Proceedings 2001 International Conference on Computer Networks and Mobile Computing

16-19 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 77
  • Proceedings 2001 International Conference on Computer Networks and Mobile Computing

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (314 KB)
    Freely Available from IEEE
  • Managing code assignment in multi-code CDMA wireless networks for the delivery of H.263 video streams

    Publication Year: 2001, Page(s):473 - 478
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    We study the problem of how to efficiently distribute network resources among H.263 packet video streams in a multi-code CDMA network. Due to high flexibility of both the video encoding system and CDMA system, it is not trivial to find an optimal solution for the problem. We present different algorithms for transferring video in CDMA networks. We compare those algorithms in our simulation environm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):527 - 529
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • Fault-tolerant scheduling in distributed real-time systems

    Publication Year: 2001, Page(s):275 - 280
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    In distributed systems, a real-time task has several subtasks which need to be executed at different nodes. Some of these subtasks can be executed in parallel on different nodes without violating their precedence relationships, if any, among them. To better exploit the parallelism, it becomes necessary to assign separate deadlines to subtasks and schedule them independently. We use three subtask d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of the mobile-code-based file system for portable information device

    Publication Year: 2001, Page(s):441 - 445
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    While the mobile communication device is developing into the portable information device, it is necessary to design a distributed file-system in such a mobile environment. In order to do it, we must consider the relative shortage of the portable storage and low computation ability of a portable information device as well as unreliable and low-performance networks. By using mobile code technology, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A congestion control mechanism supporting QoS requirements

    Publication Year: 2001, Page(s):55 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    Most of the existing congestion control works are suitable for the best effort flows, but not for the flows with quality of service (QoS) requirements. In this paper, by adopting equation-based congestion control (EBRC) for differentiated services instead of traditional TCP congestion control for best-effort service, a new congestion control mechanism supporting QoS requirements can be achieved. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cell clustering for fast handoff

    Publication Year: 2001, Page(s):269 - 274
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (598 KB) | HTML iconHTML

    When wireless networks as connected to wired networks, e.g. ATM networks, mobile hosts can gain access to the resources stored on the wired networks. Handoffs originally used in wireless networks must be extended if the wired network is connection-oriented, such as ATM. In the new environment, if a mobile host is moving out of its current cell, radio signals and connections must be switched accord... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing mandatory integrity protection in operating system

    Publication Year: 2001, Page(s):435 - 440
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (583 KB) | HTML iconHTML

    It is functionality other than security that was put in the first place when most systems and applications were built. The threats brought by Internet connectivity, downloaded code and loaded modules are obvious and dangerous and requires a kind of reliable integrity protection. In this paper we present our mandatory integrity protection (RS-MIP) building in a secure Linux operating system kernel.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • nPFS: efficient management of multiple QoS objects

    Publication Year: 2001, Page(s):49 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (586 KB) | HTML iconHTML

    Current proposals for the packet scheduling strategy of multiple performance objects in high-speed packet-switched networks attract more and more attention. At the same time, the end-to-end Quality of Service (QoS) requirements need to be satisfied and the network resource should be allocated fair and efficiently. In this paper, we provides nPFS, a network proportional fairness scheduling strategy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and performance evaluation of differentiated services router for next generation Internet

    Publication Year: 2001, Page(s):316 - 321
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    The current Internet provides only "best effort" services, however, applications and users expect different QoS (Quality of Service). To meet these requirements, the differentiated services (DiffServ) architecture is introduced. Because DiffServ is regarded as the foundation of the next generation Internet QoS architecture, it is helpful to design a DiffServ Router (DSR) and evaluate its performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configurable mobile agent and its fault-tolerance mechanism

    Publication Year: 2001, Page(s):380 - 389
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (869 KB) | HTML iconHTML

    The idea of performing client-server computing by transmission of executable programs between clients and servers has become highly popular among researchers and developers who are engaged in intelligent network services. Computing based on mobile agents is an important aspect of this idea. This paper focuses on researching the migration process of agents. A model based on modules is devised for c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet multifractal modeling for network traffic and queuing analysis

    Publication Year: 2001, Page(s):260 - 265
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    We give a wavelet-based model of network traffic, which exhibits multifractal characters. The discovery of the multifractal nature of traffic has made new models and analysis tools for traffic essential, since self-similar or long-range dependence (LRD) models are far too optimistic in their predictions of performance. The short-range dependence (SRD) must be considered especially in the flow cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extended exponential broadcasting: a new broadcasting scheme for video-on-demand systems

    Publication Year: 2001, Page(s):461 - 466
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB) | HTML iconHTML

    Partitioned broadcasting scheme is an efficient scheme for popular videos in video-on-demand system. In a partitioned broadcasting scheme, a video is divided into several segments and each segment is sent over one channel in cycles. In this paper, we propose another partitioned broadcasting scheme for broadcasting popular videos, called Extended Exponential Broadcasting (EEB) scheme. We then analy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic location management with variable size location areas

