By Topic

IP Operations and Management, 2004. Proceedings IEEE Workshop on

Date 11-13 Oct. 2004

Filter Results

Displaying Results 1 - 25 of 54
  • [Front cover]

    Publication Year: 2004, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (393 KB)
    Freely Available from IEEE
  • 2004 IEEE Workshop on IP Operations and Management Proceedings (IPOM 2004) (IEEE Cat. No. 04EX978)

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (357 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2004, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • President's message

    Publication Year: 2004, Page(s): nil3
    Request permission for commercial reuse | PDF file iconPDF (190 KB) | HTML iconHTML
    Freely Available from IEEE
  • Messages

    Publication Year: 2004, Page(s): nil5
    Request permission for commercial reuse | PDF file iconPDF (196 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference news

    Publication Year: 2004, Page(s):nil7 - nil15
    Request permission for commercial reuse | PDF file iconPDF (2488 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schedule/agenda

    Publication Year: 2004, Page(s):nil17 - nil22
    Request permission for commercial reuse | PDF file iconPDF (791 KB)
    Freely Available from IEEE
  • IP/MPLS OAM: challenges and directions

    Publication Year: 2004, Page(s):1 - 8
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4896 KB) | HTML iconHTML

    This paper reflects different understandings and positions on IP/MPLS OAM functions and management applications, as perceived by representatives from industry and academia. There is a clear effort to improve the state-of-the-art and to apply lessons learnt from the Ethernet/ATM approaches. A series of questions on the short-term, mid-term and long-term directions definitively arises, especially wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The benefits of monitoring routing protocols in live networks

    Publication Year: 2004, Page(s):9 - 15
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4184 KB) | HTML iconHTML

    This paper examines the benefits of deploying protocol centric network monitoring tools in IP and BGP/MPLS VPN networks. For the past three years, we have analysed the routing traffic from the following protocols: IS-IS, BGP and MP-BGP in three different autonomous systems. We explain how one can transform routing protocol packets into valid network management information. We demonstrate that prot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable network monitors for high-speed links: a bottom-up approach

    Publication Year: 2004, Page(s):16 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4232 KB) | HTML iconHTML

    Monitoring traffic on high-speed links using commodity hardware is difficult due to relatively slow buses and memories. It is possible to alleviate the burden on these resources by pushing down packet processing to programmable NICs. Until now, however, the use of such cards for monitoring by network administrators has not been a practical solution, because programming the cards is too complex. Fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicommodity flow optimization in support for packet-switched network traffic engineering

    Publication Year: 2004, Page(s):23 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1504 KB) | HTML iconHTML

    Many contemporary IP routing protocols are based on algorithms that are non-traffic-aware. The chief problem is that very often many comparable traffic flows are misled to converge on bottleneck links since these algorithms are oblivious to traffic characteristics and link loading. One possible remedy to this is to reconstitute them with a better algorithm. We recommend the maximum concurrent mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The analysis of algorithm for efficient network flow monitoring

    Publication Year: 2004, Page(s):29 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1928 KB) | HTML iconHTML

    Effective monitoring of network flow is a key enabling technology for networks and gains extensive attention of researcher. In this paper, we focus efficient monitoring by passive measurement for the network flow on reducing the generation overhead communication as much as possible. The problem of efficient monitoring for the network flow is regarded as the problem to find out the minimum flow par... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An incentive-based quality of service aware algorithm for offline inter-AS traffic engineering

    Publication Year: 2004, Page(s):34 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2912 KB) | HTML iconHTML

    This paper focuses on incentive-based offline inter-AS traffic engineering with end-to-end quality of service (QoS) guarantees. We investigate a key inter-AS traffic engineering problem, the "egress router selection problem". The objective is to select an egress router for each expected aggregate inter-AS traffic flow so that the required end-to-end QoS is provided and the capacity constraint of e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the design and performance of an Internet application traffic monitoring system

    Publication Year: 2004, Page(s):41 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3560 KB) | HTML iconHTML

    In recent years, traffic measurement and analysis have received significant attention due to the increased requirements from various aspects such as SLA monitoring, P2P traffic monitoring and security attacks, etc. But technical challenges have been increased as well because link speed and traffic volume to measure have become huge and the characteristics of Internet applications, which takes majo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance monitoring architecture for IP videoconferencing

    Publication Year: 2004, Page(s):48 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6624 KB) | HTML iconHTML

