Networks, 1999. (ICON '99) Proceedings. IEEE International Conference on

28 Sept.-1 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 53
  • A fast and scalable IP lookup scheme for high-speed networks

    Publication Year: 1999, Page(s):211 - 218
    Cited by:  Papers (7)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (564 KB)

    One of the key design issues for the next-generation IP routers is the IP lookup mechanism. For each incoming IP packet, the IP routing needs to perform a longest prefix matching on the address lookup in order to determine the packet's next hop. Currently, the process is done in software and has become a major bottleneck of the router performance. In this paper, we propose a high-speed IP lookup s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A transmission availability forecast service for Internet protocol networks

    Publication Year: 1999, Page(s):203 - 210
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (96 KB)

    One important characteristic of a network connection is the bandwidth available to clients using that connection. The available bandwidth is determined by a combination of physical link speeds and network congestion. This paper recognises the explosion of interest in the use of Internet protocol networks within the Australian Defence Organisation and describes the development of a software tool fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-adaptive TDMA protocols: a learning-automata-based approach

    Publication Year: 1999, Page(s):85 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (184 KB)

    Due to its fixed assignment nature, the well-known TDMA protocol suffers from poor performance when the offered traffic is bursty. In this paper a learning-automata-based time division multiple access protocol, which is capable of operating efficiently under bursty traffic conditions, is introduced. According to the proposed protocol, the station which grants permission to transmit at each time sl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fair queueing algorithm for multiple-streams delay-bounded services

    Publication Year: 1999, Page(s):234 - 241
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (912 KB)

    In this paper, we propose a resource reservation and scheduling algorithm which guarantees the end-to-end delay constraints for the processing of single-source multiple-stream delivery. User applications initiate the requests by specifying the tolerable delay and priorities reflecting the preference for each stream. In order to provide efficient flow scheduling subject to the fairness and delay co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical user mobility prediction algorithm for supporting adaptive QoS in wireless networks

    Publication Year: 1999, Page(s):104 - 111
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (120 KB)

    A number of user mobility prediction algorithms have been reported in the literature. These may be used for resource reservation and service pre-configuration/adaptation in future wireless networks to provide QoS guarantees. However, our analysis of some of these techniques using measured cellular performance shows that these models do not accurately represent the mobility patterns of users. As a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia conferencing: designed with H32X capabilities

    Publication Year: 1999, Page(s):367 - 371
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (36 KB)

    Multimedia conferencing technology is becoming increasingly important, as it enables people who are located in different cities (or countries) to share as well as interact with their data, comments, images, and video pictures. This paper introduces the multimedia conferencing standards, such as ITU-T T.120, T.130, H.320, H.323, and H.324, which comprise the core technologies for multimedia confere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification and comparison of schemes for providing scalable IP services over ATM networks

    Publication Year: 1999, Page(s):195 - 202
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (136 KB)

    There are several approaches for the provision of scalable backbone IP over cell-based networks including multi-protocol label switching (MPLS) and multi-protocol over ATM (MPOA). This paper provides a classification that highlights the major differences between the various approaches. We classify approaches according to cut-through flow classification, path determination and forwarding granularit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with ATM switch performance testing

    Publication Year: 1999, Page(s):143 - 150
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (48 KB)

    For users to be able to compare performance of different switches, it is important to have a common set of metrics. Examples of several such metrics and their measurements are presented in this paper. These measurements and metrics have impacted standardization efforts in this area. The key distinguishing feature of our effort is its emphasis on frame-level metrics (rather than cell-level metrics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalizing certificate management systems

    Publication Year: 1999, Page(s):340 - 348
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (128 KB)

    Certificate management systems (CMS) are used for generating, distributing, storing and verifying certificates. They play an important role in network security applications. This paper presents a mathematical model for such systems. An approach to the formal specification of a CMS structure and its dynamic changes is described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACK delay control for improving TCP throughput over satellite links

    Publication Year: 1999, Page(s):303 - 312
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (144 KB)

    TCP has been proved to work well in a variety of situations. However, in links of large bandwidth products, e.g., satellite links, TCP might underutilize the link and degrade the reliability. A number of revised algorithms have been proposed to improve TCP performance. In this paper, we propose a new algorithm to improve TCP throughput without modifying the TCP protocol. Since TCP uses acknowledge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parameter adaptive congestion control of ABR traffic in ATM networks

    Publication Year: 1999, Page(s):227 - 233
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (108 KB)

    Congestion control is an important issue in resource management of ATM networks. It is therefore necessary to develop stable rate-based ABR congestion control schemes that minimise or prevent cell loss, require small buffer sizes and minimise end to end delay. Although there are some excellent congestion control methods reported in the literature that use formal control theory, the issues of ensur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of polling strategy on capacity of 802.11 based wireless multimedia LANs

    Publication Year: 1999, Page(s):96 - 103
    Cited by:  Papers (14)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (116 KB)

    Wireless local area networks are a viable technology to support multimedia traffic. One of the prominent wireless local area network standards being adopted as a mature technology is the IEEE 802.11 standard. In wireless multimedia networks, mobile stations will be capable of generating a heterogeneous traffic mix and therefore it is crucial to devise an efficient bandwidth allocation scheme to sa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent buffer management approach for GFR services in IP/ATM internetworks

    Publication Year: 1999, Page(s):156 - 162
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (180 KB)

