Scheduled System Maintenance
On Tuesday, January 22, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000

8-10 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 100
  • Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000

    Publication Year: 2000
    Request permission for reuse | PDF file iconPDF (411 KB)
    Freely Available from IEEE
  • Anonymisation services for IP multicast

    Publication Year: 2000, Page(s):2 - 9
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (794 KB)

    The importance of IP multicast grows with the number of new Internet services like video on demand, pay per view or business conferencing. Security considerations in group communication is a research topic for several years now and a number of relevant schemes and algorithms have been published. This paper focuses on the topic of anonymity in a multicast environment and starts with a fundamental o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmission power control for multiple access wireless packet networks

    Publication Year: 2000, Page(s):12 - 21
    Cited by:  Papers (24)  |  Patents (19)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (945 KB)

    Multiple access-based collision avoidance MAC protocols have typically used fixed transmission power and have not considered power control mechanisms based on the distance of the transmitter and receiver in order to improve spatial channel reuse. We motivate transmission power control and investigate the challenges involved in implementing power control in multiple access wireless packet networks.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach to ARQ error control mechanisms for wireless LANs communications

    Publication Year: 2000, Page(s):22 - 31
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1013 KB)

    Communications in high-speed wireless mobile networks have to deal with large varying transmission and service requirement conditions, often needing complex radio modulations and concatenated error control functions. For the latter, it is usual to implement forward error correction and automatic repeat request (ARQ) mechanisms in, respectively, the physical (PHY) and the data link control (DLC) la... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless packet scheduling with signal-to-noise ratio monitoring

    Publication Year: 2000, Page(s):32 - 41
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (821 KB)

    A key challenge in packet scheduling over a wireless channel is to achieve effective throughput against bursty errors. Although there have been several proposals on packet scheduling for a wireless channel, they are only based on bi-modal channel states: good or bad. In this paper we propose a new packet scheduling scheme for wireless links based on the receiver's signal to noise ratio (SNR). The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of TCP Reno and Vegas in wireless mobile ad hoc networks

    Publication Year: 2000, Page(s):42 - 43
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (227 KB)

    We investigate and evaluate the performance of these two TCP variants in a wireless mobile ad hoc network. The results in this paper are based on simulations using the NS2 network simulator from Lawrence Berkeley National Laboratory (LBNL), with extensions from the MONARCH project at Carnegie Mellon. We present our experimental results in two parts. The first part of the experiments does not inclu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive approaches to enhance throughput of IEEE 802.11 wireless LAN with bursty channel

    Publication Year: 2000, Page(s):44 - 45
    Cited by:  Papers (7)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (174 KB)

    Two simple back-off based fragment adaptive algorithms for improving the throughput of IEEE 802.11 wireless LAN are proposed and studied. The simulation results show major improvement in channel throughput and reduction in system end-to-end delay. The results also indicate that proposed adaptive fragmentation algorithms perform the best when the channel is very noisy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Layered network QoS signalling-motivation, implementation and measurements

    Publication Year: 2000, Page(s):48 - 57
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1060 KB)

    The support of a single signalling protocol for all components on the data path of a QoS-based transmission cannot necessarily be assumed. We investigate the issues surrounding hierarchically layered network QoS signalling configurations, as e.g. can be found in RSVP over ATM signalling. After introducing and discussing these issues we conclude that many of the decisions involved require understan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Class-based QoS control scheme by flow management in the Internet router

    Publication Year: 2000, Page(s):58 - 65
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (637 KB)

    With the Internet transforming into multimedia and high-speed, the various traffic requiring different qualities of service (QoS) will co-exist in the network. Also, classified service based on Diff-Serv (differentiated service), MPLS (Multi Protocol Label Switching) and so on, have come into wide use. In today's environment of the Internet, it is necessary for the routers to perform the control m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of resource scheduling with prioritization for QoS in LANs

    Publication Year: 2000, Page(s):66 - 75
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (874 KB)

    To deliver quality of service (QoS) in high-speed local networks requires providing router solutions to deal with the specific challenges and constraints present in these networks. Two basic mechanisms for providing QoS are resource reservation and prioritization. These mechanisms are not mutually exclusive. Several methods for combining prioritization and resource reservation in a connection-orie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive bandwidth reservation mechanism using mobility probability in mobile multimedia computing environment

    Publication Year: 2000, Page(s):76 - 85
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (841 KB)

    In this paper, ARMM (adaptive-bandwidth reservation mechanism using MPP) is proposed to provide the consistent QoS guarantees for multimedia traffic in a mobile computing environment. Each cell can reserve fractional bandwidths for hand-off calls to its adjacent cells, and this aggregated reservation of bandwidth can only be used for hand-off calls and not for new calls. It is important to determi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network security (security in large networks)

    Publication Year: 2000, Page(s):88 - 93
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (490 KB)

    It is common that users or hosts in a large network are partitioned and organized as a hierarchical free where children of the same parent from a group. Secure broadcasting intends to provide a secure communication channel from a sending principal to a group of legal receiving principals. Only legal receiving principals can decrypt the message, and illegal receiving principals cannot acquire any i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IGMPv3-based method for avoiding DoS attacks in multicast-enabled networks

    Publication Year: 2000, Page(s):94 - 95
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (166 KB)

