Proceedings Ninth International Conference on Computer Communications and Networks (Cat.No.00EX440)

16-18 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 102
  • Proceedings Ninth International Conference on Computer Communications and Networks (Cat.No.00EX440)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (465 KB)
    Freely Available from IEEE
  • Security mechanisms in high-speed networks

    Publication Year: 2000
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (819 KB)

    Summary form only given. High-speed networks are becoming popular for accessing remote data and information sharing and more and more organizations are connecting through networks to obtain financial and strategic advantages. However, this high-bandwidth connectivity also exposes them to a higher degree of security attacks and intrusions. A router-based packet-filtering firewall is an effective wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2000, Page(s):662 - 663
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Dynamic adaptive mapping of videos in a hierarchical TV-Anytime server network

    Publication Year: 2000, Page(s):402 - 409
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    In this paper we propose a hierarchical server network architecture for the support of a large-scale TV-Anytime system. We present and formulate various policies used for the effective mapping of videos in the runtime of the TV-Anytime system. A predictive assignment policy is presented to determine periodically the mapping of videos to the server network. Furthermore, we present an adaptive reall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fair and efficient multicast ATM switch based on deflection routing

    Publication Year: 2000, Page(s):453 - 458
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    In this paper we propose a deflection routing based N×N ATM multicast switch. The switch consists of a copy network, a routing network and a novel mechanism to reduce memory requirements. We analyze the switch performance and show that the switch requires only O(log N) stages for low packet loss rates. Our theoretical results are backed by simulations of the switch. The switch is output queu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Server replication and its placement for reliable multicast

    Publication Year: 2000, Page(s):396 - 401
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    A key challenge in reliable multicast is to reduce the retransmission cost due to features such as bandwidth usage and delay. A local recovery approach employing replicated servers has recently been shown to be effective in reducing this cost. The basic idea in the local recovery approach is to perform data replication on a subset of routers, known as replicated servers, inside the network. Each r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of service provisioning framework for multimedia traffic in wireless/mobile networks

    Publication Year: 2000, Page(s):644 - 648
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    We propose a quality of service (QoS) provisioning framework for multimedia traffic in wireless/mobile networks. We classify the services into three categories: bandwidth guaranteed (BG) service, bandwidth not-guaranteed (BNG) service, and best effort (BE) service. BG service is for non-adaptive multimedia traffic or non-multimedia traffic; BNG service is for adaptive multimedia traffic, whereas B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion control of compressed video traffic over ATM networks

    Publication Year: 2000, Page(s):476 - 479
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    Video traffic is expected to account for a significant share of the traffic volume in future asynchronous transfer mode (ATM) networks. MPEG-2, proposed by the Moving Picture Expert Group, is one of the most promising compression techniques for such applications. One of the critical issues in MPEG-2 is to realize effective variable bit rate (VBR) video transfer thorough ATM networks. The leaky buc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FT-LAN, a fault tolerant local area network architecture for mobile mission critical systems

    Publication Year: 2000, Page(s):170 - 175
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    This effort presents a fault-tolerant LAN architecture for mobile mission critical systems (MMCSs). MMCSs are real-time computing platforms that perform continuously in harsh environments. It is desirable that they continue to perform a subset of critical tasks under fault conditions. The network in a MMCS can be characterized as an isolated, real-time, device-control network. A key consideration ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the design of optical buffers for variable length packet traffic

    Publication Year: 2000, Page(s):448 - 452
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    This paper addresses the problem of dimensioning buffers realized by means of fiber delay lines in optical packet switches. The network scenario considered is such that packets have variable length and are sent asynchronously on the optical links. The role of the basic time unit of the fiber delay lines is discussed, showing that it is a crucial parameter to determine the queuing performance. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • netnice: nice is not only for CPUs-a simple subnetwork bandwidth management scheme

    Publication Year: 2000, Page(s):388 - 395
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    In this paper, we present “netnice”, a mechanism that allows processes to throttle their own network bandwidth consumption. As the name suggests, it is inspired by the Unix “nice” command in that it allows users and administrators to limit the network resources used by individual processes in order to avoid impacting the performance of other processes. In the paper, to addr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A channel-hopping protocol for ad-hoc networks

    Publication Year: 2000, Page(s):142 - 147
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Media access control (MAC) protocols for wireless networks may be based on collision-avoidance handshakes between sender and receiver. Those protocols proposed or implemented to date require either carrier sensing or the assignment of unique node codes in order to ensure that intended receivers hear data packets without interference from hidden sources. We present and analyze a new collision-avoid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive QoS control for video and voice traffic in networked virtual environments

    Publication Year: 2000, Page(s):638 - 642
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    This paper presents results of an experiment in which plural video and voice streams transmitted over a network are output synchronously in networked virtual environments. We propose an adaptive QoS (quality of service) control scheme for video and voice traffic. According to the importance of each media object, CPU load and network load, the scheme adjusts the rendition rate of a 3D virtual space... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability of RED with two-way TCP traffic

