By Topic

Date 18-20 Feb. 1999

Filter Results

Displaying Results 1 - 25 of 47
  • 1999 Internet Workshop. IWS99. (Cat. No.99EX385)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (250 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):301 - 302
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Comparisons of packet scheduling algorithms for fair service among connections

    Publication Year: 1999, Page(s):137 - 144
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    We investigate the performance of TCP under several packet scheduling algorithms at the router. Our main focus is how fair service can be provided for elastic applications sharing the link capacity. For this purpose, we consider the following three packet scheduling algorithms; FIFO (First In First Out), RED (Random Early Detection), and DRR (Deficit Round Robin). Through simulation and analysis r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS of IP over ATM: the PCR and ACR policing issue

    Publication Year: 1999, Page(s):131 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    Many solutions to integrate IP with ATM and to map IP on ATM service categories have already been presented. Yet how to police the chosen ATM service category is still an open issue. We present the IP over ATM policing issue. Since the loss of a single ATM cell would cause the loss of an entire IP packet, no cell of a well-behaved user should be rejected. At the same time in order to protect all n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hash parallel and label parallel routing for high performance multicast router with fine grain QoS control

    Publication Year: 1999, Page(s):13 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Routing table lookup, or its memory latency, is the most serious bottleneck of high performance routing. Flow-wise or group-wise routing table entries for QoS guaranteed or multicast communications need a large routing table, which further increase the latency. Recent routers have multiple input interfaces and output interfaces connected by a high bandwidth cross connect. Such architecture allows ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network surveillance for detecting intrusions

    Publication Year: 1999, Page(s):99 - 106
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    The paper proposes a network surveillance method for detecting malicious activities. Based on the hypothesis that unusual conducts like system exploitation will trigger an abnormal network traffic, we try to detect this anomalous traffic pattern as a sign of malicious, or at least suspicious activities. Capturing and analyzing of a network traffic pattern is implemented with an idea of port profil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction and performance measurement of the RSVP local network

    Publication Year: 1999, Page(s):126 - 130
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    This paper describes the experiences of constructing a RSVP local network and reports the results of the performance measurement. The RSVP local network is a RSVP/CBQ testbed and the network that is able to support an enhanced QoS. RSVP is a mere signaling protocol, so CBQ (Class-Based Queueing) is required to provide a traffic control mechanism and resource management for each flow. Mgen, ttt, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of layer3 switch: case of flow-driven connection setup

    Publication Year: 1999, Page(s):5 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    The layer3 switch enables us to fast transmit IP datagrams using the cut-through technique. The current layer3 router would become a bottleneck in terms of delay performance, as the amount of traffic injected into high speed networks gets relatively large. Thus, the layer3 switch should be an important element in constructing the next generation Internet backbone. We analyze the cut-through rate, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The AI3 CacheBone project

    Publication Year: 1999, Page(s):203 - 208
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    Hierarchical WWW cache formation which provides both higher hit rates and saves overall bandwidth consumption through fetching WWW objects and periodically redistributing them among member caches is proposed as an application on a satellite Internet infrastructure. With regular prefetching and distribution of WWW objects, our system can utilize the satellite Internet with continuous streaming data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet filtering in bridge

    Publication Year: 1999, Page(s):94 - 98
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Filtering of unauthorized packets is a common way to improve network security. Packet filtering is described as one of the firewall systems, which is generally implemented in gateways and routers. Packet filtering of gateways and routers is dangerous because an attacker may find the machine by its IP address. To resolve this security problem, we designed a packet filtering system without IP addres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing routing table computation cost in OSPF

    Publication Year: 1999, Page(s):119 - 125
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    In a link state protocol, every router has complete topology information about the network. We argue that with such information, divide-and-conquer schemes can be used to make the protocol processing more efficient. As an example, we present a simple approach for a router running the Open Shortest Path First (OSPF) protocol to automatically detect if its interfaces lead to multiple disjoint region... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The influence of the Internet on Japanese education: case of the 100 Schools Networking Project

    Publication Year: 1999, Page(s):221 - 228
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB)

    This paper describes the current status of the use of the Internet in education within Japan, and the historical background to this development. The growth of technology, especially in the area of computers and networking, has influenced Japan's school education. With the advent of this technology, the school, which is considered as stable but closed, is opening itself to the outside world. In 199... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP/ATM integration, issues, activities, and suggestions

    Publication Year: 1999, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    The paper introduces current issues and activities on IP switching technology for the public telecommunication network. Its standard activities and protocols are compared. There are many standard bodies (IETF, Internet engineering task force; ATM Forum; and ITU, International Telecommunications Union), which are concentrating on offering dominant ways of carrying Internet traffic via ATM switching... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JMS: a flexible collaborative environment

