首页 > 最新文献

Proceedings 24th Conference on Local Computer Networks. LCN'99最新文献

英文 中文
A media synchronization scheme with causality control in network environments 网络环境中具有因果关系控制的媒体同步方案
Pub Date : 1999-10-18 DOI: 10.1109/LCN.1999.802048
Y. Ishibashi, S. Tasaka, Yoshiro Tachibana
This paper proposes a media synchronization scheme with causality control for distributed multimedia applications in which the temporal and causal relationships exist among media streams such as computer data, voice and video. In the scheme, the /spl Delta/-causality control is performed for causality, and the virtual-time rendering (VTR) algorithm, which the authors previously proposed, is used for media synchronization. The paper deals with a networked shooting game as an example of such applications and demonstrates the effectiveness of the scheme by experiment.
针对计算机数据、语音和视频等媒体流之间存在时间和因果关系的分布式多媒体应用,提出了一种具有因果控制的媒体同步方案。在该方案中,对因果关系进行/spl Delta/-causality控制,并使用作者之前提出的虚拟时间呈现(virtual-time rendering, VTR)算法进行媒体同步。本文以网络射击游戏为例,通过实验验证了该方案的有效性。
{"title":"A media synchronization scheme with causality control in network environments","authors":"Y. Ishibashi, S. Tasaka, Yoshiro Tachibana","doi":"10.1109/LCN.1999.802048","DOIUrl":"https://doi.org/10.1109/LCN.1999.802048","url":null,"abstract":"This paper proposes a media synchronization scheme with causality control for distributed multimedia applications in which the temporal and causal relationships exist among media streams such as computer data, voice and video. In the scheme, the /spl Delta/-causality control is performed for causality, and the virtual-time rendering (VTR) algorithm, which the authors previously proposed, is used for media synchronization. The paper deals with a networked shooting game as an example of such applications and demonstrates the effectiveness of the scheme by experiment.","PeriodicalId":265611,"journal":{"name":"Proceedings 24th Conference on Local Computer Networks. LCN'99","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129269557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An integrated software immune system: a framework for automated network management, system health, and security 集成软件免疫系统:用于自动网络管理、系统健康和安全的框架
Pub Date : 1999-10-17 DOI: 10.1109/LCN.1999.802065
Michael Gilfix
Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring and maintenance tools require a substantial investment in human resources to sift through vast quantities of information, to detect problems, and manually resolve them. Computer immunology is the solution to ever-increasing network maintenance overhead. This paper seeks to define computer normality through a policy-driven process and provide a framework for conserving network health. The goal is to automate network management as much as possible. This methodology combines the benefits of two existing systems as well as incorporates other critical elements to provide an integrated, flexible, versatile system.
随着网络以前所未有的速度扩张,维护大型网络的完整性正成为一项日益艰巨的任务。目前大多数网络监控和维护工具都需要大量人力资源来筛选大量信息、检测问题并手动解决问题。计算机免疫学是解决日益增加的网络维护开销的方法。本文试图通过一个政策驱动的过程来定义计算机正常,并提供一个保护网络健康的框架。目标是尽可能实现网络管理的自动化。这种方法结合了两个现有系统的优点,并结合了其他关键元素,以提供一个集成的、灵活的、通用的系统。
{"title":"An integrated software immune system: a framework for automated network management, system health, and security","authors":"Michael Gilfix","doi":"10.1109/LCN.1999.802065","DOIUrl":"https://doi.org/10.1109/LCN.1999.802065","url":null,"abstract":"Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring and maintenance tools require a substantial investment in human resources to sift through vast quantities of information, to detect problems, and manually resolve them. Computer immunology is the solution to ever-increasing network maintenance overhead. This paper seeks to define computer normality through a policy-driven process and provide a framework for conserving network health. The goal is to automate network management as much as possible. This methodology combines the benefits of two existing systems as well as incorporates other critical elements to provide an integrated, flexible, versatile system.","PeriodicalId":265611,"journal":{"name":"Proceedings 24th Conference on Local Computer Networks. LCN'99","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121922198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using formal specification and observers to specify and validate the ATM signaling protocols 使用正式规范和观察者来指定和验证ATM信令协议
Pub Date : 1999-10-17 DOI: 10.1109/LCN.1999.802005
J. Atwood, M. Ghodrat, D. Tasak
When ensuring that an implementation of a computer communications protocol satisfies both conformance with the specification and conformance with the intent/expectations of the designers, it is useful to write a formal specification, and derive the implementation directly from it. This permits the use of validation techniques that are expressed using concepts meaningful to the protocol designer. This technique has been applied to the testing and validation of the ATM higher layer signaling protocol (Q.2931) and the service specific connection oriented protocol (Q.2110), using the Estelle formal description language, and the observers of the Estelle Development Toolset.
