By Topic

Local and Metropolitan Area Networks, 2008. LANMAN 2008. 16th IEEE Workshop on

Date 3-6 Sept. 2008

Filter Results

Displaying Results 1 - 25 of 27
  • [Title page]

    Publication Year: 2008 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (210 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008 , Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (129 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): iii - v
    Save to Project icon | Request Permissions | PDF file iconPDF (59 KB)  
    Freely Available from IEEE
  • 2008 16th IEEE workshop on local and metropolitan area networks Referees

    Publication Year: 2008 , Page(s): vii
    Save to Project icon | Request Permissions | PDF file iconPDF (38 KB)  
    Freely Available from IEEE
  • Welcome!

    Publication Year: 2008 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (156 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • LANMAN 2008 Committees

    Publication Year: 2008 , Page(s): vi
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • Greetings from the technical program committee chairs

    Publication Year: 2008 , Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (311 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Deployment guidelines for highly congested IEEE 802.11b/g networks

    Publication Year: 2008 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (276 KB) |  | HTML iconHTML  

    Over the years, IEEE 802.11b/g wireless networks have been deployed in various locations such as hotels, airports and enterprises. Although IEEE 802.11b/g can be considered a mature technology, its deployment still presents challenges due to the limited number of non-overlapping channels available. This is particularly true in scenarios with a high density of users where a large number of APs cove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distribution system for large scale IEEE 802.11 Wireless LANs

    Publication Year: 2008 , Page(s): 7 - 12
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (243 KB) |  | HTML iconHTML  

    We present extensions to the IEEE 802.11 WLAN architecture to facilitate the deployment and operation of large-scale networks. A new distribution system (DS) is designed to work across IP networks removing the need for an Ethernet backbone. APs connected to different IP networks can join the DS to form a single WLAN, with link-layer mobility support for users. Two entities, portal and registry, ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical evaluation of H.264 video streaming over IEEE 802.11e devices by cross-layer signaling

    Publication Year: 2008 , Page(s): 13 - 18
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    Recent years have seen a growing demand for high quality multimedia traffic over wireless links. Due to the strong demands imposed to all the involved actors, several optimization techniques have been proposed and studied, mostly through theoretical analysis and simulation. In this article we focus on the practical evaluation of H.264 video streaming performance over IEEE 802.11e wireless devices.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement-based analysis of the performance of several wireless technologies

    Publication Year: 2008 , Page(s): 19 - 24
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (735 KB) |  | HTML iconHTML  

    Wireless technologies have rapidly evolved and are becoming ubiquitous. An increasing number of users attach to the Internet using these technologies; hence the performance of these wireless access links is a key point when considering the performance of the whole Internet. In this paper we present a measurement-based analysis of the performance of an IEEE 802.16 (WiMAX) client and an UMTS client.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New prioritization schemes for QoS provisioning in 802.11 wireless networks

    Publication Year: 2008 , Page(s): 25 - 30
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (397 KB) |  | HTML iconHTML  

    Due to the unreliable nature of the wireless medium, provisioning of quality of service (QoS) in wireless LANs is far more complicated than in wired networks. In order to address this challenge, IEEE 802.11e defines a framework for QoS support where packets are prioritized based on their traffic characteristics. In this paper, we propose two new QoS support schemes. One is based on a ldquouser cen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative setting of RTS/CTS in multi-rate multi-BSS IEEE 802.11 wireless LANs

    Publication Year: 2008 , Page(s): 31 - 36
    Cited by:  Papers (2)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    Despite the fact that the Request-To-Send/Clear-To-Send (RTS/CTS) protocol significantly reduces collisions and retransmissions due to the hidden node problem, it is well known that it adds considerable overhead specially with small payload packets. The IEEE 802.11 standard defined a manageable parameter, RTS threshold, above which a data packet should be preceded with RTS/CTS handshake. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing the channel load reporting process in IEEE 802.11k-enabled WLANs

    Publication Year: 2008 , Page(s): 37 - 42
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (388 KB) |  | HTML iconHTML  

    IEEE 802.11 k is an extension of the IEEE 802.11 specification for radio resource measurements. In an IEEE 802.11 k-enabled wireless LAN, an access point or other network element may request from a client or another access point to monitor and report the load of a channel. We call the latter a channel monitoring station. In this paper we propose a mechanism for a channel monitoring station to effi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network planning for disaster recovery

    Publication Year: 2008 , Page(s): 43 - 48
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (245 KB) |  | HTML iconHTML  

    Disaster recovery and business continuity issues are becoming fundamental in networks since the importance and social value of digital data is continuously increasing. On the one hand, there is an obvious need of backing up data for resilience against major failures; in many situations the process of storing backup data is also enforced by the law. On the other hand, providing services that allow ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-layer failure restoration techniques for a robust IPTV service

