. The external traffic is modelled using the Generalised Geometric (GGeo) distribution which can capture the bursty property of network traffic. The analytical solution is obtained using the Maximum Entropy (ME) principle. The forms of the state probabilities and blocking probabilities are analytically established at equilibrium via appropriate mean value constraints. Initial numerical results demonstrate the credibility of the proposed analytical solution.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130762509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Error-Correcting Codes Based on Quasigroups 基于准群的纠错码
2007 16th International Conference on Computer Communications and Networks Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317814
D. Gligoroski, S. Markovski, L. Kocarev
{"title":"Error-Correcting Codes Based on Quasigroups","authors":"D. Gligoroski, S. Markovski, L. Kocarev","doi":"10.1109/ICCCN.2007.4317814","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317814","url":null,"abstract":"Error-correcting codes based on quasigroup transformations are proposed. For the proposed codes, similar to recursive convolutional codes, the correlation exists between any two bits of a codeword, which can have infinite length, theoretically. However, in contrast to convolutional codes, the proposed codes are nonlinear and almost random: for codewords with large enough length, the distribution of the letters, pair of letters, triple of letters, and so on, is uniform. Simulation results of bit-error probability for several codes in binary symmetric channels are presented.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A New Network Layer for Mobile Ad Hoc Wireless Networks Based on Assignment Router Identity Protocol 基于分配路由器身份协议的移动自组织无线网络新网络层
2007 16th International Conference on Computer Communications and Networks Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317913
Chaorong Peng, Chang Wen Chen
{"title":"A New Network Layer for Mobile Ad Hoc Wireless Networks Based on Assignment Router Identity Protocol","authors":"Chaorong Peng, Chang Wen Chen","doi":"10.1109/ICCCN.2007.4317913","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317913","url":null,"abstract":"Customers have complained that malicious nodes are mounting increasingly sophisticated attacking operations in mobile ad hoc networks (MANETs). It is obvious that the IP-based MANETs are vulnerable to attacks and therefore are insecure. In this paper, we design a novel assignment router identity protocol (ARIP) to establish a new layer of network architecture and to take full advantage of Dynamic Hybrid Multi Routing Protocol that we have recently developed for MANETs [2]. A new Identity in the flexible namespace of ARIP enhances the limit in forming prevention line in the security of MANET. A complete architecture is then derived as an instantiation of router identity routing protocol (RIRP) model whose architecture satisfies the condition of ARIP model in order to use this new Identify for routers/hosts. All applications in RIRP deal with this new Identity instead of the vulnerable IP addresses and therefore provide the security embedded seamlessly into the overall network architecture. The proposed RIRP have been implemented on the simulator Glomosim. Simulation results show that RIRP has some great impact on routing performance comparing with DHMRP.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125437102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Medium Access Control for Body Sensor Networks 人体传感器网络介质访问控制
2007 16th International Conference on Computer Communications and Networks Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317821
Huaming Li, Jindong Tan
{"title":"Medium Access Control for Body Sensor Networks","authors":"Huaming Li, Jindong Tan","doi":"10.1109/ICCCN.2007.4317821","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317821","url":null,"abstract":"H-MAC, a novel time division multiple access (TDMA) MAC protocol, aims to improve body sensor networks (BSNs) energy efficiency by exploiting heartbeat rhythm information to perform time synchronization. Heartbeat rhythm is inherent in every human body and observable in various biosignals. Biosensors in a BSN can extract the heartbeat rhythm from their own sensory data by detecting waveform peaks. Following the rhythm, biosensors can achieve time synchronization without having to turn on their radio to receive periodic timing information from a central controller, so that energy cost for time synchronization can be completely eliminated and the lifetime of network can be prolonged. An active synchronization recovery scheme is also developed, in which two resynchronization approaches can be triggered by detected abrupt peak interval changes. The algorithms are verified using real world data from MIT-BIH multi-parameter database MIMIC.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"58 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121331015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks 一种基于主动测试的差分技术缓解低率DoS攻击
2007 16th International Conference on Computer Communications and Networks Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317889
Amey Shevtekar, N. Ansari
{"title":"A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks","authors":"Amey Shevtekar, N. Ansari","doi":"10.1109/ICCCN.2007.4317889","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317889","url":null,"abstract":"Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the network to evade current router based congestion control mechanisms. We propose a practical attack model in which botnets that can pose a serious threat to the Internet are considered. Under this model, an attacker can scatter bots across the Internet to launch the low rate DoS attack, thus essentially orchestrating the low rate DoS attack that uses random and continuous IP address spoofing, but with valid legitimate IP addresses. It is difficult to detect and mitigate such an attack. We propose a low rate DoS attack detection algorithm, which relies on the core characteristic of the low rate DoS attack in introducing high rate traffic for short periods, and then uses a proactive test based differentiation technique to filter the attack packets. The proactive test was originally proposed to defend DDoS attacks and low rate DoS attacks which tend to ignore the normal operation of network protocols, but it is tailored here to differentiate the legitimate traffic from the low rate DoS attack traffic instigated by botnets. It leverages on the conformity of legitimate flows, which obey the network protocols. It mainly differentiates legitimate connections by checking their responses to the proactive tests which include puzzles for distinguishing botnets from human users. We finally evaluate and demonstrate the performance of the proposed low rate DoS attack detection and mitigation algorithm on the real Internet traces.