    In ATM networks, the guaranteed frame rate (GFR) service has been designed to accommodate non-real-time applications, such as TCP/IP-based traffic. The GFR service not only guarantees a minimum throughput at the frame level, but also supports a fair share of available resources. In this article, we propose a buffering strategy called intelligent fair buffer allocation (IFBA) that provides MCR (min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security management against cloned cellular telephones

    Publication Year: 1999, Page(s):356 - 363
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (96 KB)

    The present work describes a security management system against the frauds related with the cloning of cellular telephones. The system intends to make this fraud a nonlucrative business, and then, to finish it. The system uses three main techniques: (1) the ISO 8807 technique (FDT LOTOS) is used to specify and validate the system through Eucalyptus software employment; (2) a pattern recognition te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical approaches for connection admission control in multiservice networks

    Publication Year: 1999, Page(s):172 - 177
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (56 KB)

    In this paper, we test and compare the effectiveness of various connection admission control (CAC) schemes when confronted by heavy arrivals of new connection requests in a link with different server rates. Four CAC schemes are used for this study. The first two schemes are based on the use of a priori traffic information and the model-based approach of computing the desired service bandwidth. For... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal base station placement and fixed channel assignment applied to wireless local area network projects

    Publication Year: 1999, Page(s):186 - 192
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (108 KB)

    The project of a wireless local area network (WLAN) has two major issues: determining the best placement of the base stations (BS) and assigning the frequency channels for the stations. The correct BS placement minimizes the number of stations necessary to cover the desired attendance area, reducing installation costs. The channel assignment determines the frequency band to be used by each BS, min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random early marking: an optimisation approach to Internet congestion control

    Publication Year: 1999, Page(s):67 - 74
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (468 KB)

    In this paper we present an optimisation approach to congestion flow control. The initial context of this approach was as a rate-based flow control in ATM networks. We describe techniques that enable us to implement this flow control in an explicit congestion notification-capable TCP/IP network. These techniques require only minimal changes to existing TCP host behaviour and RED active queue manag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User plane architecture of 3rd generation mobile telecommunication network

    Publication Year: 1999, Page(s):270 - 278
    Cited by:  Patents (32)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (136 KB)

    This paper presents modifications that are proposed to the 3rd-generation packet data network in 3GPP (3rd Generation Partnership Project). The scope of the paper is the user plane of the packet data network. The UMTS (Universal Mobile Telecommunications System) network architecture is based on the GPRS (General Packet Radio Service). In this paper, the proposed UMTS packet data network is present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of the M/Pareto process to modeling broadband traffic streams

    Publication Year: 1999, Page(s):53 - 58
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (112 KB)

    In this paper we examine the usefulness of the M/Pareto process as a model for broadband traffic. We show that the queueing performance of the M/Pareto process depends upon the level of aggregation in the process. When the level of aggregation is high, the M/Pareto converges to a long-range-dependent Gaussian process. For lower levels of aggregation, the M/Pareto is capable of modeling the queuein... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The paging channel in cdma2000

    Publication Year: 1999, Page(s):257 - 264
    Cited by:  Papers (5)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (10928 KB)

    cdma2000 has been proposed as the standard in the USA for the next-generation mobile telephones. This document describes the proposed paging channel of the cdma2000. It provides both the physical layer details of operation, and the signaling and network issues required to support these new channels. The new paging channel significantly improves the standby times of the telephones for the 3G system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A programmable multicast service in ATM

    Publication Year: 1999, Page(s):135 - 142
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (568 KB)

    This paper presents a design and implementation of a ATM multicast service based on programmable and active network concepts. It aims to address the design and implementation issues of creating new network services, multicast in this case, through a set of Corba-based network interfaces, and with a Java-based user code injection mechanism for supporting customization of network services. We demons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A client caching scheme for interactive video-on-demand

    Publication Year: 1999, Page(s):391 - 397
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (72 KB)

    Video-on-demand trials at Monash University have shown that video in educational applications is used in a highly interactive fashion and that during a single session a significant proportion of video is examined more than once. We propose a caching scheme where video, once retrieved from the server, is cached locally on the client for the remainder of the session. We use statistics of reuse gathe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data spread: a novel authentication and security technique

    Publication Year: 1999, Page(s):335 - 339
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (48 KB)

    This paper describes an authentication and security protocol called data spread for use on the Internet. The protocol applies address space diversity to outgoing messages, and when combined with reasonable (but not necessarily strong) encryption techniques, offers fast, secure and authentic-able information exchange between communicating entities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RSVP for LEO satellites

    Publication Year: 1999, Page(s):295 - 302
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (124 KB)

    The Internet Engineering Task Force (IETF) is working on extending the traditional TCP/IP model for supporting multimedia and real-time applications on the Internet. Thus, new protocols have been developed such as the resource reservation protocol (RSVP). At the same time, there has been a growing interest in using low Earth orbit (LEO) satellites. In the near future, when the Internet with multim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable issue in multicast protocols: reducing forwarding states

    Publication Year: 1999, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (260 KB)

    Forwarding state explosion may cause a scalability problem in multicast protocols. In this paper we describe a technique, called dynamic overlap tree path (DOTP), to improve the scalability of existing multicast protocols. This technique, which can be incorporated in both the dense and sparse modes of multicast protocols, dynamically finds overlapped tree paths and merges their forwarding states t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.