    Publication Year: 2008 , Page(s): 49 - 54
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (281 KB) |  | HTML iconHTML  

    Broadcast TV distribution over an IP network requires stringent QoS constraints, such as low latency and loss. The main challenge to achieving these QoS objectives is how to design the network to respond to network failures. Streaming content in IPTV is typically delivered to the distribution points on the IP backbone using IP multicast, and in the case being considered, with protocol independent ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed sampling for on-line SLA assessment

    Publication Year: 2008 , Page(s): 55 - 60
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (193 KB) |  | HTML iconHTML  

    New business infrastructures over the Internet pose a new set of traffic constraints. In particular, multimedia and interactive contents require guarantees of bandwidth and delivery time. The broad deployment and real-time nature of this class of applications require the provisioning of specific resources in the network to guarantee a certain level of quality of service (QoS). QoS techniques need ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximizing packet loss monitoring accuracy for reliable trace collections

    Publication Year: 2008 , Page(s): 61 - 66
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (263 KB) |  | HTML iconHTML  

    Network traces are a valuable source of information for modeling and analysis of network behavior and for the evaluation of network protocols. These crucial activities should be supported with reliable traffic traces. Reliable packet capturing facilities should be devoted to avoid losing packets and at the very last, report when packets have been lost with the highest accuracy possible. This paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Seamless Internet Mobility

    Publication Year: 2008 , Page(s): 67 - 72
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (171 KB) |  | HTML iconHTML  

    Mobility is a requirement not appropriately addressed by the original design of the Internet since an IP address has two fundamentally different tasks. It specifies a network location (for routing) and serves as an application identifier. A plethora of suggestions have been made to overcome this, e.g., Mobile IP and HIP. Yet, each of the proposed solutions has drawbacks such as requiring fundament... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Explorative analysis of one-way delays in a mobile 3G network

    Publication Year: 2008 , Page(s): 73 - 78
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (378 KB) |  | HTML iconHTML  

    In this paper we investigate the dynamics of one-way delays in an operational mobile core network. Our final goal is to develop anomaly detection schemes for the packet delay process in order to reveal network and equipment problems. This requires a preliminary exploration of the delay distribution in the core network, which we undertake in this study. We present one-way delay measurements extract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of dynamic bandwidth allocation algorithms for G-PON systems using a reconfigurable hardware testbed

    Publication Year: 2008 , Page(s): 79 - 84
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (365 KB) |  | HTML iconHTML  

    The capabilities of passive optical networks (PONs) are strongly influenced by the quality of the used dynamic bandwidth allocation (DBA) algorithm. DBA algorithms control the assignment of available upstream bandwidth to the users connected to the PON. In an oversubscribed environment, that poses a challenge regarding the selection of an appropriate DBA algorithm. Therefore, DBA algorithms are su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rethinking the timescales at which congestion-control operates

    Publication Year: 2008 , Page(s): 85 - 90
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (223 KB) |  | HTML iconHTML  

    The efficiency of TCP congestion-control in achieving high throughput is quite poor in high-speed, lossy, and dynamic-bandwidth environments. The main culprit is the slow bandwidth-search process used by TCP, which may take up to several thousands of round-trip times (RTTs) in searching for and acquiring the end-to-end spare bandwidth. While several alternate protocols have been proposed to speed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing channel assignment with rearrangement in multi-channel wireless line networks

    Publication Year: 2008 , Page(s): 91 - 95
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (403 KB) |  | HTML iconHTML  

    In this paper, we analyze the blocking performance of a channel assignment scheme in a multi-channel wireless line network. We assume that the existing calls in the network may be rearranged on different channels to accommodate an incoming call. The analysis is limited to single-hop calls with different transmission ranges. Through extensive simulations, we demonstrate that the developed analytica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of a cooperative MAC protocol using a software defined radio platform

    Publication Year: 2008 , Page(s): 96 - 101
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (275 KB) |  | HTML iconHTML  

    Cooperation in wireless networks has shown significant performance gains in comparison to legacy wireless networks. Cooperative wireless protocols achieve such efficiency by enabling cooperation among nodes to exploit spatial diversity. CoopMAC is a medium access control (MAC) protocol that enables cooperation by using an intermediate node as a helper to a direct communication under poor channel c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Address and traffic dynamics in a large enterprise network

    Publication Year: 2008 , Page(s): 102 - 107
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3421 KB) |  | HTML iconHTML  

    Despite the centrally-managed nature of and critical infrastructure provided by enterprise networks, analyses of their characteristics have been limited. In this paper we examine the dynamics of enterprise networks from two distinct perspectives, namely traffic and addressing. Using a large packet trace spanning approximately 3.5 weeks coupled with diverse other data sources, we pose and answer a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.