    Publication Year: 2001, Page(s):73 - 78
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    This paper introduces a dynamic location management algorithm with variable size location areas (LAs), which helps in reducing location update (LU) cost and hence total location management cost. Basically there are two types of location management strategies - Static and Dynamic. In the static strategy (used in GSM), LAs consist of static and arbitrarily defined collections of cells, which do not ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast IP lookup scheme for longest-matching prefix

    Publication Year: 2001, Page(s):407 - 412
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    One of the key design issues for the next generation IP routers is the IP Lookup mechanism. IP lookup is an important action in router that is to find the next hop of each incoming packet with a longest-prefix-match address in the routing table. In this paper, we propose an IP lookup mechanism with the number of memory access for an IP lookup being one in the best case and being four in the worst ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The algorithm and model of Trash: A scheme enforcing equal share

    Publication Year: 2001, Page(s):425 - 432
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (802 KB) | HTML iconHTML

    As a stateless buffer management scheme, Trash algorithm is aimed to protect TCP friendly flows from non-responsible UDP through the fair allocation of network resources. The algorithm and its theoretical model are discussed in this paper. In the model, all interested working parameters of the Trash can be easily derived from given system settings. Simulation shows that this model is an useful pra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configurable and networked web-based vertical applications

    Publication Year: 2001, Page(s):41 - 46
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    As network and mobile computing technologies evolving, the enterprise applications are also expanded to web-based platforms facilitated by these enabling technologies. The progress is further propelled by large-scale e-commerce activities such as B2C (business-to-consume) and B2B (business-to-business) applications. This paper proposes the use of observations and models of brain development in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a link layer protocol using UML

    Publication Year: 2001, Page(s):309 - 315
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (635 KB) | HTML iconHTML

    This paper presents a report on the development of a link layer protocol using an object oriented formal method. It describes the steps involved in the conceptualization, analysis and design of the L2CAP (Logical Link Control and Adaptation Layer Protocol) of the Bluetooth architecture. UML (Unified Modeling Language) is the formal modeling language used in this work. It has been shown how the sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable hierarchical architecture for distributed network management

    Publication Year: 2001, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    We present a hierarchical, scalable and dynamic management scheme for managing large-scale distributed networks. The proposed hierarchical architecture achieves scalability by modifying the number of components according to the size of the network. The hierarchical approach can efficiently distribute the loads and improve the reliability of the system. In order to increase flexibility, the system ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient control mechanism of mobile agents

    Publication Year: 2001, Page(s):371 - 379
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB) | HTML iconHTML

    The control of tasks in traditional distributed systems is a well researched field for which many solutions exist. These solutions exploit well defined parent-child relationships given in distributed systems; but they are not applicable in mobile agent systems, since no similar natural relationships between agents exist. Thus new mechanisms have to be developed. In this paper, we present an effici... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transaction management in mobile multidatabase systems

    Publication Year: 2001, Page(s):513 - 518
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB) | HTML iconHTML

    Tremendous advances in wireless networks and portable computing devices have led to development of mobile computing. Traditional transaction management in multidatabase systems cannot be applied to mobile environment. In this paper, we analyze the features of mobile multidatabase environment. A mobile transaction model based on nested transactions is proposed and a serializability theory is presen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving fair bandwidth allocation without per-flow state

    Publication Year: 2001, Page(s):137 - 143
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (598 KB) | HTML iconHTML

    In this paper, we present Queue Length based Fair Queueing (QLFQ), a scheme to approximate fair bandwidth allocation without per flow state. Edge routers divide each flow into a set of layers using a linear encoding scheme and insert an appropriate label into each packet header. Core routers maintain a dropping threshold at each router; packets with a label greater than the threshold are dropped. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analytic throughput model for TCP Reno over wireless networks

    Publication Year: 2001, Page(s):111 - 116
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    Many wireless network applications are built on TCP, and will continue to be in the foreseeable future. It is important to study TCP performance in wireless networks scenario with high loss rate. In this paper, we develop a simple analytic characterization of the steady state throughput of a bulk transfer TCP Reno flow over wireless networks, as a function of loss rate and round trip time. Our mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a RSVP-capable router for multiple QoS support

    Publication Year: 2001, Page(s):254 - 259
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    For the accuracy of the Intserv/RSVP and the scalability of the Diffserv, the two service models which IETF introduced to provide end-to-end quality of service, can complement each other in many respects and can coexist for a long time. Most of the specifications for "gluing" the Intserv and Diffserv and RSVP together have not been standardized yet, therefore an important challenge for router vend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel RED-Based hop-by-hop congestion control

    Publication Year: 2001, Page(s):289 - 293
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    With the rapid emergence of new services and quick changes of traffic in the Internet, the widely used end-to-end congestion control mechanism becomes insufficient. This paper presents a novel RED-based hop-by-hop congestion control mechanism which is based on the coordination of the routers and the hosts. No per-flow state information is maintained in the routers. The application itself need not ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.