By Topic

Proceedings. Ninth IEEE International Conference on Networks, ICON 2001.

10-12 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 93
  • A location management scheme for mobility support in wireless IP networks using session initiation protocol (SIP)

    Publication Year: 2001, Page(s):486 - 491
    Cited by:  Papers (1)  |  Patents (62)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (714 KB) | HTML iconHTML

    IP telephony has attracted significant interest due to the substantial cost savings that can be achieved, and the ubiquitous nature of IP in emerging network systems. The IETF has proposed a signalling protocol for IP telephony, the session initiation protocol (SIP). SIP provides not only basic signalling, but also the "hooks" necessary to support personal mobility. Therefore, we believe that SIP ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless home networks based on a hierarchical Bluetooth scatternet architecture

    Publication Year: 2001, Page(s):481 - 485
    Cited by:  Papers (7)  |  Patents (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Wireless home networking is being addressed by numerous groups such as the HomeRF working group, and the Bluetooth consortium. Of these, Bluetooth technology promises a wider acceptance in term of home networking in the near future. The potential of easily embedding Bluetooth technology in communication devices, computing devices and home appliances make it a more attractive alternative to SWAP. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS control protocol for rate-adaptive video traffic

    Publication Year: 2001, Page(s):434 - 438
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    We present an application layer quality of service (QoS) control protocol (QCP), which employs an additive-increase bandwidth feedback algorithm. The protocol enhances the communication between end nodes and "the network" by a QoS packet sent from the source for per n video frames. The destination calculates the delay jitter, throughput for per QoS interval, and sends a backward QoS packet to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards securing 3G mobile phones

    Publication Year: 2001, Page(s):222 - 227
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (673 KB) | HTML iconHTML

    Third-generation (3G) mobile phones are capable of high data rate Internet connection and promise seamless connectivity for a free roaming user. They can provide an "always on" Internet, and make a range of services, traditionally available on desktop computers, accessible to mobile users, irrespective of their location. Providing adequate security for these phones and the services that they offer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic traffic estimation scheme for UMTS radio resource efficiency

    Publication Year: 2001, Page(s):476 - 480
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (762 KB) | HTML iconHTML

    Radio resource must be controlled dynamically in order to guarantee QoS and manage radio resources efficiently in UMTS. The allocation of radio resources in 3GPP documents is based only on the amount of data in the radio link control (RLC) transmission buffer. This may cause difficulties in adapting high traffic burstiness that is an intrinsic property of variable bit rate (VBR) traffic. UMTS pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Buffer management for TCP over GFR service in an ATM network

    Publication Year: 2001, Page(s):302 - 307
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (659 KB) | HTML iconHTML

    Buffer management plays an important role in guaranteed frame rate (GFR) service in an asynchronous transfer mode (ATM) network. Buffer management algorithms are used to allocate appropriate space in a switch buffer for untagged GFR cells to fulfill the guaranteed minimum cell rate (MCR). Two main goals of buffer management algorithms are high throughput and high fairness index. However, these goa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new efficient group signature scheme based on linear codes

    Publication Year: 2001, Page(s):124 - 129
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    An efficient group signature scheme is presented. The security of this scheme is based on the difficulty of the decoding problem of linear codes, and the security of the ElGamal signature scheme. For a given [n, k, d] code and the corresponding group signature scheme, the lengths of the signatures and the group public key are n+5 and n2+5 respectively. With regard to the computational o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A restoration mechanism using K-shortest control paths

    Publication Year: 2001, Page(s):428 - 433
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    This paper presents a restoration scheme using k-shortest control paths. Our mechanism classified connections into two classes: real time class and non-real time class. In real time class, an ATM protection switching (APS) mechanism, a preventive restoration method defined in 1.630, is used as a restoration scheme that is realizing fast restoration and high reliability. In the non-real time class,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective security for TLS

    Publication Year: 2001, Page(s):216 - 221
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    Today's computing environments are becoming increasingly heterogeneous, mostly due to the growth of mobile computing. In this environment, application layer proxies that can adapt and tailor the content to the client's needs and capabilities as well as to the available network resources are highly beneficial. The problem is that content adaptation proxies are generally incompatible with the notion... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of end-to-end TCP-friendly video transfer in the Internet

    Publication Year: 2001, Page(s):56 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB) | HTML iconHTML

    We use network simulator ns2 to evaluate the performance of a TCP-friendly rate-based control protocol for transferring high-quality video in the Internet. Apart from studying the friendliness property of the TCP-friendly protocol, we define and use the rate-uniformness metric to study the degree of mismatch in the video transfer rate. The latter metric suggests the delivered quality of the MPEG2 ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Current directions in active programmable network

    Publication Year: 2001, Page(s):240 - 245
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    The active programmable network (APN) has begun a new phenomenon in the logical view towards network in the Internet domain. Traditional technologies based on IP have viewed the network as a black box where the network is hidden from the upper layers. The advantage of this model is the simplicity and the robustness it can offer. However, this model may not be appropriate for the future application... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-phase approach for virtual topology reconfiguration of wavelength-routed WDM optical networks

    Publication Year: 2001, Page(s):371 - 376
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (554 KB) | HTML iconHTML

    In a WDM network, messages are carried in all-optical form using lightpaths. These set of semi-permanent light-paths may be viewed as a virtual topology. Virtual topologies are designed to optimize some objective function with traffic as the input. The virtual topology may need to be changed in response to the changing traffic patterns. This process of changing the virtual topology is called recon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The multi-layer RSIP framework

