Proceedings 1997 International Conference on Network Protocols

28-31 Oct. 1997

Filter Results

Displaying Results 1 - 25 of 34
  • Proceedings 1997 International Conference on Network Protocols

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (271 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1997, Page(s): 309
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • On-line dynamic bandwidth allocation

    Publication Year: 1997, Page(s):134 - 141
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Network multimedia applications require certain performance guarantees that can be provided through proper resource allocation. Allocation techniques are needed to provide these guarantees as efficiently as possible since resources are limited. This paper presents an allocation method called Dynamic Search Algorithm (DSA+). DSA+ is an on-line algorithm that dynamically adjusts the resource allocat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the accuracy of admission control tests

    Publication Year: 1997, Page(s):125 - 133
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    In guaranteed performance networks, a connection admission control (CAC) algorithm determines whether or not a new connection can be admitted to the network such that all connections will obtain their required quality of service (QoS) guarantees. However, inaccuracies in a CAC algorithm lead to either under utilization of resources or violations of the promised QoS guarantees. We evaluate the accu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User agents and flexible messages: a new approach to wireless two-way messaging

    Publication Year: 1997, Page(s):53 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB)

    Wireless messaging, in the form of two-way paging, is an integral part of universal Personal Communications Services (PCS). Basic wireless messaging services include providing reliable (acknowledged) message delivery, reply capabilities, and message origination from a messaging device. Many more advanced services can also be envisioned. Wireless networks and end devices impose many limitations on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application-layer group communication server for extending reliable multicast protocols services

    Publication Year: 1997, Page(s):267 - 274
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB)

    Reliable multicast protocols are becoming an essential element in distributed applications such as interactive distance learning applications. However, the existing implementations of reliable multicast protocols are not sufficient to satisfy the group communications requirements of some distributed applications. Our experience of using number of multicast protocols in IRI distance learning applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group leader election under link-state routing

    Publication Year: 1997, Page(s):95 - 104
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    In this work, we place the problem of group leader election in a context “inside the network,” meaning that participants in the election process are network switches/routers, rather than hosts. A robust solution to the problem, called the Network Leader Election (NLE) protocol, is proposed for use in networks based on link-state routing (LSR). The protocol is robust, for it achieves le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Carrier-sense protocols for packet-switched smart antenna basestations

    Publication Year: 1997, Page(s):45 - 52
    Cited by:  Papers (13)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    Researchers have recently considered the use of smart antennas in various packet-switched data networks. Previously, a single-beam system was described which employs a smart antenna basestation, operating in carrier-sense (CSMA) mode. Performance improvements are obtained by having the antenna dynamically point pattern nulls in the direction of interfering stations, thus reducing the frequency of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Once-and-forall management protocol (OFMP)

    Publication Year: 1997, Page(s):87 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    OFMP is a hierarchical, network management protocol that enables group operations to be executed on the management information bases of all nodes in the group. As long as no faults occur, OFMP ensures that all nodes execute their local operation exactly once in each group operation. If “immediately-detectable” faults occur, it ensures masking fault-tolerance; i.e., all non-failed nodes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On path selection for traffic with bandwidth guarantees

    Publication Year: 1997, Page(s):191 - 202
    Cited by:  Papers (101)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1024 KB)

    Transmission of multimedia streams imposes a minimum-bandwidth requirement on the path being used to ensure end-to-end Quality-of-Service (QoS) guarantees. While any shortest-path algorithm can be used to select a feasible path, additional constraints that limit resource consumption and balance the network load are needed to achieve efficient resource utilization. We present a systematic evaluatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic host routing for production use of developmental networks

    Publication Year: 1997, Page(s):285 - 292
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Many high-speed networks are in a development stage, compared to established technologies like Ethernet. Use of these networks for production service provides substantial benefits to the developers, e.g., for large-scale testing. However, most users are not tolerant of pre-production network outages, even in exchange for the higher bandwidth these networks afford. This paper describes ISI's experi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cooperative packet recovery protocol for multicast video

    Publication Year: 1997, Page(s):259 - 266
    Cited by:  Papers (7)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    In this paper we describe a protocol that improves the quality of multicast video or audio transmissions by recovering lost packets. The protocol is applied to a corporate intranet, and measurements indicate that significant improvements in audio/video quality are achieved. A unique characteristic of this protocol is that it can be used on current MBone sessions without changing the operation of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migrating Sockets for networking with quality of service guarantees

    Publication Year: 1997, Page(s):73 - 82
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1108 KB)

    Migrating Sockets is the protocol processing component of an end system architecture designed for networking with QoS guarantees. The architecture provides: (1) adaptive rate-controlled scheduling of protocol threads in Migrating Sockets, (2) rate-based flow control for reserved rate connections in future integrated services networks, and (3) a constant overhead active demultiplexing mechanism. Mi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved virtual queueing and dynamic EPD techniques for TCP over ATM

