Proceedings Ninth International Conference on Computer Communications and Networks (Cat.No.00EX440)

16-18 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 102
  • Proceedings Ninth International Conference on Computer Communications and Networks (Cat.No.00EX440)

    Publication Year: 2000
    Request permission for commercial reuse | |PDF file iconPDF (465 KB)
    Freely Available from IEEE
  • Security mechanisms in high-speed networks

    Publication Year: 2000
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (819 KB)

    Summary form only given. High-speed networks are becoming popular for accessing remote data and information sharing and more and more organizations are connecting through networks to obtain financial and strategic advantages. However, this high-bandwidth connectivity also exposes them to a higher degree of security attacks and intrusions. A router-based packet-filtering firewall is an effective wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2000, Page(s):662 - 663
    Request permission for commercial reuse | |PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Flow identification for supporting per-flow queueing

    Publication Year: 2000, Page(s):88 - 93
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (412 KB)

    Over the last several years there has been considerable interest in multimedia communications over the Internet. This paper investigates one of the key technical issues in supporting per-flow queueing-flow identification. We present several hashing-based flow identification approaches and examine their performance and scalability limits with a quantitative analysis and a simulation study with back... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive routing algorithm for wavelength-routed optical networks with a distributed control scheme

    Publication Year: 2000, Page(s):192 - 197
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (476 KB)

    For a wavelength-routed network in which connection requests are arriving and departing at high rates, an appropriate control scheme must be implemented to set up light paths for each request in a fast and efficient manner. The control scheme, which includes routing and wavelength assignment algorithms, must also be scalable, and should attempt to minimize the number of blocked connections. In thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differentiated-service-based inter-domain multicast routing: enhancement of MBGP

    Publication Year: 2000, Page(s):290 - 297
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1088 KB)

    There has recently been active research on quality of service (QoS) multicasting. Very few, however, address QoS inter-domain multicasting. In this paper, we present a differentiated service (DS) extension to MBGP (Multicasting Border Gateway Protocol), which is an extension of BGP-4 (Border Gateway Protocol 4) to support multicasting. With limited modification to the MBGP, we extend it to support... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing temporal locality and its impact on web server performance

    Publication Year: 2000, Page(s):434 - 441
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (668 KB)

    The presence of temporal locality in web traces has long been recognized. However, the close proximity of requests for the same file in a trace can be attributed to two orthogonal reasons: long-term popularity and short-term correlation. The former reflects the fact that requests for a popular document appear “frequently” thus they are likely to be “close” in an absolute se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of on-off patterns in VoIP and their effect on voice traffic aggregation

    Publication Year: 2000, Page(s):82 - 87
    Cited by:  Papers (27)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (568 KB)

    We present an experimental analysis of on-off patterns in voice over IP (VoIP), where we study the talk-spurt/gap distribution produced by two modern silence detectors: ITU G.729 Annex B Voice Activity Detector (VAD) and NeVoT Silence Detector (SD). The results indicate that spurt/gap distributions are fairly sensitive to both the sound volume and the type of silence detectors, but all showed that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A forward error recovery technique for real-time MPEG-2 video transport and its performance over wireless IEEE 802.11 LAN

    Publication Year: 2000, Page(s):497 - 502
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (480 KB)

    Real-time MPEG-2 video transport applications do not usually have the luxury of a reverse channel for recovering from any errors that might occur during communication. Degradation in quality of decoded video frames is immediately apparent in the presence of errors in headers. In this paper, we focus on protecting header information by replicating it in any free space that might be available in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deadline based network resource management

    Publication Year: 2000, Page(s):264 - 268
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (468 KB)

    A novel approach to supporting real time applications in packet-switched networks is proposed. The key element of this approach is the use of a tuple (size, deadline) to characterize the performance requirements of a document. This tuple is mapped to deadline information at the network layer, which is carried in packets and used by routers for channel scheduling purposes. A new deadline based sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicasting in a class of multicast-capable WDM networks

    Publication Year: 2000, Page(s):184 - 191
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (576 KB)

    Multicast is the ability to transmit information from a single source node to multiple destination nodes. Multicast can be supported more efficiently in an optical domain by utilizing the inherent light splitting capacity of optical switches than by copying data in an electronic domain. In this paper, we study multicast communication in a class of multicast-capable WDM networks (i.e., the networks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-demand optimization of label switched paths in MPLS networks

    Publication Year: 2000, Page(s):107 - 113
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (576 KB)

    Multiprotocol label switching (MPLS) technology provides efficient means for controlling the traffic of IP backbone networks and thus, offers performance superior to that of traditional interior gateway protocol (IGP)-based packet forwarding. However, computation of explicit paths yielding optimal network performance is a difficult task; several different strategies can be thought of. We propose a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability of RED with two-way TCP traffic

    Publication Year: 2000, Page(s):214 - 219
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (500 KB)

    This paper points out a phase effect with RED-like queue management algorithms and two-way TCP traffic. It is shown by simulation and measurement that the RED (random early detection) queue converges to a state of heavy oscillation in the presence of two-way bulk-data TCP traffic, causing suboptimal link utilization and service differentiation between in-profile and out-of-profile packets. Besides... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The PEN low power protocol stack

