By Topic

Networks, 2001. Proceedings. Ninth IEEE International Conference on

Date 10-12 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 93
  • A delayed multiple copy retransmission scheme for data communication in wireless networks

    Publication Year: 2001, Page(s):310 - 315
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    We propose a delayed multiple copy retransmission (DMCR) scheme for data communication in wireless networks, by which multiple copies of a lost link layer frame are retransmitted at the link layer one-by-one with a delay in between. The number of the copies gradually increases as the number of retransmissions increases. For implementing DMCR scheme in a typical mobile communication system, an inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service enhancement using resource evolutionary management

    Publication Year: 2001, Page(s):104 - 109
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (565 KB) | HTML iconHTML

    Network services can be served to user requests when it has enough resources. But they cannot be served if the network does not have enough resources or knowledge, or they are new services. We introduce a new network management scheme, resource evolutionary management (REMan). It consists of four domains, user, managed, managing and supplier. All resources are classified into three classes; comput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Buffer management for TCP over GFR service in an ATM network

    Publication Year: 2001, Page(s):302 - 307
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (659 KB) | HTML iconHTML

    Buffer management plays an important role in guaranteed frame rate (GFR) service in an asynchronous transfer mode (ATM) network. Buffer management algorithms are used to allocate appropriate space in a switch buffer for untagged GFR cells to fulfill the guaranteed minimum cell rate (MCR). Two main goals of buffer management algorithms are high throughput and high fairness index. However, these goa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Suitability of cryptographic modes of operation for the encryption in high-speed networks

    Publication Year: 2001, Page(s):134 - 139
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (605 KB) | HTML iconHTML

    Today, modern applications require more and more bandwidth as a result of the increasing quality and performance of the applications. Not only, the bandwidth requirements have to be met but also the demand for data confidentiality. Therefore, new or modified cryptographic modes of operation are required, which usually, provoke error propagation resulting in a higher error rate. The influence of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless home networks based on a hierarchical Bluetooth scatternet architecture

    Publication Year: 2001, Page(s):481 - 485
    Cited by:  Papers (7)  |  Patents (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Wireless home networking is being addressed by numerous groups such as the HomeRF working group, and the Bluetooth consortium. Of these, Bluetooth technology promises a wider acceptance in term of home networking in the near future. The potential of easily embedding Bluetooth technology in communication devices, computing devices and home appliances make it a more attractive alternative to SWAP. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of accounting model within SNMPv3 architecture

    Publication Year: 2001, Page(s):94 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    This paper presents an implementation of a new accounting model within the existing SNMPv3 architecture. The model discussed is based on the SNMPv3 structure defined in RFC 2570-2575. This model defines accounting functionality, which is a result of the growth of importance of the SNMP and its wide usage. We assume that this will be one of the steps to improve and upgrade SNMP to answer the modern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Credit token leaky bucket algorithm with fuzzy logic in ATM networks

    Publication Year: 2001, Page(s):296 - 301
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB) | HTML iconHTML

    This paper proposes a new model of leaky bucket (LB) called credit token leaky bucket (CTLB). Since the leaky rate of conventional LB is more than the negotiated mean cell rate, the performance of usage parameter control (UPC) depends on the burstiness of source and the statistical characteristics of cell stream passing through UPC. Therefore, lower performance, easily caused by a malicious user, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple method for implementing PIM to ATM based MPLS networks

    Publication Year: 2001, Page(s):362 - 365
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    A simple method for providing multicast service in ATM based multi-protocol label switching (MPLS) networks using PIM-SM is presented. This method does not require establishing dedicated multicast routes, but it uses point-to-point LSPs that were established for delivering best-effort traffic in the MPLS network. As a result, this method reduces the signaling overhead associated with establishing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The group security association for secure multicasting

    Publication Year: 2001, Page(s):130 - 133
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    The growth and commercialization of the group-oriented applications on the Internet has triggered a demand for security solutions for group communications. One such solution, secure multicast, is provided because it is available for the efficiency of multicast data delivery. This paper proposes a method of advertising a group security association for secure group communication and defines extensio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of platform independent image transcoders

    Publication Year: 2001, Page(s):110 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (639 KB) | HTML iconHTML

    Today many "Internet ready" devices available on the market are Web-enabled. These devices often have a low bandwidth, high latency access to the Internet that causes a bottleneck of data communication. Moreover, a number of client devices have very limited computing power and hardware/software resources to handle some of the content-rich information that a user might want to access from the netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simple IP subnet VLAN implementation

    Publication Year: 2001, Page(s):160 - 165
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    This paper describes a simple method of implementing an IP subnet VLAN. Normally, switches have to exchange VLAN membership information with its neighboring switches via some form of VLAN registration protocol. This is to ensure proper operation of VLAN forwarding and VLAN filtering services in a LAN. However, in the implementation done by the authors in this paper, no VLAN membership information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An investigation into performance of congestion control mechanisms in ATM-UBR service for TCP sources

    Publication Year: 2001, Page(s):463 - 468
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (630 KB) | HTML iconHTML

    The performance of congestion control mechanisms in UBR service for TCP sources is investigated. Not only static TCP sources but also dynamic TCP sources are applied to investigate the performance of congestion control in the practical way. For static sources, the result from random early detection (RED) achieves high efficiency but not the highest fairness. RED improves fairness slightly less tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance study of a service covering protocol in ad hoc networks

    Publication Year: 2001, Page(s):87 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB) | HTML iconHTML