当确保计算机通信协议的实现既符合规范又符合设计者的意图/期望时,编写正式的规范并直接从中派生实现是有用的。这允许使用对协议设计者有意义的概念来表达的验证技术。该技术已应用于使用Estelle正式描述语言和Estelle开发工具集的观察者对ATM更高层信令协议(Q.2931)和特定于服务的面向连接协议(Q.2110)进行测试和验证。
{"title":"Using formal specification and observers to specify and validate the ATM signaling protocols","authors":"J. Atwood, M. Ghodrat, D. Tasak","doi":"10.1109/LCN.1999.802005","DOIUrl":"https://doi.org/10.1109/LCN.1999.802005","url":null,"abstract":"When ensuring that an implementation of a computer communications protocol satisfies both conformance with the specification and conformance with the intent/expectations of the designers, it is useful to write a formal specification, and derive the implementation directly from it. This permits the use of validation techniques that are expressed using concepts meaningful to the protocol designer. This technique has been applied to the testing and validation of the ATM higher layer signaling protocol (Q.2931) and the service specific connection oriented protocol (Q.2110), using the Estelle formal description language, and the observers of the Estelle Development Toolset.","PeriodicalId":265611,"journal":{"name":"Proceedings 24th Conference on Local Computer Networks. LCN'99","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The worst-case scenario for transmission of synchronous traffic in an FDDI network FDDI网络中同步业务传输的最坏情况
Pub Date : 1999-10-17 DOI: 10.1109/LCN.1999.802016
Sijing Zhang, E. S. Lee
We study the problem of guaranteeing deadlines of synchronous messages with their deadlines no more than periods in an FDDI network. In order to guarantee the transmission of a synchronous message before its deadline, a precise knowledge of the worst-case situation for such transmission is required. This paper studies the worst-case scenario for transmission of a synchronous message in an FDDI network, in which the time elapsed between arrival of the message and completion of its transmission will reach its maximum (i.e., the longest possible interval). A few conditions under which the worst-case situation can happen are formally derived.
