By Topic

Local & Metropolitan Area Networks (LANMAN), 2011 18th IEEE Workshop on

Date 13-14 Oct. 2011

Filter Results

Displaying Results 1 - 25 of 33
  • [Title page]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Message from general co-chairs

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (214 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from technical program co-chairs

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (172 KB) | HTML iconHTML
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (439 KB)
    Freely Available from IEEE
  • Performance analysis of IEEE 802.11 distributed coordination function in presence of hidden stations under non-saturated conditions with infinite buffer in radio-over-fiber wireless LANs

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (883 KB) | HTML iconHTML

    We present an analytical model to evaluate the performance of the IEEE 802.11 Distributed Coordination Function (DCF) with and without the RTS/CTS handshake in radio-over-fiber (RoF) wireless LANs. The model captures the effects of contending nodes as well as hidden terminals under non-saturated traffic conditions assuming large buffer sizes. The effect of fiber propagation delay is considered. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning a pricing strategy in multi-domain DWDM networks

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2126 KB) | HTML iconHTML

    In today's Internet the commercial aspect of routing is gaining more and more importance. Commercial agreements between ISPs (i.e. transit and peering agreements) influence the inter-domain routing policies which are now driven by monetary aspects as well as global resource and performance optimization. To allow scalability and protect business critical topology information, hierarchical routing a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • G-COPSS: A content centric communication infrastructure for gaming applications

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1413 KB) | HTML iconHTML

    With users increasingly focused on an online world, an emerging challenge for the network infrastructure is the need to support Massively Multiplayer Online Role Playing Games (MMORPG). This is an application domain that is attracting more players than ever before, very often with players distributed over a metropolitan area. Currently, MMORPG are built on an IP infrastructure with the primary res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of cross traffic burstiness on the packet-scale paradigm

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (662 KB) | HTML iconHTML

    The packet-scale paradigm is a novel framework for achieving ultra-high speed congestion control. Due to its reliance on finely-controlled inter-packet gaps, the paradigm is expected to be sensitive to transient burstiness in traffic encountered on bottleneck links. This paper uses a first-principles approach to study the impact of cross traffic burstiness on the efficiency of the packet-scale par... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connection rerouting in GRWA networks

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1287 KB) | HTML iconHTML

    Traffic grooming consists of packing low rate streams onto a high speed lightpath in order to effectively use the network resources. Under dynamic traffic, rerouting of ongoing connections has been envisioned as a means, to be used very wisely, to reduce the connection blocking rate and to optimize the network resources. In a context of traffic with QoS constraints, only the delay tolerant ongoing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow isolation in optical networks

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    We address the issue of ensuring the integrity and privacy of communications in optical networks. To this end, we extend the traffic grooming concept to encompass flow isolation considerations through a multi-class traffic model. We develop, solve, and compare ILP formulations that ensure that only traffic components within the same class are groomed onto (share) the same wavelength. Our approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling linear network for space and time efficiency

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1021 KB) | HTML iconHTML

    We consider scheduling resources on linear networks where each request is for a set of contiguous resources and for a different amount of time. Allocating spectrum to satisfy variable size data communication requests, utilizing linear resource on a light-trail network for higher efficiency, scheduling communication path for a segmented light-trails network or a multi-hop network with no intermedia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transport layer performance of hybrid networks combining multiple EPONs and OBS

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    In this paper the performance of a hybrid optical network composed of multiple Ethernet Passive Optical Networks (EPONs) at the access connected to an Optical Burst Switching (OBS) core is evaluated. The EPONs make use of the IPACT algorithm to manage the upstream transmissions, whereas the OBS edge node employs a time-based assembly scheme for burst aggregation. This leads to interoperability iss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NetBoxIT: Virtual emulation integrated testbed for the heterogeneous networks design

    Publication Year: 2011, Page(s):1 - 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    We present a novel approach to heterogeneous networks study based on the implementation of a modular, extensible, and scalable testbed that uses virtualized network emulators. Our goal is to reproduce complex networks scenarios by interconnecting several emulators, concurrently running within a single hardware platform. This paper analyzes the testbed performance with simple emulation trials, to v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental performance evaluation of a virtual software router

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (78 KB) | HTML iconHTML

    Software routers (SRs) are an alternative low-cost and moderate-performance router solutions implemented with general-purpose workstations able to host multiple network interface cards (NICs). Workstations can be programmed to forward packets between different NICs and to participate in routing functions. Virtualization can be used to model new protocols or hardware systems in software and without... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Femtocell-assisted location authentication

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Location-based applications (e.g., foursquare, Groupon) rely on each client's assertion of his or her location (e.g., uploaded GPS coordinates). Yet these service providers seek methods to authenticate the location of clients to enhance targeted service delivery and support their advertisers. We propose an intelligent infrastructure-based solution that provides spontaneous, transaction-oriented, c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A routing approach to jamming mitigation in wireless multihop networks

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (92)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Wireless networks are susceptible to localized disruptions, due to the shared nature of the medium. Radio jamming, the most common type of localized disruption causes wireless link failures. Jamming mitigation has been traditionally addressed in the physical and MAC layers. Such approaches come with added complexity and often require specialized hardware. We investigate whether a generally applica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forthroid on Android: A QR-code based information access system for smart phones

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (823 KB) | HTML iconHTML

    The Forthroid is a location-based system that “augments” physical objects with multimedia information and enables users to receive information about physical objects or request services related to physical objects. It employs computer-vision techniques and Quick Response codes (QR-codes). We have implemented a prototype on Android platforms and evaluated its performance with systems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of constrained application protocol for wireless sensor networks

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) and IPv6 Routing Protocol for Low-power and Lossy networks (RPL) have accelerated the integration of Wireless Sensor Networks (WSNs) and smart objects with the Internet. At the same time, the development of the Constrained Application Protocol (CoAP) has made it possible to provide resource constrained devices with web service functiona... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software defined networking: Meeting carrier grade requirements

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1096 KB) | HTML iconHTML

    Software Defined Networking is a networking paradigm which allows network operators to manage networking elements using software running on an external server. This is accomplished by a split in the architecture between the forwarding element and the control element. Two technologies which allow this split for packet networks are For CES and Openflow. We present energy efficiency and resilience as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segment p-cycle design with full node protection in WDM mesh networks

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1493 KB) | HTML iconHTML

    Segment p-cycles offer an interesting compromise between the classical (link) p-cycles and the path p-cycles (also known as FIPP p-cycles), inheriting most advantages of both p-cycle schemes. In their original form, segment p-cycles do not offer 100% node protection, i.e., do not guarantee any protection against node failure for the endpoints of the segments. Indeed, if we allow some p-cycle overl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A congestion-aware rerouting scheme in RPR networks

    Publication Year: 2011, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    In this paper, a congestion-aware rerouting (CAR) scheme is proposed based on the fairness mechanism of RPR for better throughput. If all flows competing for the bandwidth of the congested link converge to the steady rate, we try to find an alternate path to gain more bandwidth than the current path for some traffic flow passing through the congested link. Meanwhile, the throughput of flows traver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case study of a gearbox-like routing algorithm selection in runtime

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Routing protocols for the Future Internet need to adapt for any given status of the network. However the legacy routing algorithms (e.g. Dijkstra) could not seize the congestion determined by any other event except link failure and/or Layer 2 technology changes. Instead of a sophisticated mechanism we select the most competitive path determination solution to be used by a generic link-state based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.