By Topic

Network Protocols, 2000. Proceedings. 2000 International Conference on

Date 14-17 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 32
  • Proceedings 2000 International Conference on Network Protocols

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):337 - 338
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Generalized load sharing for packet-switching networks

    Publication Year: 2000, Page(s):305 - 314
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    We propose a framework to study how to effectively perform load sharing in multipath communication networks. A generalized load sharing (GLS) model has been developed to conceptualize how traffic is split ideally, on a set of active paths. A simple traffic splitting algorithm, called weighted fair routing (WFR), has been developed at two different granularity levels, namely, the packet level, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring reachability in the global multicast infrastructure

    Publication Year: 2000, Page(s):141 - 150
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1052 KB)

    The multicast infrastructure has transitioned to a topology that now supports hierarchical routing. Instead of a flat virtual topology originally called the Multicast Backbone (MBone) there now exists a hierarchy where routing information is exchanged between autonomous systems (ASes). In today's multicast infrastructure reachability problems are common. Unlike in the MBone, the possibility of lim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differentiated predictive fair service for TCP flows

    Publication Year: 2000, Page(s):49 - 58
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    The majority of the traffic (bytes) flowing over the Internet today have been attributed to the Transmission Control Protocol (TCP). This strong presence of TCP has spurred further investigations into its congestion control mechanism and its effect on the performance of short and long data transfers. We investigate the interaction among short and long TCP flows, and how TCP service can be improved... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization and performance evaluation for proportional delay differentiated services

    Publication Year: 2000, Page(s):295 - 304
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    We consider a proportional delay model for Internet differentiated services. Under this model, an ISP can control the “spacing” of waiting times between different classes of traffic. Specifically, the ISP tries to ensure that the average waiting time of class i traffic relative to that of class i-1 traffic is consistently a specifiable ratio. If the ratio is less than one, the ISP can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal partitioning of multicast receivers

    Publication Year: 2000, Page(s):129 - 140
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    Multicast sessions may have a large number of receivers with heterogeneous reception capacities. To accommodate this heterogeneity various multi-rate schemes, based upon the use of layering or replication, have been proposed. We consider the optimal partitioning of receivers into groups for multi-rate schemes. For a general class of utility functions, we formulate the partitioning problem as an op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable monitoring approach for service level agreements validation

    Publication Year: 2000, Page(s):37 - 48
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (900 KB)

    In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider network need to gather quality of service (QoS) measurements from multiple nodes in the network. For a network carrying over thousands of flows with end-to-end SLAs, the information exchanged between network nodes and a centr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance study of multiple access control protocols for wireless multimedia services

    Publication Year: 2000, Page(s):283 - 292
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    The multiple access control (MAC) problem in a wireless network has intrigued researchers for years. For a broadband wireless multimedia network such as wireless ATM, an effective MAC protocol is very much desired because efficient allocation of channel bandwidth is imperative in accommodating a large user population with satisfactory quality of service. Indeed, MAC protocols for a wireless ATM ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP performance analysis on asymmetric networks composed of satellite and terrestrial links

    Publication Year: 2000, Page(s):199 - 206
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    As the Internet users increase, asymmetric networks which provide asymmetric bandwidth or delay for the uplink and downlink have become a great attraction. However asymmetric networks which use both terrestrial and satellite links at the same time have not been adequately investigated. Therefore, this paper proposes a new formula for TCP performance evaluation for the asymmetric networks. Using th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and improvement of fairness between TCP Reno and Vegas for deployment of TCP Vegas to the Internet

    Publication Year: 2000, Page(s):177 - 186
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    According to past research, a TCP Vegas version is able to achieve higher throughput than TCP Tahoe and Reno versions, which are widely used in the current Internet. However we need to consider a migration path for TCP Vegas to be deployed in the Internet. In this paper, by focusing on the situation where TCP Reno and Vegas connections share the bottleneck link, we investigate the fairness between... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RMCM: reliable multicasts for core-based multicast trees

    Publication Year: 2000, Page(s):83 - 94
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1156 KB)

    Reliable multicast is one of the the important and challenging problems that must be effectively resolved before multicast applications can be fully deployed on the Internet. Most existing reliable multicast schemes focus on source-based multicast trees. They either cannot be directly deployed in core-based multicast trees or may render sub-optimal performance when directly deployed. The major dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP multicast fault recovery in PIM over OSPF

    Publication Year: 2000, Page(s):116 - 125
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    Little attention has been given to understanding the fault recovery characteristics and performance tuning of native IP multicast networks. This paper focuses on the interactions of the component protocols to understand their behavior in network failure and recovery scenarios. We consider a multicast environment based on the Protocol Independent Multicast (PIM) routing protocol, the Internet Group... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust identification of shared losses using end-to-end unicast probes