    Publication Year: 2001, Page(s):166 - 171
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (582 KB) | HTML iconHTML

    Network Address Translation (NAT) and Realm Specific IP (RSIP) were proposed to extend the lifetime of IPv4 architecture. However NAT and RSIP do not have the ability to communicate with multi-layer private networks. This paper proposes an enhanced framework of multi-layer Realm-Specific IP (MRSIP) that not only inherits all the benefit of RSIP but also provides both end-to-end transparent-access ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation study on the throughput fairness of TCP Vegas

    Publication Year: 2001, Page(s):469 - 474
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB) | HTML iconHTML

    Throughput fairness is an important criterion for evaluating TCP performance. Fairness is especially important for best effort service, which is the dominant type of service in the Internet still and, predictably, in the years to come. However, the TCP protocols prevailing in the Internet, including TCP Tahoe and TCP Reno, are known to be unfair, especially to connections with larger round-trip de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Credit token leaky bucket algorithm with fuzzy logic in ATM networks

    Publication Year: 2001, Page(s):296 - 301
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB) | HTML iconHTML

    This paper proposes a new model of leaky bucket (LB) called credit token leaky bucket (CTLB). Since the leaky rate of conventional LB is more than the negotiated mean cell rate, the performance of usage parameter control (UPC) depends on the burstiness of source and the statistical characteristics of cell stream passing through UPC. Therefore, lower performance, easily caused by a malicious user, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet charging-behind the time$

    Publication Year: 2001, Page(s):116 - 121
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (666 KB) | HTML iconHTML

    Billing and charging is a hard issue, but an extremely important one given the increasingly commercial nature of the Internet. Economic analysis and emerging Internet technologies have stimulated charging research to new levels, and many, approaches have been produced by the Internet community in response to such stimulus, but little standardisation has resulted. This paper is a sampling of the di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The cost of peer discovery and searching in the Gnutella peer-to-peer file sharing protocol

    Publication Year: 2001, Page(s):263 - 268
    Cited by:  Papers (17)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (582 KB) | HTML iconHTML

    A lot of attention has been focused on peer-to-peer file sharing systems. Gnutella is a fully distributed peer-to-peer protocol without the need for a central entity. This increases the reliability of the system by avoiding a single point of failure as well making it more immune to legal attack. The two main features of the Gnutella protocol discovery of peers and searching for files are implement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Loss and delay behavior of an ATM multiplexer for aggregated PMPP (Pareto-modulated Poisson process) traffic sources

    Publication Year: 2001, Page(s):344 - 348
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    Average cell loss and cell delay behavior of a simulated 155 Mbit/s ATM multiplexer is studied for aggregated traffic from a number of Pareto-modulated Poisson process (PMPP) sources. PMPP traffic sources are known to generate self-similar traffic with long-range dependence; the dependence of average cell loss ratio and average cell delay parameters on varying buffer sizes is reported. Inappropria... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using network flows in hierarchical QoS routing

    Publication Year: 2001, Page(s):422 - 427
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB) | HTML iconHTML

    Quality of Service (QoS) routing is the process of routing a connection through a network based on its resource requirements. In QoS routing a lot of overhead is generated either due to the state maintenance or during the call establishment. These overheads increase with the network size. Hence to deploy QoS routing in very big networks, special techniques for reducing these overheads have to be d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-level threshold for RCAC (region-based call admission control) in multimedia wireless network

    Publication Year: 2001, Page(s):208 - 213
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Next generation wireless networks are expected to support multi-rate multimedia services, including wideband services, and to have smaller cell structures like micro/pico cells. Smaller cells increase the handoff traffic drastically and wideband services cause severe network fluctuations with their frequent handoffs. As a result, it is a challenge to provide stable QoS in wireless networks. In add... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronizing multimedia flows in active-high-speed networks

    Publication Year: 2001, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (647 KB) | HTML iconHTML

    The main requirement of multimedia stream transfer is to guarantee the quality of service contracted between the user and the network. We are particularly interested by the synchronization constraints between different data streams flowing through a high-speed network. Our approach aims to regulate the streams progress reducing the gap observed between these streams and assuming that intermediate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PKI and digital certification infrastructure

    Publication Year: 2001, Page(s):234 - 239
    Cited by:  Papers (16)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable communications.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Suitability of cryptographic modes of operation for the encryption in high-speed networks

    Publication Year: 2001, Page(s):134 - 139
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (605 KB) | HTML iconHTML

    Today, modern applications require more and more bandwidth as a result of the increasing quality and performance of the applications. Not only, the bandwidth requirements have to be met but also the demand for data confidentiality. Therefore, new or modified cryptographic modes of operation are required, which usually, provoke error propagation resulting in a higher error rate. The influence of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GLOB: generic load balancing

    Publication Year: 2001, Page(s):70 - 75
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB) | HTML iconHTML

    Current load balancing solutions are capable of improving the throughput of network service clusters, but they suffer from fundamental structural limitations. In particular, these systems do not cater for balancing gateway systems, such as NAT devices or firewalls. We propose a generic load balancing system (GLOB). GLOB is a client-transparent, peer-to-peer adaptive load balancing system that uses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design and analysis of top-down based ACK-trees

    Publication Year: 2001, Page(s):177 - 182
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    For reliable multicast service, to use a tree hierarchy can be a promising solution to avoid the well-known ACK-implosion. However, to build an efficient ACK-tree is very difficult for IP multicast because it does not provide explicit membership and routing topology information to the upper layer protocol. Due to the difficulties, not much study has been done on the control tree configuration yet,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.