    Publication Year: 1997, Page(s):212 - 219
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    It is known that TCP throughput can degrade significantly over UBR service in a congested ATM network, and the early packet discard (EPD) technique has been proposed to improve the performance. However, recent studies show that EPD cannot ensure fairness among competing VCs in a congested network, but the degree of fairness can be improved using various forms of fair buffer allocation techniques. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load profiling for efficient route selection in multi-class networks

    Publication Year: 1997, Page(s):183 - 190
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    High-speed networks, such as ATM networks, are expected to support real-time Quality of Service (QoS) guarantees required by many applications such as those that involve voice and video communication. To support such services, routing algorithms that allow for the reservation of the needed bandwidth over a Virtual Circuit (VC) have been proposed. Commonly, these algorithms assign VCs to routes usi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS based routing algorithm in integrated services packet networks

    Publication Year: 1997, Page(s):167 - 174
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    In this paper we study QoS based routing algorithm for supporting resource reservation in high-speed Integrated Services Packet Network (ISPN). Recently, this problem was proved to be NP-complete. However, when the considered QoS constraints are bandwidth, delay, delay jitter, and loss free, we have shown that by employing Weighted Fair Queueing (WFQ) service discipline, the complexity of the prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical multicasting on a nonbroadcast subnetwork

    Publication Year: 1997, Page(s):251 - 258
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    LAN multicast is now an essential service for users of the MBone and other IP multicast tools. Traditional IP multicast has travelled over two types of subnetwork: point-to-point links and subnetworks with inherent multicast capability, such as Ethernet and token ring. More recent LANs may be arbitrary mesh networks with no built-in, efficient, multicast capability. The authors describe a successf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A join-the-shortest-queue prefetching protocol for VBR video on demand

    Publication Year: 1997, Page(s):63 - 72
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB)

    We present a high-performance prefetching protocol for the delivery of prerecorded VBR video from a server across a packet-switched network to a large number of clients. Not only does the protocol give constant perceptual quality and almost 100% link utilization, but it also allows for immediate commencement of the video upon user request and near instantaneous response to pause/resume and tempora... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A compositional approach for designing multifunction time-dependent protocols

    Publication Year: 1997, Page(s):105 - 112
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    We propose a framework based on the model of timed extended finite state machines for building communication protocols which perform several functions, where each function corresponds to a component protocol. For parallel composition, we specify a conjunctive relation which requires that the execution of events in two component protocols be synchronized. We also propose a predicate strengthening t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP behavior with many flows

    Publication Year: 1997, Page(s):205 - 211
    Cited by:  Papers (62)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    TCP's ability to share a bottleneck fairly and efficiently decreases as the number of competing flows increases. This effect starts to appear when there are more flows, than packers in the delay-bandwidth product. In the limit of large numbers of flows, TCP forces a packet loss rate approaching 50%, causing delays that users are likely to notice. TCP's minimum congestion window of one packet is th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passive testing and applications to network management

    Publication Year: 1997, Page(s):113 - 122
    Cited by:  Papers (47)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    An important aspect of network management is fault management-determining, locating, isolating and correcting faults in the network. The paper deals with the algorithms for detecting faults, i.e., behavior of the network different from specifications. It is important for communication networks to detect faults “in-process” i.e., while the network is in its normal operation. Thus, we de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active networking and the end-to-end argument

    Publication Year: 1997, Page(s):220 - 228
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    Active networking is the placement of user-controllable computing functionality in the switching nodes of a network. The end-to-end argument states that functions should be placed “in” the network only if they can be cost-effectively implemented there. We argue that active networking is a natural consequence of the end-to-end argument, because certain functions can be most effectively ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental study of insider attacks for OSPF routing protocol

    Publication Year: 1997, Page(s):293 - 300
    Cited by:  Papers (15)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB)

    It is critical to protect the network infrastructure (e.g., network routing and management protocols) against security intrusions, yet dealing with insider attacks are probably one of the most challenging research problems in network security. We study the security threats, especially internal/insider threats, for the standardized routing protocol OSPF. In OSPF, a group of routers collaborate, exc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ABR service for applications with non-linear bandwidth utility functions

    Publication Year: 1997, Page(s):15 - 23
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    An available bit rate (ABR) service allows applications to access a time-varying network capacity. In a basic ABR service the available network capacity is divided “fairly” amongst active connections, without regard to the utility that each application derives from the bandwidth allocation. The goal of this paper is to improve both the global and individual utility obtained by applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing guaranteed quality of service connections in integrated services packet networks

    Publication Year: 1997, Page(s):175 - 182
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    A critical functional component of quality-of-service (QoS) deployment in packet-switched networks is QoS-based routing. In this paper, we present a routing solution for guaranteed quality-of-service connections in integrated services packet networks (ISPN)-the future QoS-capable Internet proposed by the IETF. The problem is in essence a path finding problem with both end-to-end delay and per-node... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.