27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002.

6-8 Nov. 2002

Filter Results

Displaying Results 1 - 25 of 112
  • Proceedings LCN 2002. 27th Annual IEEE Conference on Local Computer Networks

    Publication Year: 2002
    Request permission for reuse | PDF file iconPDF (382 KB)
    Freely Available from IEEE
  • Overview of CITRIS for the IEEE LCN conference

    Publication Year: 2002, Page(s):3 - 4
    Request permission for reuse | PDF file iconPDF (238 KB)
    Freely Available from IEEE
  • MPR-based hybrid routing for mobile ad-hoc networks

    Publication Year: 2002, Page(s):7 - 12
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    This paper describes the design and performance of a routing protocol for mobile ad-hoc networks. Our routing protocol is named "hybrid routing" in that it attempts to take advantage of both proactive and reactive approaches. The protocol is based on the concept of multipoint relaying (MPR) to minimize flooding traffic. For most applications over mobile ad-hoc networks, it is expected that a major... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A user level framework for ad hoc routing

    Publication Year: 2002, Page(s):13 - 19
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    The availability of inexpensive wireless networking hardware (e.g., based on the IEEE 802.11 standards) has generated interest in a large class of wireless applications. Many applications benefit from rapidly deployable networks for example, collaborative applications to support field research or emergency incident response. The need for networks that can be rapidly deployed has resulted in a subs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HOWL: an efficient route discovery scheme using routing history in ad hoc networks

    Publication Year: 2002, Page(s):20 - 29
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1505 KB) | HTML iconHTML

    We propose an efficient route discovery scheme for mobile ad hoc networks called Hop-Wise Limited broadcast (HOWL). HOWL executes an efficient route discovery by predicting current location of destination using hop counts of previously used routes. Furthermore, we introduce characterized environmental indicators (CEI), namely node density, average hop count of route, and frequency of link failure,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link stability in mobile wireless ad hoc networks

    Publication Year: 2002, Page(s):30 - 39
    Cited by:  Papers (69)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (339 KB)

    We develop adaptive metrics to identify stable links in a mobile wireless networking environment based on the analysis of link durations in several different mobility scenarios. Our metrics only rely on online statistical evaluation of observed link durations. Neither do they require information on signal strength, radio conditions, or spacing of the mobile devices, nor do they depend on the avail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optical packet-switched IP-over-WDM metro ring network

    Publication Year: 2002, Page(s):43 - 52
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Novel distributed medium access protocols for a time-slotted WDM metro ring employing optical packet switching and supporting variable-length data packets, such as IP datagrams, directly in the optical layer are proposed. A scalable multi-hop WDM ring is considered since we assume many more nodes than available wavelengths in the network. In the underlying control-channel based architecture, each ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of token-based fast TCP in systems supporting large windows

    Publication Year: 2002, Page(s):53 - 61
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Since TCP can only detect congestion after packet losses have already happened, various forms of fast TCP (FTCP) have been proposed to notify congestion early and avoid packet losses in intermediate nodes by effectively controlling backward ACK flows traversing the same nodes as the forward data packets. Among them, token-based FTCP (TB-FTCP) is a promising approach as it does not need to determin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deadlock-free routing based on ordered links

    Publication Year: 2002, Page(s):62 - 71
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (666 KB) | HTML iconHTML

    This paper describes a new class of deadlock-free routing algorithms for irregular networks based on ordered links. In this case, the links are ordered by partitioning them into a set of layers, each layer containing a spanning tree (when possible). Deadlock free routes can then be derived by using links with non-decreasing order. The deadlock-freedom property is proved. Two different implementati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network model for clustered radar operating application

    Publication Year: 2002, Page(s):72 - 74
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (715 KB) | HTML iconHTML

    The essential idea of a clustered radar system is to replace a single and large radar system with a group of small radars. Various operational concepts of multiple radar systems in a networked environment, which provide various advantages compared to the conventional single radar operation, have been introduced (see Chandrasekar, V. and Jayasumana, A.P., Proc. SPIE, vol.4527, p.142-7, 2001). This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structure based adaptive prediction of VBR MPEG traffic for RCBR network

    Publication Year: 2002, Page(s):77 - 83
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1553 KB) | HTML iconHTML

    With the development of the Internet, variable bit rate (VBR) video will be the major component of future multimedia services. In order to guarantee quality of service (QoS) in real-time transmission, on-line prediction of VBR video traffic integrated with a mechanism for dynamic resource allocation in RCBR (renegotiate constant bit rate) networks has been an active research area. We exploit the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scene based M/G/1 queuing model of VBR video traffic

    Publication Year: 2002, Page(s):84 - 89
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (897 KB) | HTML iconHTML

    To guarantee quality of service (QoS) in future integrated service networks, traffic sources must be characterized to capture the traffic characteristics relevant to network performance. Recent studies reveal that multimedia traffic shows burstiness over multiple time scales and long-range dependence (LRD). Its burstiness and self-similarity make it hard to control and guarantee QoS, so analysis o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QROUTE: an integrated framework for QoS-guaranteed multicast

    Publication Year: 2002, Page(s):90 - 99
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    We propose QROUTE, an integrated framework for QoS-guaranteed multicast, in which a feasible multicast tree meeting multiple QoS constraints can be constructed in a distributed fashion using local states at routers. The simplicity in the design and implementation of QROUTE has been demonstrated by prototyping a router testbed, whose measured performance is presented. Compared to other QoS-based mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving the MCOP problem optimally

