By Topic

Local Computer Networks, 2001. Proceedings. LCN 2001. 26th Annual IEEE Conference on

Date 14-16 Nov. 2001

Filter Results

Displaying Results 1 - 25 of 84
  • Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (417 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s):653 - 655
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Mobility in a future Internet

    Publication Year: 2001, Page(s):24 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (666 KB) | HTML iconHTML

    Mobility of users in a future Internet has become a reality due to highly mobile end-systems. However, the new dimension of protocol functionality, Mobile IP, resource control, quality of service (QoS) support and AAA (authentication, authorization and accounting) features extended by charging schemes are still to be integrated effectively. Therefore, this position paper addresses these three area... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A range-based SLA and edge driven virtual core provisioning in DiffServ-VPNs

    Publication Year: 2001, Page(s):12 - 21
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (957 KB) | HTML iconHTML

    We previously proposed a range-based service level agreement (SLA) approach and edge provisioning in DiffServ capable virtual private networks (VPNs) to customers that are unable or unwilling to predict the load between VPN endpoints exactly. With range-based SLAs customers specify their requirements as a range of quantitative values rather than a single one. Various suitable policies and algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of anonymity providing techniques using queuing theory

    Publication Year: 2001, Page(s):316 - 322
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (639 KB) | HTML iconHTML

    In our work we use queuing theory both for security (ie, anonymity) and performance analysis. A well-known anonymity technique, the MIX method, which is the basis of most of today's deployments, is the object of our investigation. We show shortcomings and problems in the MIX method and suggest possible workarounds. Our investigation reveals the level of security of MIX based systems and their perf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of quality of service schemes for IEEE 802.11 wireless LANs

    Publication Year: 2001, Page(s):348 - 351
    Cited by:  Papers (58)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    This paper evaluates four mechanisms for providing service differentiation in IEEE 802.11 wireless LANs, the point coordinator function (PCF) of IEEE 802.11, the enhanced distributed coordinator function (EDCF) of the proposed IEEE 802.11e extension to IEEE 802.11, distributed fair scheduling (DFS), and Blackburst using the ns-2 simulator. The metrics used in the evaluation are throughput, medium ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A constant size rekeying message framework for secure multicasting

    Publication Year: 2001, Page(s):380 - 385
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (586 KB) | HTML iconHTML

    We propose a new framework for key management to construct a secure multicasting environment. When rekeying, only one message needs to be generated, and the message size is a constant. Especially when the group size is large, our framework largely reduces the traffic in the network. Two solutions are given to carry out this framework, which are closed curve solution (CCS) and perpendicular space s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet-integrated building control: leaving the lab-robust, scalable and secure

    Publication Year: 2001, Page(s):306 - 315
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (927 KB) | HTML iconHTML

    An infranet is a sub-computer network controlling infrastructure devices, for example, low-bandwidth sensor/actuator networks. Based on an analysis of heterogeneous systems for interconnecting distributed infrastructural devices and experience of a research prototype, the paper describes a production-level implementation of an integrating architecture for accessing various infranets via intranets ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A capacity and utilization study of mobile ad hoc networks

    Publication Year: 2001, Page(s):576 - 583
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (755 KB) | HTML iconHTML

    We develop an empirical technique to determine the capacity of a mobile ad hoc network. We assume that the network runs on-demand routing and carrier sense-based medium access protocols. The technique, however, is general and should apply to other types of protocols. We develop a tool that determines the network capacity given session-level traffic and node mobility traces. We compare the network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice over IP with JVOIPLIB and JRTPLIB

    Publication Year: 2001, Page(s):346 - 347
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Voice over IP (VoIP) can be used in a wide variety of applications, all having different requirements. We present JVOIPLIB and JRTPLIB, a VoIP library and an RTP library respectively. Together they make it possible to easily add VoIP to various types of applications. Both libraries are written in an object-oriented style in C++, are open-source and are both very extensible. Several measures have b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive header compression for wireless networks

    Publication Year: 2001, Page(s):377 - 378
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    TCP/IP header compression has long been used to send information efficiently and to improve the response time of communication systems. It is also well known that errors on the link where header compression is used can deteriorate the performance. In addition, the previously noticed high frequency of some computer networking problems can make the performance of header compression even worse. These... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure distributed location management scheme for mobile hosts

    Publication Year: 2001, Page(s):296 - 305
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (846 KB) | HTML iconHTML

    With the increasing growth in mobile computing devices and wireless networks, users are able to access information from anywhere and at anytime. In such situations, the issues of location management for mobile hosts are becoming increasingly significant. Different location management schemes such as Columbia University's mobile IP scheme and IETF Mobile IP have been proposed. In this paper, we pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Profile-based protocols in wireless mobile ad hoc networks

    Publication Year: 2001, Page(s):568 - 575
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB) | HTML iconHTML

    Wireless Mobile Ad hoc NETworks (MANET) provide end-users with a flexible and cheap way to access and exchange information. While most research in MANETs is oriented to the general application environments, little work is done to utilize the specific characteristics of particular application scenarios, in which end-users' behavior is quite predictable or controllable. To deploy a MANET for a parti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On resource management in multi-service network

    Publication Year: 2001, Page(s):66 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB) | HTML iconHTML