    Publication Year: 2000, Page(s):282 - 288
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (584 KB)

    Low power consumption is a key design metric for wireless network devices that have limited battery energy. The problem of reducing power consumption needs to be addressed at every level of system design. This paper investigates the issues of designing low-power protocols in the context of the PEN system, a mobile ad hoc radio network developed at AT&T Laboratories Cambridge. It describes the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Edge provisioning and fairness in VPN-Diffserv networks

    Publication Year: 2000, Page(s):424 - 431
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (876 KB)

    Customers of virtual private networks (VPN) over differentiated services (Diffserv) infrastructure are most likely to demand not only security but also guaranteed quality of service (QoS) as there is a desire to have leased line like services. However, it is expected that they will be unable or unwilling to predict load between VPN endpoints. In this paper, we propose that customers specify their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A buffer management and channel allocation strategy for QoS support in an ATM switch

    Publication Year: 2000, Page(s):463 - 466
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (268 KB)

    We consider an ATM switch that handles two types of traffic: voice and best-effort data. Voice is delay-sensitive while data is loss-sensitive. Contention at output ports is resolved by output queuing. The output buffer is organized into two virtual queues, one for voice and the other for data. To meet the delay QoS of voice, the channel is allocated to the respective queue with a probability that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental evaluation of a wireless ad hoc network

    Publication Year: 2000, Page(s):528 - 534
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (612 KB)

    We experimentally evaluate the performance of a wireless ad hoc network from the point of view of both the routing and transport layers. The experiments are done on a testbed with desktop PCs and laptops using wireless radio LAN interfaces. For these experiments an on-demand routing protocol called AODV (ad hoc on-demand distance vector) has been implemented as a part of the operating system proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient edge-based congestion management for a differentiated services domain

    Publication Year: 2000, Page(s):75 - 80
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (588 KB)

    A novel efficient and low-complexity congestion management method in a differentiated service (DiffServ) domain, so-called edge-based congestion management (ECM), to improve network resource utilization, is proposed. Based on a pro-active congestion control and a dynamic rate regulation, the core nodes and the edge nodes cooperate to respond early to the onset of congestion and to quickly recover ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DORMIA: a distributed system for mobile information access

    Publication Year: 2000, Page(s):491 - 496
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (496 KB)

    A new distributed information system called DORMIA has been developed to support mobile information access from portable computers with weak network connectivity. This paper describes the design and implementation of DORMIA. The design aims to provide high availability, heterogeneous support and high efficiency. To maximize availability, users can read or write any accessible replica. A scalable a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new traffic model for MPEG encoded videos in ATM networks

    Publication Year: 2000, Page(s):258 - 263
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (540 KB)

    This paper presents a new traffic model for MPEG encoded video sequences. Two second-order autoregressive (AR) processes are used to model the autocorrelation structure. One AR process is used to generate the mean frame size of the scenes to model the long range dependence and another AR process is used to generate the fluctuations within the scenes to model the short range dependence. The scene l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization of performance of TCP/IP over PPP and ATM over asymmetric links

    Publication Year: 2000, Page(s):334 - 339
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (528 KB)

    The objective of this paper is to characterize and analyze the performance of TCP/IP when used over point-to-point protocol (PPP) and asynchronous transfer mode (ATM) on asymmetric links. This will allow us to gain insight into this new protocol architecture used in the asymmetric digital subscriber line (ADSL) access network and to investigate the related quality of service (QoS) issues. Using si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic adaptive mapping of videos in a hierarchical TV-Anytime server network

    Publication Year: 2000, Page(s):402 - 409
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (576 KB)

    In this paper we propose a hierarchical server network architecture for the support of a large-scale TV-Anytime system. We present and formulate various policies used for the effective mapping of videos in the runtime of the TV-Anytime system. A predictive assignment policy is presented to determine periodically the mapping of videos to the server network. Furthermore, we present an adaptive reall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical study of buffer management scheme for Diffserv assured forwarding PHB

    Publication Year: 2000, Page(s):632 - 637
    Cited by:  Papers (25)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (524 KB)

    The IETF Differentiated Services Working Group has recently standardized the assured forwarding (AF) per hop behavior (PHB). RFC 2597 recommends that an active queue management (AQM) technique be used to realize the multiple levels of drop precedence required in the AF PHB. The most widely used AQM scheme is RED (random early detection). There are several ways to extend RED to a multi-level RED (M... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A channel-hopping protocol for ad-hoc networks

    Publication Year: 2000, Page(s):142 - 147
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (536 KB)

    Media access control (MAC) protocols for wireless networks may be based on collision-avoidance handshakes between sender and receiver. Those protocols proposed or implemented to date require either carrier sensing or the assignment of unique node codes in order to ensure that intended receivers hear data packets without interference from hidden sources. We present and analyze a new collision-avoid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The secure model for enterprise connectivity

    Publication Year: 2000, Page(s):176 - 182
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (584 KB)

    The need for implementing data security over enterprise networks has been brought to the forefront of the e-commerce marketplace by an increasing number of incidents where confidential data is compromised or private information is abused by electronic intruders. The importance of data that is being stored, distributed and processed over the network medium has led to a strong focus on the security ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.