    IP multicast has proven to be very good for many-to-many multimedia communications like audio and video conferencing. However there are only a few Internet service providers offering it as a true Internet service to their customers. The reason is that nowadays, IP multicast has many issues like billing, authentication, security protection against malicious people and so on. In fact, DoS attacks ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed weakness in virtual private networks

    Publication Year: 2000, Page(s):96 - 97
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    The use of virtual private networks is increasing rapidly primarily due to security concerns. As the result of analyzing actual corporate VPN strategies, we identify a common vulnerability we name "distributed weakness in VPNs". Specifically we describe a simple routing attack that can be launched against VPN tunnel endpoints with significant implications. We close with a solution to protect again... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for the minimal cutsets enumeration of networks by graph search and branch addition

    Publication Year: 2000, Page(s):100 - 107
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (533 KB)

    This paper presents effective algorithms for enumerating the minimal cutsets of networks. After a graph is modeled after a network, first, by a graph method the spanning tree of the graph and binary tree whose event is complement to it are evaluated. The sub-vertex set represented by the binary tree is referenced, and an algorithm which evaluates the minimal cutsets is proposed. This algorithm req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provisioning multilayer restoration for convergence

    Publication Year: 2000, Page(s):108 - 115
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    Applications that require mission critical service will traverse multiple networks, which implement different protocol suites. Each layer in a suite has a recovery scheme that can reroute connections at that layer. We show that the solution to the repair of a fault that affects multiple layers lies in the provisioning of restoration at each layer to cooperate. Without some coordination between res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant Ethernet middleware for IP-based process control networks

    Publication Year: 2000, Page(s):116 - 125
    Cited by:  Papers (11)  |  Patents (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    We present an efficient middleware-based fault-tolerant Ethernet (FTE) developed for process control networks. Our approach is unique and practical in the sense that it requires no change to commercial off-the-shelf hardware (switch, hub, Ethernet physical link, and network interface card) and software (commercial Ethernet NIC card driver and standard protocol such as TCP/IP) yet it is transparent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability modeling of SCI ring-based topologies

    Publication Year: 2000, Page(s):126 - 134
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (787 KB)

    Reliability prediction is an important factor in the study of multiprocessor and cluster interconnects. One such interconnect is the scalable coherent interface (SCI), a point-to-point, ring-based interconnect that can be connected into switched ring topologies. However, the reliability of SCI-based topologies cannot be deduced from earlier network reliability work as link failures within an SCI-b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile stations localization in a WLAN

    Publication Year: 2000, Page(s):136 - 142
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (663 KB)

    This paper proposes a localization protocol of mobile stations in a WLAN (wireless local area network). The originality of this protocol is made of two parts (i) we use an object-relational database and (ii) we use a semaphore channel devoted to localize mobile stations in access point coverage areas and in virtual coverage areas via near-to-near relays. The database manages the knowledge of the m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handoff support for mobility with IP over Bluetooth

    Publication Year: 2000, Page(s):143 - 154
    Cited by:  Papers (23)  |  Patents (21)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1238 KB)

    The BLUEPAC (BLUEtooth Public ACcess) concepts present ideas for enabling mobile Bluetooth devices to access local area networks in public areas, such as airports, train stations and supermarkets. The proposed protocols support mobility on OSI layer 3. This paper concentrates on the necessary layer 2 protocol concepts for supporting mobility and handoffs between different access points. Furthermor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A portable mobile IP implementation

    Publication Year: 2000, Page(s):155 - 162
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (690 KB)

    This paper describes the software architecture of a portable mobile IP implementation. In addition, the paper discusses general design issues with protocol implementations and the relationship between a protocol implementation and the operating system. The mobile IP implementation has been adapted for several operating systems, including Windows 2000, Windows CE and Linux. As mobile IP is an enhan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security of routing cache updates in cellular IP

    Publication Year: 2000, Page(s):163 - 164
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (175 KB)

    Cellular IP is a protocol presenting a micro mobility solution for mobile devices in a limited geographical area. It allows routing of IP datagrams to mobile stations and offers a fast handoff control. It is designed to cooperate with mobile IP to provide wide area mobility support. This paper presents ideas for better protecting location information in cellular IP networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location of mobiles stations in a wireless LAN

    Publication Year: 2000, Page(s):165 - 166
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (253 KB)

    This paper presents a proposition of a location system for mobiles stations moving in an indoor environment. The location is made via two different mediums: infrared and ultrasound. An architecture of wireless LAN including radio medium dedicated to communication, infrared light and ultrasound for location is also presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A core-stateless buffer management mechanism for differentiated services Internet

    Publication Year: 2000, Page(s):168 - 176
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (830 KB)

    The IETF differentiated services (DiffServ) framework achieves scalability by moving complexity out of the core of the network into edge routers which process fewer number of flows. Previously, an end-to-end service called the premium service (PS) has been proposed under the DiffServ model to provide coarse grained guaranteed rate service. This paper presents a buffer management mechanism based on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Co-operation and comparison of DiffServ and IntServ: performance measurements

    Publication Year: 2000, Page(s):177 - 186
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1052 KB)

    IETF has developed two architectures for the Internet, Integrated Services (IntServ) and Differentiated Services (DiffServ), which should enable QoS based handling of data flows in IP networks. This paper presents a number of measurements which were carried out in order to determine some performance differences between these QoS mechanisms, as well as some characteristics about their joint use. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.