By Topic

Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000

8-10 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 100
  • Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (411 KB)
    Freely Available from IEEE
  • Mobile stations localization in a WLAN

    Publication Year: 2000, Page(s):136 - 142
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (663 KB)

    This paper proposes a localization protocol of mobile stations in a WLAN (wireless local area network). The originality of this protocol is made of two parts (i) we use an object-relational database and (ii) we use a semaphore channel devoted to localize mobile stations in access point coverage areas and in virtual coverage areas via near-to-near relays. The database manages the knowledge of the m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical traffic grooming scheme for single-hub SONET/WDM rings

    Publication Year: 2000, Page(s):556 - 564
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (762 KB)

    In SONET/WDM networks, one fiber supports multiple wavelengths and each wavelength supports several low rate tributary streams. Traffic grooming is then defined as properly using the SONET add/drop multiplexer (ADM) to electronically multiplex and demultiplex required tributary traffic patterns with minimal resource cost (wavelengths and ADMs). This paper studies the traffic grooming problem in si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2000, Page(s):700 - 702
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Provisioning multilayer restoration for convergence

    Publication Year: 2000, Page(s):108 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Applications that require mission critical service will traverse multiple networks, which implement different protocol suites. Each layer in a suite has a recovery scheme that can reroute connections at that layer. We show that the solution to the repair of a fault that affects multiple layers lies in the provisioning of restoration at each layer to cooperate. Without some coordination between res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of a bandwidth broker for dynamic end-to-end resource reservation in outsourced virtual private networks

    Publication Year: 2000, Page(s):511 - 519
    Cited by:  Papers (12)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    As today's network infrastructure continues to grow and Differentiated Services IP backbones are now available to provide various levels of quality of service (QoS) to VPN traffic, the ability to manage increasing network complexity is considered as a crucial factor for QoS enabled VPN solutions. There is growing trend by corporate customers to outsource such complicated management services to Int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for the minimal cutsets enumeration of networks by graph search and branch addition

    Publication Year: 2000, Page(s):100 - 107
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    This paper presents effective algorithms for enumerating the minimal cutsets of networks. After a graph is modeled after a network, first, by a graph method the spanning tree of the graph and binary tree whose event is complement to it are evaluated. The sub-vertex set represented by the binary tree is referenced, and an algorithm which evaluates the minimal cutsets is proposed. This algorithm req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance impact of data compression on virtual private network transactions

    Publication Year: 2000, Page(s):500 - 510
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB)

    Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security services such as confidentiality, host authentication and data integrity. The computation required to provide adequate security, however, can significantly degrade the performance. We characterize the extent to which data compr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed weakness in virtual private networks

    Publication Year: 2000, Page(s):96 - 97
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    The use of virtual private networks is increasing rapidly primarily due to security concerns. As the result of analyzing actual corporate VPN strategies, we identify a common vulnerability we name “distributed weakness in VPNs”. Specifically we describe a simple routing attack that can be launched against VPN tunnel endpoints with significant implications. We close with a solution to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical QoS in multicast wavelength-routed networks

    Publication Year: 2000, Page(s):497 - 498
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    This paper introduces the optical quality of service (QoS) optimization model for wavelength-routed networks. In the first part of this study we concentrate on power as the main quantitative measure of optical QoS. A mathematical formulation of the problem is presented and heuristic approaches are proposed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IGMPv3-based method for avoiding DoS attacks in multicast-enabled networks

    Publication Year: 2000, Page(s):94 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    IP multicast has proven to be very good for many-to-many multimedia communications like audio and video conferencing. However there are only a few Internet service providers offering it as a true Internet service to their customers. The reason is that nowadays, IP multicast has many issues like billing, authentication, security protection against malicious people and so on. In fact, DoS attacks ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preliminary study of SNMP impact on a target device

    Publication Year: 2000, Page(s):474 - 475
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    Rapid growth in the use of the Internet and network-connected PCs has spurred network usage drastically in the last few years. The network has been growing and becoming more complex than ever before. Network managers are trying to manage this complex entity 24 hours a day and 7 days a week. However, some network problems are caused by network managers themselves without knowing it. The SNMP used b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On some metrics of TCP

    Publication Year: 2000, Page(s):544 - 545
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    This paper discusses some metrics of TCP based on real measurements over the Internet. We present algorithms to measure the congestion window related metrics and use these metrics to study the stationary behavior of TCP. Our statistical analysis shows that the distribution of the congestion window process in a stable period has a bell-like shape and can be approximated by a normal distribution View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-cores uni-directional shared trees multicast routing protocol