    In the present work we address a problem of optimal resource partitioning in high-speed networks with heterogeneous traffic classes and differentiated QoS requirements. The problem arguments are bandwidth and network-edge buffer space allocations for end-to-end connections. The problem formulation can take into account sensitivity variation of application performance for both aggregated and single... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notes on the per-flow packet count flow classifier

    Publication Year: 2001, Page(s):344 - 345
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    To realize a packet count classifier, in addition to the active flow table, a candidate table is needed, where information on flow candidates is kept. We observe the temporal behavior of both the active flow table and flow candidate table size using actual traffic traces. The results indicate that the performance bottleneck in a packet count classifier lies within the candidate table management. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion handling in dynamic Differentiated Services networks

    Publication Year: 2001, Page(s):168 - 177
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (975 KB) | HTML iconHTML

    Differentiated Services is a very promising approach to achieve quality of service in the Internet. However, setting up static service level agreements (SLA) between different Internet service provider domains lacks flexibility and may reduce quality of service as resource reservations cannot be adapted to the actual traffic. With the introduction of bandwidth brokers, a significant step towards a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ns-based Bluetooth LAP simulator

    Publication Year: 2001, Page(s):525 - 532
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (927 KB) | HTML iconHTML

    We present a Bluetooth LAN access point (LAP) simulator that we have developed to study pervasive application behavior under Bluetooth local connectivity. Our goal is to explore the impact on IP applications caused by the underlying Bluetooth protocol. Our simulator implements detailed processing of upper layers of the Bluetooth LAP stack, including PPP, RFCOMM, and L2CAP. For lower layers, it tri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic reconfiguration of wavelength-routed WDM networks

    Publication Year: 2001, Page(s):477 - 485
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    The problem of reconfiguring wavelength-routed optical networks when the traffic demand changes is considered. When reconfiguring the wavelength assignment according to the traffic demand, it is important to reduce the number of receivers that need to be retuned. Furthermore, after the reconfiguration, the load needs to be balanced among the wavelengths. The tradeoff here is between the number of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable and high capacity router on multi-dimension crossbar switch principle

    Publication Year: 2001, Page(s):375 - 376
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Eventhough conventional multistage switch architecture such as a Banyan switch can support a high speed capacity, but it still has a high latency and is not scalable. Moreover under non-uniform traffic, blocking occurs. Therefore, a new switch architecture based on multi-dimensional crossbar (MDXB) switch is introduced, as a better solution. The MDXB switch is an interconnection among crossbar swi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A causal-phase protocol to order soft real-time transactions in a distributed database

    Publication Year: 2001, Page(s):288 - 295
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (543 KB) | HTML iconHTML

    Real-time database applications are distributed in nature. Incorporating distributed data into a real-time database framework incurs complexity associated with transaction concurrency control and database recovery in a distributed context. This article presents an algorithm that manages soft real-time transactions in a distributed database. It uses a specific causal-ordering protocol to ensure the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient QoS scheme for mobile hosts

    Publication Year: 2001, Page(s):630 - 637
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML

    Mobile hosts utilize Mobile IP to retain connectivity, while roaming in various networks, and acquire new IP addresses through the mechanisms that Mobile IP supports. One of today's most demanding application requirements is QoS support. RSVP (resource reservation protocol), the protocol implementation of the IETF integrated services architecture (IntServ), cannot handle hosts that change their IP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on adjustment-based TCP-friendly congestion control: fairness and stability

    Publication Year: 2001, Page(s):142 - 148
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    In this paper, we focus on understanding the binomial congestion control algorithms (Bansal et al., 2001) and can generalize TCP-style additive-increase by increasing inversely proportional to a power k of the current window (for TCP, k=0) and generalize TCP-style multiplicative-decrease by decreasing proportional to a power l of the current window (for TCP, l=1). We discuss their global fairness ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OR2: a path tuning algorithm for routing in ad hoc networks

    Publication Year: 2001, Page(s):560 - 567
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    This paper presents "OR2", an adaptive path tuning scheme for mobile ad hoc networks. In OR2, the active path adapts dynamically to node mobility without any link failures based on the local link quality. Most conventional routing protocols accommodate the change of network topology only when the link fails. Unless the movement of intermediate nodes leads to any link failures, they cannot adapt to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the temporal characteristics of video traffic

    Publication Year: 2001, Page(s):500 - 508
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (746 KB) | HTML iconHTML

    It is widely accepted that the video frame size process is long range dependent (LRD), which has been indicated by a number of statistical tests. This approach suggests the use of LRD traffic models for traffic engineering, which in many cases leads to subexponential queue tails in the network buffers. Basically, there are two concepts that are considered as the origin of LRD in video modeling: se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An access control architecture for microcellular wireless IPv6 networks

    Publication Year: 2001, Page(s):454 - 463
    Cited by:  Papers (5)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (882 KB) | HTML iconHTML

    This document introduces a novel access control architecture for publicly accessible wireless overlay networks. The architecture is designed to address the problems of ubiquitous Internet service provisioning within the city of Lancaster. The proposed access control mechanism is based on the concepts of secure user authentication, packet marking, and network-level packet filtering. The novelty of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.