    Publication Year: 2000, Page(s):22 - 33
    Cited by:  Papers (42)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    Current Internet transport protocols make end-to-end measurements and maintain per-connection state to regulate the use of shared network resources. When two or more such connections share a common endpoint, there is an opportunity to correlate the end-to-end measurements made by these protocols to better diagnose and control the use of shared resources. We develop packet probing techniques to det... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Convergent multi-path routing

    Publication Year: 2000, Page(s):273 - 282
    Cited by:  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    We present a protocol for maintaining multiple paths to each destination in a network of processes. For each destination, each process in the network maintains a set of neighbors which are used as next-hops to reach the destination. This set is known as the successor set. Collectively, the successor sets from all processes in the network with respect to a given destination form a spanning, destina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GeoTORA: a protocol for geocasting in mobile ad hoc networks

    Publication Year: 2000, Page(s):240 - 250
    Cited by:  Papers (30)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    This paper considers the problem of providing a geocast service in mobile ad hoc networks and presents a novel geocasting algorithm combining unicasting and flooding. Geocast is useful for sending messages to everyone in a specified geographical region. The proposed protocol is named GeoTORA, because it is derived from the TORA (unicast) routing protocol. Flooding is also incorporated in GeoTORA, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multidomain load balancing

    Publication Year: 2000, Page(s):315 - 324
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    This paper investigates dynamic load balancing issues in the multidomain environment where local area networks (LANs) are interconnected by the Internet. Because of the much slower Internet communication speed and limited bandwidth, existing load balancing algorithms for LANs are unsuitable for the multidomain environment. New issues such as lag time in updating load information and network cost o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of packet loss correlation in FEC-enhanced multicast trees

    Publication Year: 2000, Page(s):151 - 161
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    We study group loss probabilities of forward error correction (FEC) codes in shared loss multicast communication. We present a new analysis model with explicit state equations using recursive formulae. Our method looks at an FEC group as a whole, rather than analyze the number of transmissions of a particular packet. Our work applies to C(n,k) erasure codes, where any k out of n packets may decode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Internet overlay deployment and management using the X-Bone

    Publication Year: 2000, Page(s):59 - 68
    Cited by:  Papers (6)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    The X-Bone dynamically deploys and manages Internet overlays to reduce their configuration effort and increase network component sharing. The X-Bone discovers, configures, and monitors network resources to create overlays over existing IP networks. Overlays are useful for deploying overlapping virtual networks on a shared infrastructure and for simplifying topology. The X-Bone extends current over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An image transport protocol for the Internet

    Publication Year: 2000, Page(s):209 - 219
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1396 KB)

    Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable, in-order byte-stream abstraction, but which is overly, restrictive for image data. We analyze the progression of image quality at the receiver with time and show that the in-order delivery abstraction provided by a TCP-based approach p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • General AIMD congestion control

    Publication Year: 2000, Page(s):187 - 198
    Cited by:  Papers (112)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    Instead of the increase-by-one decrease-to-half strategy used in TCP for congestion window adjustment, we consider the general case such that the increase value and decrease ratio are parameters. That is, in the congestion avoidance state, the window size is increased by α per window of packets acknowledged and it is decreased to β of the current value when there is congestion indicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Internet multicast traffic performance considering multicast routing protocol

    Publication Year: 2000, Page(s):95 - 104
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    Recently audio and video delivery services are widely spread in the Internet. In order to deliver these data to multiple receivers at the same time, the multicast technologies are indispensable. In such a situation, the performance analysis of multicast traffic will be important in order to design and operate the Internet. Multicast traffic is controlled by its own routing protocol and the multica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hop integrity in computer networks

    Publication Year: 2000, Page(s):3 - 11
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    A computer network is said to provide hop integrity iff when any router p in the network receives a message m supposedly from an adjacent router q, then p can check that m was indeed sent by q, was not modified after it was sent, and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable object-tracking through unattended techniques (SCOUT)

    Publication Year: 2000, Page(s):253 - 262
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    A scalable object location service can enable users to search for various objects in an environment where many small, networked devices are attached to objects. We investigate two hierarchical, self-configuring or unattended approaches for an efficient object location service. Each approach has its advantages and disadvantages based on the anticipated load. The first approach, SCOUT-AGG, is based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A topology-independent fair queueing model in ad hoc wireless networks

    Publication Year: 2000, Page(s):325 - 335
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    Fair queueing of rate and delay-sensitive packet flows in a shared-medium, multihop wireless network remains largely unaddressed because of the unique design issues such as location-dependent contention, spatial channel reuse, conflicts between ensuring fairness and maximizing channel utilization, and distributed fair scheduling. In this paper we propose a new topology-independent fair queueing mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.