By Topic

Networking and Services, 2007. ICNS. Third International Conference on

Date 19-25 June 2007

Filter Results

Displaying Results 1 - 25 of 126
  • Third International Conference on Networking and Services - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Third International Conference on Networking and Services - Title page

    Publication Year: 2007, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Third International Conference on Networking and Services - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (422 KB)
    Freely Available from IEEE
  • Third International Conference on Networking and Services - Table of contents

    Publication Year: 2007, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2007, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (23 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2007, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Host Identity Specific Multicast

    Publication Year: 2007, Page(s): 1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    Multicasting is a key technology for both users and service providers as it enables important bandwidth savings, and thus lower costs, for content distribution and group communication. The current network level multicast solutions have several weaknesses. These issues are partly related to a problem embedded in the use of the IP addresses themselves. Currently an IP address is both an identifier o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring Network Parameters with Hardware Support

    Publication Year: 2007, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    To provide good QoS in a computer network, robust means to measure essential network parameters are required. A multitude of options are available to perform this task. This report details our hardware implementation of three such schemes on FPGAs (Field-Programmable Gate Arrays). The first scheme calculates the packet loss and one-way network delay using RTF over UDP; the second one uses the conc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy-Efficient Mechanism using CLMAC Protocol for Wireless Sensor Networks

    Publication Year: 2007, Page(s): 3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB) | HTML iconHTML

    Energy efficiency is a key issue because most wireless sensor networks use battery-oriented computing and sensing devices. A network of these devices will collaborate for a common application such as environment monitoring. Thus, energy-efficient MAC protocols have focused on minimizing idle listening time at sensor nodes. Recently, energy-efficient protocols such as S-MAC, B-MAC and EA-ALPL propo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Lightweight Traffic Management Approach for Service Differentiation

    Publication Year: 2007, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    This paper presents a new traffic management solution suitable for "lightweight" QoS-based delivery services. The proposed mechanism not only can be deployed in an incremental fashion to the current best-effort Internet but it also interacts autonomously with existing intra-domain routing protocols to provide differentiated treatment to traffic belonging to distinct traffic classes within a common... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simplified Network Management with DACS Scheme

    Publication Year: 2007, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB) | HTML iconHTML

    When operation and management in the university network are performed, various problems occur. As one of those problems, user support problems in the network are often shown. As an example, coping with annoying communication to other users is described. The word of "annoying communication" means the communication which adversely affects processing performance and communication speed of other clien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trouble Shooting in Distributed Service Centers

    Publication Year: 2007, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    The increasing number of internetworking communication networks and technologies require more and more flexible computing solutions, connecting resources in a transparent, open and reliable way. Parallelism and redundancy enables distributed service centers to provide sustained high quality of service and performance. Similar approaches are also used in other distributed systems. Unfortunately, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards System-level Optimization for High Performance Unified Threat Management

    Publication Year: 2007, Page(s): 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (130 KB) | HTML iconHTML

    To build holistic protection against complex and blended network threats, multiple security features need to be integrated into unified security architecture, which requires in a unified threat management (UTM). However, most existing UTMs operate by simply stringing together a number of security applications working independently without system level optimization that streamlines processing flow ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Adaptations to Traffic Quality Requirements

    Publication Year: 2007, Page(s): 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    In this paper, we present DDQoS, or Distributed Dynamic Quality of Service, a novel architecture which uses QoS-configured routers as a support layer for a distributed approach on policy-based management system. The main purpose of this work is to model and test a distributed framework for globally (in a domain network) controlling QoS traffic classes parameters, in an effort to dynamically reach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure routing protocol for ad hoc networks based on trust

    Publication Year: 2007, Page(s): 9
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (110 KB) | HTML iconHTML

    Routing protocols will be a fundamental piece in the operation of ad-hoc networks. These protocols must fulfil the main objective of using valid routes among the different nodes that form the net in a correct and efficient way keeping in mind the possibility that malicious nodes may exist in the net, and protecting the communication of non-allowed accesses. This work presents a proposal of a secur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reservation-Based Data Flow Scheduling in Distributed Control Applications