    In recent years, IP videoconferencing applications are promoting. Since video over IP is sensitive to delay and jitter, network providers are now deploying quality of services (QoS) to support real-time application requirement over their network. Our goal in this paper is to disseminate a performance monitoring architecture for IP videoconference, which is able to both detect end-to-end QoS degrad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategy-based path selection for traffic engineering over MPLS

    Publication Year: 2004, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1288 KB) | HTML iconHTML

    The advantage of multi-protocol label switching (MPLS) is its capability to route the packets through explicit paths. And for traffic engineering over MPLS, the key is to select suitable paths to balance the network load to optimize network resource utilization and traffic performance. And from network carriers' point of view, such optimization should be based on their individual networks, service... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Control transmission pace at IP layer to avoid packet drop

    Publication Year: 2004, Page(s):60 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4048 KB) | HTML iconHTML

    Avoiding packet loss is critical for time sensitive network applications, such as multimedia streams for video/voice. Delaying and dropping low priority packets to ensure high priority and time sensitive data stream deliver during network congestion is a basic QoS (quality of service) mechanism over current network infrastructure. This mechanism works if time sensitive data stream is the minority ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping sub-flows to p2mp LSPs

    Publication Year: 2004, Page(s):67 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4216 KB) | HTML iconHTML

    In previous work we proposed a multi-objective traffic engineering scheme (MHDB-S model) using different distribution trees to multicast several flows. In this paper, we propose a heuristic algorithm to create multiple point-to-multipoint (p2mp) LSPs based on the optimum sub-flow values obtained with our MHDB-S model. Moreover, a general problem for supporting multicasting in MPLS networks is the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient flow control algorithm for multi-rate multicast networks

    Publication Year: 2004, Page(s):74 - 81
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5064 KB) | HTML iconHTML

    This paper describes a novel multi-rate multicast congestion control scheme based on the well-known proportional plus integrative control technique, where the control parameters can be designed to ensure the stability of the control loop In terms of source rate. The congestion controller is located at the next upstream nodes of multicast receivers and has explicit rate (ER) algorithm to regulate t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adding new components to the knowledge plane GMPLS over WDM networks

    Publication Year: 2004, Page(s):82 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5040 KB) | HTML iconHTML

    A recent study defines a new network plane: the knowledge plane. The incorporation of the knowledge plane over the network allows having more accurate information of the current and future network states. In this paper, the introduction and management of the network reliability information in the knowledge plane is proposed in order to improve the quality of service with protection routing algorit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SIP policy control for self-configuring modular firewalls

    Publication Year: 2004, Page(s):87 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4624 KB) | HTML iconHTML

    The session initiation protocol (SIP) is one of the major protocols used in voice over IP telephony. A major problem running SIP today are firewalls and network address translators, which block the data of voice calls, because it is carried over UDP. The SIP signaling messages are running over firewalls when properly configured (port 5060 open), but voice data is dropped, because it typically uses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance optimizations for certificate revocation

    Publication Year: 2004, Page(s):94 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2080 KB) | HTML iconHTML

    Certificate revocation is an outstanding problem in PKI. This paper extends Naor's scheme of dynamic hash tree in order to optimize performance. Set of revoked certificates is divided into groups. In each group, proofs for certificate status are computed by using one-way accumulator, while all groups are still organized in hash tree. The main advantage of the proposed scheme is that it can adjust ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow-based anti-spam

    Publication Year: 2004, Page(s):99 - 103
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3120 KB) | HTML iconHTML

    Approximately 40% of all email in the Internet is spam, and its volume is growing rapidly. Blackhole list and mail filter are the main measures to defend the spam at present. But as a matter of fact, the situation of spam flooding tends to be more and more terrible. In this paper, we proposed a new technology of anti-spam based on flows, which could detect spam and abnormal email behaviors in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic scheme to extract attack strategies for Web service network security

    Publication Year: 2004, Page(s):104 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2640 KB) | HTML iconHTML

    In the recent years, Web technologies have been used to provide an interface to the distributed services. The advent of the computer networks has accelerated this development, and has sparked the emergence of the numerous environments that enable Web services. However, the computer network security against the distributed denial of service attacks (DDoS) attacks attracts more attentions. The overw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-pages sojourn times in high speed networks

    Publication Year: 2004, Page(s):112 - 116
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1672 KB) | HTML iconHTML

    Processor sharing (PS) queuing systems have been historically applied for the estimation of file Sojourn times. We present a model for Web-pages sojourn times at the session-layer by incorporating the time spent by TCP in its slow start and congestion avoidance phases. The model is a function of not only the residual capacity of the bottleneck link but also of the packet loss probability and round... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.