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116090353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Enhanced Synchronized Medium Access Control Protocol for Wireless Ad Hoc Networks 无线自组织网络增强型同步介质访问控制协议
2007 16th International Conference on Computer Communications and Networks Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317832
Xiaojun Cao, Shenbo Liu, Lei Pan, Hongyi Wu
{"title":"Enhanced Synchronized Medium Access Control Protocol for Wireless Ad Hoc Networks","authors":"Xiaojun Cao, Shenbo Liu, Lei Pan, Hongyi Wu","doi":"10.1109/ICCCN.2007.4317832","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317832","url":null,"abstract":"An enhanced synchronized medium access protocol, named ES-MAC, for wireless ad hoc networks is proposed in this paper. ES-MAC employs a binary-countdown scheme to resolve contentions between wireless stations. Multiple contention periods and hidden station elimination periods are adopted to increase the throughput and channel utilization of the system. Our simulation and analysis show that ES-MAC can achieve a promising performance in terms of throughput, fairness and channel utilization. With channel utilization as high as 96%, ES-MAC can also be employed as an alternative MAC protocol in wireless access network.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123806069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Travel-light: A Model for the Dynamic Assembly of Mega Machines 轻型旅行:巨型机械动态装配模型
2007 16th International Conference on Computer Communications and Networks Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317798
Li Gao, Jingyuan Zhang, Danyang Zhang
{"title":"Travel-light: A Model for the Dynamic Assembly of Mega Machines","authors":"Li Gao, Jingyuan Zhang, Danyang Zhang","doi":"10.1109/ICCCN.2007.4317798","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317798","url":null,"abstract":"This paper proposes a new ubiquitous computing architecture named Travel-light, in which service computers form a computing infrastructure that allows a small mobile device such as a PDA or a smart phone to organize as many service computers as needed to form a mega machine. The mega machine will be powerful and able to provide a user with a familiar computing environment regardless of the users location. The paper presents the architecture, protocols, and implementation approaches of the mega machine based on the Travel-light architecture. The initial evaluation on the implementation is satisfactory. The proposed architecture enables users to perform presentations away from home with a PDA, to work in a familiar computing environment even on a visiting site, and to collaborate through a communal computer.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125063805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Bio-Inspired Robust Routing Protocol for Mobile Ad Hoc Networks 一种基于生物的移动自组织网络鲁棒路由协议
2007 16th International Conference on Computer Communications and Networks Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317839
K. Leibnitz, N. Wakamiya, M. Murata
{"title":"A Bio-Inspired Robust Routing Protocol for Mobile Ad Hoc Networks","authors":"K. Leibnitz, N. Wakamiya, M. Murata","doi":"10.1109/ICCCN.2007.4317839","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317839","url":null,"abstract":"In this paper, we discuss robustness issues of a biologically inspired routing protocol for mobile ad hoc networks and the influence it has on the quality of service (QoS) in the system. Contrary to fixed network structures, ad hoc networks are susceptible to frequent topology changes due to the mobility and churn of the participating nodes. Our goal is therefore to provide fast recovery from connectivity failures, as well as a fast reaction to path changes due to node mobility or churn.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122724744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Layered Clustering Communication Protocol for Wireless Sensor Networks 无线传感器网络的分层聚类通信协议
2007 16th International Conference on Computer Communications and Networks Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317923
Yong Wang, B. Ramamurthy
{"title":"Layered Clustering Communication Protocol for Wireless Sensor Networks","authors":"Yong Wang, B. Ramamurthy","doi":"10.1109/ICCCN.2007.4317923","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317923","url":null,"abstract":"In this paper, we propose a layered clustering hierarchy (LCH) communication protocol for wireless sensor networks (WSNs). The design of LCH has two goals: scalability and energy-efficiency. In LCH, the sensor nodes are organized as a layered clustering structure. Each layer runs a distributed clustering protocol. By randomizing the rotation of cluster heads in each layer, the energy load is distributed evenly across sensors in the network. Our simulations show that LCH is effective in densely deployed sensor networks. On average, 70% of live sensor nodes are involved directly in the clustering communication hierarchy. Moreover, the simulations also show that the energy load and dead nodes are distributed evenly over the network. As studies prove that the performance of LCH depends mainly on the distributed clustering protocol, the location of cluster heads and cluster size are two critical factors in the design of LCH.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127926955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信