    With the rising number of Internet services, extensive research on service location protocols is a very important feature for future networks. We discuss the performance of a service covering protocol designed for ad hoc networks. Our on-demand protocol is based on a distributed approach which contributes to traffic overhead optimization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of IP forwarding engine for ATM-based MPLS LER system

    Publication Year: 2001, Page(s):291 - 295
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    We introduce the architecture of a multiprotocol label switching (MPLS) label edge router (LER) system based on the ACE2000 ATM switching system. We implemented the MPLS LER system by adding the MPLS service controller and MPLS interface module (MIM) with 2.5 Gbit/s throughput to the ACE2000 ATM switching system. We also describe the implementation of the MIM that can support ships-in-the-night mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective security for TLS

    Publication Year: 2001, Page(s):216 - 221
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    Today's computing environments are becoming increasingly heterogeneous, mostly due to the growth of mobile computing. In this environment, application layer proxies that can adapt and tailor the content to the client's needs and capabilities as well as to the available network resources are highly beneficial. The problem is that content adaptation proxies are generally incompatible with the notion... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using network flows in hierarchical QoS routing

    Publication Year: 2001, Page(s):422 - 427
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB) | HTML iconHTML

    Quality of Service (QoS) routing is the process of routing a connection through a network based on its resource requirements. In QoS routing a lot of overhead is generated either due to the state maintenance or during the call establishment. These overheads increase with the network size. Hence to deploy QoS routing in very big networks, special techniques for reducing these overheads have to be d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic scheduling in Bluetooth network

    Publication Year: 2001, Page(s):355 - 359
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Bluetooth is a wireless ad-hoc network concept using a universal short-range radio link for communicating electronic devices in a small area. The Bluetooth radio nodes form piconets and provide a slotted time division duplex (TDD) scheme in which each slot is 0.625 ms long. This work studies traffic performance in a piconet focusing on "mean packet delay" and "probability of packet loss" of data t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new efficient group signature scheme based on linear codes

    Publication Year: 2001, Page(s):124 - 129
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    An efficient group signature scheme is presented. The security of this scheme is based on the difficulty of the decoding problem of linear codes, and the security of the ElGamal signature scheme. For a given [n, k, d] code and the corresponding group signature scheme, the lengths of the signatures and the group public key are n+5 and n2+5 respectively. With regard to the computational o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS control protocol for rate-adaptive video traffic

    Publication Year: 2001, Page(s):434 - 438
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    We present an application layer quality of service (QoS) control protocol (QCP), which employs an additive-increase bandwidth feedback algorithm. The protocol enhances the communication between end nodes and "the network" by a QoS packet sent from the source for per n video frames. The destination calculates the delay jitter, throughput for per QoS interval, and sends a backward QoS packet to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic traffic estimation scheme for UMTS radio resource efficiency

    Publication Year: 2001, Page(s):476 - 480
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (762 KB) | HTML iconHTML

    Radio resource must be controlled dynamically in order to guarantee QoS and manage radio resources efficiently in UMTS. The allocation of radio resources in 3GPP documents is based only on the amount of data in the radio link control (RLC) transmission buffer. This may cause difficulties in adapting high traffic burstiness that is an intrinsic property of variable bit rate (VBR) traffic. UMTS pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web object life measurement using Squid log file

    Publication Year: 2001, Page(s):100 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    Web object life was directly and costly derived by directly polling at original Web servers. A new Web object life measurement is proposed using a proxy and cache server log file. Each object-request record is classified into life-related types, Life_Hit, Life_Miss, Life_Unknown or Life_Ignore. An object life is calculated using Life_Hit and Life_Miss's timestamps. This indirect measurement has be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient connection scheme for mobile IP

    Publication Year: 2001, Page(s):396 - 400
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    Computer users in this varied and rapidly changing world does not stay in one place, and the correspondence among computers through the Internet has increased due to the quick development of Web based applications. But the Internet TCP/IP communication protocol was not designed to cover a mobile host, so the IP protocol should detect a mobile host that independently moves and have a moving managem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GLOB: generic load balancing

    Publication Year: 2001, Page(s):70 - 75
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB) | HTML iconHTML

    Current load balancing solutions are capable of improving the throughput of network service clusters, but they suffer from fundamental structural limitations. In particular, these systems do not cater for balancing gateway systems, such as NAT devices or firewalls. We propose a generic load balancing system (GLOB). GLOB is a client-transparent, peer-to-peer adaptive load balancing system that uses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ranging schemes for fast dynamic recovery of DOCSIS networks

    Publication Year: 2001, Page(s):154 - 159
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (626 KB) | HTML iconHTML

    Power outages can seriously disrupt the digital services over community antenna television (CATV) networks. This paper proposes two novel schemes for the ranging process of the Data Over Cable Service Interface Specification (DOCSIS) protocol, within the dynamic persistent ranging framework, which offer an absolute reduction of up to 34% in a cable network's recovery time with an average of 28%. B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A transparent deployment method of RSVP-aware applications on UNIX

    Publication Year: 2001, Page(s):439 - 443
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    This paper proposes a method, called RLR (RSVP library redirection), which can transform legacy Internet applications into RSVP-aware applications without modifying their source files. RLR achieves the transparent transformation by redirecting procedure calls from the socket library to the RAPI (RSVP application programming interface) library. For UNIX operating systems, such as Linux, Free-BSD et... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.