    Publication Year: 1999, Page(s):195 - 202
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    This paper introduces JMS (Java-based Meeting Space), an object-oriented framework for developing synchronous collaborative applications over the Internet. The JMS framework provides a comprehensive collection of services that supports cooperative interaction at system level: session management, floor control management and group awareness management. The application developers can tailor some of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP flow control for maximum throughput and QoS guarantee

    Publication Year: 1999, Page(s):280 - 285
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    The author proposes a flow control for a TCP connection which determines the packet sending rate so as to maximize a performance measure function for the fairness, throughput and packet loss ratio. The performance is examined for the TCP packet network by theoretical analysis and computer simulation, and it is shown that the proposed method is optimal and fair, and that almost the maximum throughp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure and trusted time stamping authority

    Publication Year: 1999, Page(s):88 - 93
    Cited by:  Papers (1)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    A method to construct a secure and trusted time stamping authority is proposed to provide adequate precision and protection for digital time stamping of electronic digital documents. Time for stamping is obtained from a precise clock that is synchronous to two atomic clocks. A digital signature is obtained by using the RSA cryptosystem with 2048-bit modulus, and a secret key of a time stamping aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of TCP flags in congested network

    Publication Year: 1999, Page(s):151 - 156
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    This paper proposes a new simple method for network measurement. It extracts 6-bit control flags of TCP (Transmission Control Protocol) packets. The idea is based on the unique feature of flag ratios which is discovered by our rather exhaustive search for the new indexes of network traffic. By the use of flag ratios, one can tell if the network is really congested. It is much simpler than the conv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS management platform for multicast environments

    Publication Year: 1999, Page(s):112 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    The paper discusses an integrated network management platform for multicast environment, IPME, which is designed to address some of the current research issues. The IPME platform mainly consists of three components; manager, agents and participants. Their functions are defined, as well as the relationship among the components. Within the framework of the IPME platform, a QoS management platform, I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and evaluation of satellite Internet system

    Publication Year: 1999, Page(s):215 - 220
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    Use of the Internet is growing explosively, not only for text-based applications such as e-mail and bulletin boards, but also for multimedia WWW applications involving video and audio, and multicast services. Recently, satellites have been used in communication networks as a means of avoiding terrestrial Internet traffic jams. Satellites are a very efficient means of delivering large volumes of co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture for a Web-based distributed virtual reality system

    Publication Year: 1999, Page(s):237 - 240
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    Describes the architecture for a World Wide Web-based distributed virtual reality system (DVRS) based on the high-level architecture “RunTime Infrastructure”, which was developed for distributed interactive simulation. The DVRS constructs a virtual world which exists in a distributed system environment. Each user resides at a local node of the virtual world. The DVRS maintains a consis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and forecasting of hourly transactions on a WWW and proxy cache server

    Publication Year: 1999, Page(s):165 - 174
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    A modeling approach is introduced in this paper to capture the real characteristics of the WWW traffic, using a combination of Box-Jenkins models with seasonality removal. Fourier analysis and standardization are used to render seasonal data into non-seasonal data. However, seasonality cannot be completely removed by this approach, so both seasonal and non-seasonal models are employed and the best... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of DV stream over Internet

    Publication Year: 1999, Page(s):255 - 260
    Cited by:  Papers (9)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    An Internet Protocol (IP) based high-quality real-time audio-visual (AV) communication tool has been developed. A digital video (DV) camcorder and VCR, being consumer market products, are adopted as the AV codec. The AV devices, which have an IEEE-1394 (Firewire) interface, are connected to the IP host with its interface. The original packet format is adopted by simply encapsulating the isochronou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Transaction Internet Protocol in practice: reliability for WWW applications

    Publication Year: 1999, Page(s):189 - 194
    Cited by:  Papers (2)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    One of the most interesting domains of future Internet applications will be located in the area of electronic commerce, where online products and services are offered. Products of value are accounted by monetary transactions, involving a bank or credit card service to handle the electronic cash flow. To achieve a reliable and consistent flow of information in these applications, the concept of tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of upper-layer protocols on self-similarity of network traffic

    Publication Year: 1999, Page(s):272 - 279
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    It has been pointed out by many researchers that network traffic in LAN and WAN environments have self-similarity. However, it has not been clear why self-similarity is observed in the network traffic. Also, its impact on network performance has not been fully investigated. In this paper, we investigate the cause of traffic self-similarity in a network employing TCP/IP as its upper-layer protocol ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Half-automated generation of secure, high-performance Web/DB software

    Publication Year: 1999, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    Web technologies are evolving rapidly to meet the needs of various World Wide Web-based information systems. While it is possible to write prototype versions of Web-based software (Webware), they are often insecure and suffer from performance problems. It is becoming more difficult to implement secure, high-performance Webware, because of the broad technical background required to implement such s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.