    Publication Year: 2000, Page(s):495 - 496
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    CBT and PIM-SM are two typical intradomain multicast routing protocols. However, CBT lacks an efficient member management mechanism such as admission control and authentication for senders of multicast group, and PIM-SM lacks robustness. This paper proposes a new one, which can effectively solve the both problems through admitting senders at multiple cores and transporting packets in a uni-directi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assignment of multicast switches in optical networks

    Publication Year: 2000, Page(s):381 - 382
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    This paper addresses the optimal placement of multicast nodes in all-optical networks. An approximate analytical model for the blocking probability in multicast networks is developed. The blocking model is used to guide two heuristics for the placement problem. The two heuristics are: (1) the famous warehouse allocation heuristic (ADD) and (2) simulated annealing View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new route selection approach using scaling techniques: an application to hierarchical QoS-based routing

    Publication Year: 2000, Page(s):698 - 699
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    In this short paper an approach to the ATM hierarchical (PNNI) routing issue is presented based on a simple algorithm that chooses a route for a connection request out of a predefined list of possible routes between a specific source-destination pair in a probabilistic way. A route fitness (cost) function is used to assign selection probabilities to every candidate path and arriving connection req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network security (security in large networks)

    Publication Year: 2000, Page(s):88 - 93
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    It is common that users or hosts in a large network are partitioned and organized as a hierarchical free where children of the same parent from a group. Secure broadcasting intends to provide a secure communication channel from a sending principal to a group of legal receiving principals. Only legal receiving principals can decrypt the message, and illegal receiving principals cannot acquire any i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open network platform for multiprotocol communication

    Publication Year: 2000, Page(s):472 - 473
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    Fast introduction of new functionality into the existing telecommunication nodes is very important task for software and system designers. One effective way to do this is to move part of the functionality to an additional external platform. By creating generic application components and putting them together, new functionality is introduced into the network. A framework for introduction of new app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new paradigm for multipoint-to-multipoint communication using XTP

    Publication Year: 2000, Page(s):352 - 361
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    The multicast features of the Xpress Transport Protocol (XTP) provide a point-to-multipoint service, which can vary from best-effort to completely reliable. Various proposals have been made for operation with multiple senders, but each of these has some shortcomings. Some extensions to XTP are proposed, which transform it into a multipoint-to-multipoint protocol. These extensions fit naturally wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of competing traffic on the performance of TCP/IP over asymmetric links

    Publication Year: 2000, Page(s):542 - 543
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    We analyze and characterize the performance of TCP/IP over the point-to-point protocol (PPP) over ATM using asymmetric links in the presence of multiple clients competing for bandwidth. This is part of an ongoing research project that studies techniques to provide end-to-end quality of service to flows when ADSL is used in the access network. The results presented illustrate the decrease in fairne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programmable resource control in global active IP networks

    Publication Year: 2000, Page(s):194 - 195
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    The paper presents a resource control framework for active IP networks. Generic router resource abstractions are discussed to supporting network programming by a wide variety of active network services. Dynamic partitioning is described as an adaptive bandwidth allocation scheme to provide safe resource access and efficient multiplexing. Policy in the form of code is use to enable customization by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonlinear time-series model for VBR video traffic

    Publication Year: 2000, Page(s):678 - 683
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    Variable bit rate (VBR) H.261 encoded video traffic is modeled by a nonlinear time series process. A threshold autoregressive (TAR) process is of particular interest. The TAR model is comprised of a set of autoregressive (AR) processes that are switched according to the amplitude of bit rates of the time series. The TAR model is shown to capture accurately the statistical characteristics of multip... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security of routing cache updates in cellular IP

    Publication Year: 2000, Page(s):163 - 164
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Cellular IP is a protocol presenting a micro mobility solution for mobile devices in a limited geographical area. It allows routing of IP datagrams to mobile stations and offers a fast handoff control. It is designed to cooperate with mobile IP to provide wide area mobility support. This paper presents ideas for better protecting location information in cellular IP networks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Class-based QoS control scheme by flow management in the Internet router

    Publication Year: 2000, Page(s):58 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    With the Internet transforming into multimedia and high-speed, the various traffic requiring different qualities of service (QoS) will co-exist in the network. Also, classified service based on Diff-Serv (differentiated service), MPLS (Multi Protocol Label Switching) and so on, have come into wide use. In today's environment of the Internet, it is necessary for the routers to perform the control m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance measurements and analysis of TCP flows in a differentiated services WAN

    Publication Year: 2000, Page(s):296 - 305
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    This paper presents results from performance measurements carried out in a differentiated services WAN connecting three major cities in southern Finland. The target of the measurements was to collect precise information about the level of service experienced by a user transmitting files with FTP in a network that implements service differentiation by using drop precedence levels and separate class... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.