By Topic

Telecommunication Networking Workshop on QoS in Multiservice IP Networks, 2008. IT-NEWS 2008. 4th International

Date 13-15 Feb. 2008

Filter Results

Displaying Results 1 - 25 of 59
  • Proceedings of the 2008 4th international telecommunication networking workshop on QoS in multiservice IP networks

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (478 KB)
    Freely Available from IEEE
  • Proceedings of the 2008 4th international telecommunication networking workshop on QoS in multiservice IP networks

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (841 KB)
    Freely Available from IEEE
  • Hub page

    Publication Year: 2008, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Session list

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • IT-NEWS 2008 table of contents

    Publication Year: 2008, Page(s):iv - ix
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • IT-NEWS 2008 brief author index

    Publication Year: 2008, Page(s):x - xiii
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • IT-NEWS 2008 detailed author index

    Publication Year: 2008, Page(s):xiv - xliv
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • IT-NEWS 2008 the end of indexes

    Publication Year: 2008, Page(s): xlv
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Information for authors

    Publication Year: 2008, Page(s): xlvi
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Frequently asked questions

    Publication Year: 2008, Page(s):xlvii - xlix
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2008, Page(s): l
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Welcome message from the general chair

    Publication Year: 2008, Page(s): li
    Request permission for commercial reuse | PDF file iconPDF (63 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome message from the technical program co-chairs

    Publication Year: 2008, Page(s): lii
    Request permission for commercial reuse | PDF file iconPDF (61 KB) | HTML iconHTML
    Freely Available from IEEE
  • IT-NEWS 2008 Committees

    Publication Year: 2008, Page(s): liii
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2008, Page(s): liv
    Request permission for commercial reuse | PDF file iconPDF (1067 KB)
    Freely Available from IEEE
  • A push-based scheduling algorithm for large scale P2P live streaming

    Publication Year: 2008, Page(s):1 - 7
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB) | HTML iconHTML

    this paper, we present a chunk scheduling algorithm for a mesh-based peer-to-peer live streaming system and we evaluate it by simulations over large-scale networks. Literature papers typically design chunk scheduling algorithms by considering the chunk delivery ratio as performance metric. We propose a push-based algorithm, which not only tries to maximize the chunk delivery ratio but it also take... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the effect of free-riders in P2P streaming systems

    Publication Year: 2008, Page(s):8 - 13
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Peer-to-peer applications exploit the users willingness to contribute with their upload transmission capacity, achieving this way a scalable system where the available transmission capacity increases with the number of participating users. Since not all the users can offer upload capacity with high bitrate and reliability, it is of interest to see how these non-contributing users can be supported ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing the network behavior of P2P traffic

    Publication Year: 2008, Page(s):14 - 19
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Nowadays the majority of Internet traffic is generated by peer-to-peer (P2P) file sharing applications. As the popularity of these applications has been increasing dramatically over the past few years, it becomes increasingly important to analyze their behavior and to understand their effects on the network. The ability to quantify their impact on the network is fundamental to a number of network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of search strategies in two-tier peer-to-peer networks

    Publication Year: 2008, Page(s):20 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    In this paper we analyze the performance of generalized flooding search strategies in two-tier peer-to-peer networks by means of random graphs. In particular, the connections between top and bottom-level peers are modeled as a bipartite random graph while the overlay network used by top-level peers to forward queries is modeled as a generalized random graph. To assign realistic values to the input... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Definition and performance evaluation of a request routing algorithm to distribute digital cinema contents

    Publication Year: 2008, Page(s):27 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    In this work, carried out in the framework of the IST Project EDCINE, we deal with the network distribution of Digital Cinema contents, through a Content Delivery Network, towards theatres. One of the main criticalities of the system is the very large size of the contents to be transferred while respecting the maximum download time requirements. From the operator perspective, this criticality tran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of provisioning as an OPEX-related issue in research networks

    Publication Year: 2008, Page(s):33 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (479 KB) | HTML iconHTML

    National Research and Education Networks (NERNs) are investigating the option to migrate their infrastructure from IP over static transport network to IP over control- plane based transport network, possibly deploying GMPLS or ASON technology. In the NREN-participated MUPBED project, quality of provisioning of bandwidth on-demand services has been studied. In this paper the main results are presen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of QoS control capabilities in SINET3

    Publication Year: 2008, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    This paper describes the QoS control capabilities in the new Japanese academic network, SINET3. SINET3 is a nationwide QoS-aware multi-layer network for more than 700 universities and research institutions and provides a variety of high-quality network services including packet-based QoS services and circuit-based bandwidth-on-demand services. These diversified network services are provided by eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal design of service overlay networks

    Publication Year: 2008, Page(s):46 - 52
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (141 KB) | HTML iconHTML

    Service Overlay Networks (SONs) are currently one of the most promising architectures envisioned to provide end-to- end Quality of Service guarantees in the Internet, without requiring significant changes to the underlying network infrastructure. A SON is an application-layer network operated by a third- party Internet Service Provider (ISP) that owns a set of overlay nodes, residing in the underl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the unfairness among TCP flows in IEEE 802.11 multi-hop ad-hoc networks

    Publication Year: 2008, Page(s):53 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    The problem of unfairness among competing flows in TCP multihop wireless networks is well known, and has often been traced to the misbehaviour of dynamic routing protocols in case of link failure. We show, through simulations, that the competition between TCP flows in a multihop wireless network leads to an unfair outcome, independently of the routing protocol involved. We focus on the impact of h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Admission control of VoIP calls in EDCA WLANs: Analysis and experimentation

    Publication Year: 2008, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    The enhanced distributed channel access (EDCA) is a component of the new IEEE 802.11e standard [2], which introduces Quality of Service (QoS) support in Wireless LANs (WLANs). This paper proposes a model for the VoIP capacity of an EDCA WLAN. The proposed solution decouples the problem of estimating stations performance and that of evaluating channel congestion. Moreover, it models the dynamics of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.