    Publication Year: 2007, Page(s): 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    Remote process control and supervision applications developed over the Internet require special communication models and techniques, which can guarantee the real-time and safety restrictions inherent to automation systems. This paper presents a communication model based on dataflow analysis and bandwidth reservation that offers a good control over the transmission time of critical data. As part of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Point-to-Point Services in Hybrid Networks: Technologies and Performance Metrics

    Publication Year: 2007, Page(s): 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    Research networks, apart from pure IP packet-switched services, progressively introduce hybrid services, which combine packet switching and circuit switching technologies. Optical wavelengths (lambdas), SONET/SDH, 1/10 gigabit Ethernet are examples of technologies stitched together in order to realize point-to-point (P2P) services that cross multiple domains. Network monitoring aims to detect anom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extended DACS Scheme Implementing Security Function

    Publication Year: 2007, Page(s): 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    When customers with different membership and position use computers as in the university network systems, it often takes much time and efforts for them to manage a network system. This is because the requirements for the respective computer usage are different in network and security policies. In this paper, the destination addressing control system scheme (DACS scheme) for the university network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DRR-SFF: A Practical Scheduling Algorithm to Improve the Performance of Short Flows

    Publication Year: 2007, Page(s): 13
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    Short flow first scheduling (SFF) strategy is effective in obtaining more stringent performance bounds for short flows in Internet. However, previous strict SFF approaches invested the short flows with excessive preference leading to the starvation of other long flows. Moreover, these SFFs are hard to be deployed due to either extreme complexity or the modification of TCP protocol. Inspired by the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conversational Model Based VoIP Traffic Generation

    Publication Year: 2007, Page(s): 14
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    VoIP (voice over IP) traffic generation has significant meaning for the measurement of VoIP quality in networks, but existing generation methods are insufficient both in reality and interactivity, and thus affect the accuracy of VoIP quality measurement. This paper proposes a conversational model based VoIP traffic generation algorithm, which simulates the behavior of two users in a VoIP session, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Service Manager for Seamless Service Continuity

    Publication Year: 2007, Page(s): 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    The IT domain has considerably evolved, users are now surrounded with cheaper and more powerful terminals than ever. Mobile and fixed devices connected to high-speed network technologies can bring out for the owners almost any services. But if the technology advances allow the user to enjoy his services more freely and conveniently, are the mobility mechanisms ready to offer a real seamless experi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Wireless Mesh Network-based System for Hotspots Deployment and Management

    Publication Year: 2007, Page(s): 16
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    In recent years Wireless Local Area Networks (WLANs) or hotspots, as they are commonly known, have emerged as a promising networking platform to extend network connectivity in public venues, providing local coverage for Internet applications on the move in urban areas and rural environments. Wireless hotspots using 802.11-based technology have popped up in corporate offices, coffeehouses, airports... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On assuring QoS in Ethernet access network

    Publication Year: 2007, Page(s): 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    This paper deals with the problem of assuring strict QoS guarantees for the end to end connections that originate from Ethernet access network. It shows that despite high link capacities in some cases Ethernet network might be the reason of QoS deterioration. The primary reason is the lack of appropriate QoS differentiation and traffic isolation mechanisms. The shared buffers and priority schedule... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to QoS-aware Service Selection in Dynamic Web Service Composition

    Publication Year: 2007, Page(s): 18
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    Web service composition has been recognized as a flexible way for resource sharing and application integration. For Web services providing similar functionality, quality of service (QoS) is the main factor to differentiate them. In this paper, the issue of QoS driven service selection in dynamic Web service composition is investigated. OWL-S is extended with a flexible QoS model to better facilita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Automatic Traffic Classification

    Publication Year: 2007, Page(s): 19
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Classification of network traffic recently has attracted a great deal of interest as it plays important roles in many areas such as traffic engineering, service class mapping, network management etc. One of the challenging issues for existing detection schemes is that they need prior manual analysis to detect unknown traffic, which is infeasible to cope with the fast growing number of new applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.