    Publication Year: 2000, Page(s):214 - 219
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    This paper points out a phase effect with RED-like queue management algorithms and two-way TCP traffic. It is shown by simulation and measurement that the RED (random early detection) queue converges to a state of heavy oscillation in the presence of two-way bulk-data TCP traffic, causing suboptimal link utilization and service differentiation between in-profile and out-of-profile packets. Besides... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fair resource allocation in active networks

    Publication Year: 2000, Page(s):468 - 475
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    A packet scheduling scheme is an important component of a network node. The choice of a scheme dictates the allocation of network resources among contending flows of the network. In this paper we study packet scheduling in the context of active networks. In an active network, intermediate nodes, called active nodes, can perform customized computations on every packet. Programmability in active net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient integration and translation of value added services for converging networks using middleware platforms

    Publication Year: 2000, Page(s):164 - 169
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    Value added services known from legacy telecommunications networks are predominantly based on ITU's intelligent network (IN) definitions. Due to the forthcoming network convergence to IP-based networks and the tremendous growth of telecommunications markets these services have to be distributed over a wide range of heterogeneous hardware platforms. Nevertheless, the interconnection to existing cir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient collective communication in WDM networks with a power budget

    Publication Year: 2000, Page(s):612 - 616
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    This paper addresses the problem of efficient multicast communication in wavelength-division multiplexed optical networks. In particular, we consider all-optical networks in which each transmitting node may deliver its message to some fixed number of destination nodes on a light path. The number of destination nodes that may receive the message using a single path depends on the power budget of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint synchronization between live and stored media in network environments

    Publication Year: 2000, Page(s):442 - 446
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    This paper considers a networked multimedia application like distance learning in which a tutor distributes a stored video stream to students, and he/she sometimes explains the contents of the stored video with live voice and video streams. We propose a joint synchronization mechanism among the media streams. The mechanism takes advantage of the difference in the features of live and stored media.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of link stability and directionality of motion on routing algorithms in MANETs

    Publication Year: 2000, Page(s):380 - 385
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    Most of the routing protocols proposed for mobile ad hoc networks (MANETs) rely on caching routes to increase the speed and reduce the cost of route discovery. These protocols assume high path stability between the mobile nodes in the network. This paper studies persistence of paths under various mobility patterns and network sizes. The conclusions drawn from this study enable us to determine the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization of performance of TCP/IP over PPP and ATM over asymmetric links

    Publication Year: 2000, Page(s):334 - 339
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The objective of this paper is to characterize and analyze the performance of TCP/IP when used over point-to-point protocol (PPP) and asynchronous transfer mode (ATM) on asymmetric links. This will allow us to gain insight into this new protocol architecture used in the asymmetric digital subscriber line (ADSL) access network and to investigate the related quality of service (QoS) issues. Using si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of flow caching for layer-4 switching

    Publication Year: 2000, Page(s):135 - 140
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Next generation access routers and edge devices need to provide functionalities for layer-4 packet forwarding and firewall/security checks. Consequently, a challenging issue concerns how to achieve fast packet filtering and forwarding at low cost. This paper studies flow caching mechanisms for fast layer-4 packet forwarding. We show by model analysis that flow caching performance is not very sensi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group voice conferencing for mobile environments

    Publication Year: 2000, Page(s):270 - 275
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    We present the design and the implementation details of a group conferencing tool using only 50% of the bandwidth of a 9.6 kbit/s GSM connection, thus leaving resources for other applications that need to access network resources concurrently. The system architecture with its conferencing server and the clients is described as well as the QoS issues that were crucial during the design of the appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical study of buffer management scheme for Diffserv assured forwarding PHB

    Publication Year: 2000, Page(s):632 - 637
    Cited by:  Papers (25)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    The IETF Differentiated Services Working Group has recently standardized the assured forwarding (AF) per hop behavior (PHB). RFC 2597 recommends that an active queue management (AQM) technique be used to realize the multiple levels of drop precedence required in the AF PHB. The most widely used AQM scheme is RED (random early detection). There are several ways to extend RED to a multi-level RED (M... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systematic testing of multicast routing protocols: analysis of forward and backward search techniques

    Publication Year: 2000, Page(s):590 - 597
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    We present a new methodology for developing systematic and automatic test generation algorithms for multipoint protocols. These algorithms attempt to synthesize network topologies and sequences of events that stress the protocol's correctness or performance. This problem can be viewed as a domain-specific search problem that suffers from the state space explosion problem. One goal of this work is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local optimal proportional differentiation scheduler for relative differentiated services

    Publication Year: 2000, Page(s):544 - 550
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    This paper describes a local optimal proportional delay scheduler for relative differentiation in differentiated services (Diffserv). The scheduler achieves a target for the average delay ratio for each class of packet under the assumption that there are no additional arriving packets. A concept is proposed called the `local optimal' which means the optimal decision when there are no further arriv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.