    Publication Year: 2002, Page(s):100 - 109
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1712 KB) | HTML iconHTML

    Providing guaranteed end-to-end quality of service (QoS) is a key issue for deploying multimedia applications on broadband integrated services networks. To support such a QoS-based service, a problem concerning how to select a feasible end-to-end path in order to satisfy multiple QoS constraints simultaneously must be studied. Two exact algorithms, branch-and-bound and extended Bellman-Ford algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed key management protocol for dynamic groups

    Publication Year: 2002, Page(s):113 - 122
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    With the popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. We propose a distributed key management protocol for group members to share a secret group key, which can be used to protect shared information. The protocol manages the group key of a dynamic group, where members can freely join or leave, and each time the key i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The secure DHCP system with user authentication

    Publication Year: 2002, Page(s):123 - 131
    Cited by:  Papers (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    DHCP (dynamic host configuration protocol) makes it easy to access an IP network. However, since the DHCP itself does not have an access control, illegitimate users inside a network segment can easily abuse inside or outside the network. Therefore, we have introduced an authentication scheme and access control into the DHCP system. Using a popular authentication by MAC (media access control) addre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component-based security model for XML messaging services

    Publication Year: 2002, Page(s):132 - 133
    Cited by:  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1869 KB) | HTML iconHTML

    The objective of the paper is to enlighten the applicability of component technology in deploying security models to protect Web transactions. The proposed component-based security model is a substitutive methodology for conventional methods that are vendor dependent. The model prefers the Extensible Markup Language (XML) format to represent Web transactions, because of the multi-platform nature o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling intrusion detection systems by generating false positives: squealing proof-of-concept

    Publication Year: 2002, Page(s):134 - 135
    Cited by:  Papers (5)  |  Patents (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    We introduce a new class of attack against a network signature-based intrusion detection system (IDS) which we have tested using SNORT and we call "squealing". This vulnerability has significant implications since it can be generalized to any IDS. While signature-based IDSs have implementation problems with high false positive rates that require tuning, we show a more serious general vulnerability... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A SET based approach to secure the payment in mobile commerce

    Publication Year: 2002, Page(s):136 - 137
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    In this paper we propose an approach, combining the SET protocol with the TLS/WTLS protocols in order to enforce the security services over WAP 1.X for payment in the m-commerce. We propose to implement the additional services of the SET protocol as the confidentiality of the payment information between the buyer and the payment gateway and the data integrity. However, we use WTLS certificates ins... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on generalized stochastically bounded bursty traffic for communication networks

    Publication Year: 2002, Page(s):141 - 149
    Cited by:  Papers (19)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    We introduce the concept of generalized stochastically bounded burstiness (gSBB) for Internet traffic, the tail distribution of whose burstiness can be bounded by a decreasing function in a function class with few restrictions. This new concept extends the concept of stochastically bounded burstiness (SBB) introduced by previous researchers to a much larger extent - while the SBB model can apply t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid system theoretic approach for admission controller design in multimedia networks

    Publication Year: 2002, Page(s):150 - 159
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (722 KB) | HTML iconHTML

    A novel real-time discrete-event admission control (AC) scheme for high-speed networks is proposed with the aim of attaining a desired quality of service (QoS) and high network utilization. The AC uses the available capacity from a novel adaptive bandwidth estimation scheme, a congestion indicator derived from a congestion controller, peak bit/cell rate (PBR/PCR) estimate from new sources, along w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach to the estimation of the Hurst parameter in self-similar traffic

    Publication Year: 2002, Page(s):160 - 165
    Cited by:  Papers (21)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    We present a new method to estimate the Hurst parameter of the increment process in network traffic-a process that is assumed to be self-similar. The confidence intervals and biasedness are obtained for the estimates using the new method. This new method is then applied to pseudo-random data and to real traffic data. We compare the performance of the new method to that of the widely-used wavelet m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An off-line traffic engineering model for MPLS networks

    Publication Year: 2002, Page(s):166 - 174
    Cited by:  Papers (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (707 KB) | HTML iconHTML

    In this study, an offline traffic engineering model for multi-protocol label switching (MPLS) networks is introduced. The model aims at mapping the traffic trunks, consisting of both best-effort traffic and traffic with QoS requirements, onto the network. For an optimal network management, three different objectives are taken into consideration, namely minimal routing delay, optimal load-balance i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput enhanced wireless in local loop (TWiLL) - the architecture, protocols, and pricing schemes

    Publication Year: 2002, Page(s):177 - 186
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    Traditionally, voice communication over the local loop has been provided by wired systems. However there has been an increased interest in the use of radio access technologies in local loops. Such systems which are now popular for their ease and low cost of installation and maintenance are called wireless in local loop (WLL) systems. Subscribers' demands for greater capacity have grown over the ye... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medium access control protocols with fast collision resolution: supporting real-time and data services in wireless LANs

    Publication Year: 2002, Page(s):187 - 196
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (550 KB) | HTML iconHTML

    Development of efficient medium access control (MAC) protocols which provide both high throughput performance for data traffic and good quality of service (QoS) support for real-time traffic is the current major focus in distributed contention-based MAC research. We propose an efficient contention algorithm for wireless local area networks, namely the fast collision resolution (FCR) algorithm. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.