研究了FDDI网络中同步消息的截止日期不超过周期的保证问题。为了保证同步消息在截止日期前传输,需要精确了解这种传输的最坏情况。本文研究了FDDI网络中同步消息传输的最坏情况,即消息到达和完成传输之间的时间达到最大值(即最长的可能时间间隔)。正式导出了最坏情况可能发生的几个条件。
{"title":"The worst-case scenario for transmission of synchronous traffic in an FDDI network","authors":"Sijing Zhang, E. S. Lee","doi":"10.1109/LCN.1999.802016","DOIUrl":"https://doi.org/10.1109/LCN.1999.802016","url":null,"abstract":"We study the problem of guaranteeing deadlines of synchronous messages with their deadlines no more than periods in an FDDI network. In order to guarantee the transmission of a synchronous message before its deadline, a precise knowledge of the worst-case situation for such transmission is required. This paper studies the worst-case scenario for transmission of a synchronous message in an FDDI network, in which the time elapsed between arrival of the message and completion of its transmission will reach its maximum (i.e., the longest possible interval). A few conditions under which the worst-case situation can happen are formally derived.","PeriodicalId":265611,"journal":{"name":"Proceedings 24th Conference on Local Computer Networks. LCN'99","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Efficient and accurate Ethernet simulation 高效准确的以太网仿真
Pub Date : 1999-10-17 DOI: 10.1109/LCN.1999.802015
Jia Wang, S. Keshav
The Internet is increasingly being called upon to provide different levels of service to different applications and users. A practical problem in doing so is that although Ethernet is one of the hops for nearby all communication in the Internet, it does not provide any QoS guarantees. A natural question, therefore, is the effect of offered load on Ethernet throughput and delay. In this paper, we present several techniques for accurately and efficiently modeling the behavior of a heavily loaded Ethernet link. We propose an efficient distributed simulation model, called Fast Ethernet Simulation, that empirically models an Ethernet link to quickly and accurately simulate it. By eliminating the implementation of the CSMA/CD protocol, our approach reduces computational complexity drastically while still maintaining desirable accuracy. Performance results show that our techniques not only add very little overhead (less than 5% in our tests) to the basic cost of simulating an Ethernet link, but also closely match real-world measurements. We also present efficient techniques for compressing cumulative distributions using hyperbolic curves and for monitoring the load on a heavily loaded link. Finally, we show applications to illustrate the potential usage of the Fast Ethernet Simulation.
越来越多的人要求因特网为不同的应用程序和用户提供不同层次的服务。这样做的一个实际问题是,尽管以太网是互联网中近距离所有通信的跳点之一,但它不提供任何QoS保证。因此,一个自然的问题是所提供的负载对以太网吞吐量和延迟的影响。在本文中,我们提出了几种准确有效地模拟重载以太网链路行为的技术。本文提出了一种高效的分布式仿真模型,即快速以太网仿真,该模型对以太网链路进行了经验建模,以快速准确地模拟以太网链路。通过消除CSMA/CD协议的实现,我们的方法大大降低了计算复杂性,同时仍然保持理想的准确性。性能结果表明,我们的技术不仅为模拟以太网链路的基本成本增加了很少的开销(在我们的测试中不到5%),而且与实际测量结果非常接近。我们还介绍了使用双曲曲线压缩累积分布和监测重载链路上的负载的有效技术。最后,我们展示了一些应用程序来说明快速以太网仿真的潜在用途。
{"title":"Efficient and accurate Ethernet simulation","authors":"Jia Wang, S. Keshav","doi":"10.1109/LCN.1999.802015","DOIUrl":"https://doi.org/10.1109/LCN.1999.802015","url":null,"abstract":"The Internet is increasingly being called upon to provide different levels of service to different applications and users. A practical problem in doing so is that although Ethernet is one of the hops for nearby all communication in the Internet, it does not provide any QoS guarantees. A natural question, therefore, is the effect of offered load on Ethernet throughput and delay. In this paper, we present several techniques for accurately and efficiently modeling the behavior of a heavily loaded Ethernet link. We propose an efficient distributed simulation model, called Fast Ethernet Simulation, that empirically models an Ethernet link to quickly and accurately simulate it. By eliminating the implementation of the CSMA/CD protocol, our approach reduces computational complexity drastically while still maintaining desirable accuracy. Performance results show that our techniques not only add very little overhead (less than 5% in our tests) to the basic cost of simulating an Ethernet link, but also closely match real-world measurements. We also present efficient techniques for compressing cumulative distributions using hyperbolic curves and for monitoring the load on a heavily loaded link. Finally, we show applications to illustrate the potential usage of the Fast Ethernet Simulation.","PeriodicalId":265611,"journal":{"name":"Proceedings 24th Conference on Local Computer Networks. LCN'99","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127584311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
The new shortest best path tree (SBPT) algorithm for dynamic multicast trees 提出了一种新的动态组播树最短最佳路径树(SBPT)算法
Pub Date : 1999-10-17 DOI: 10.1109/LCN.1999.802017
H. Fujinoki, Kenneth J. Christensen
This paper presents the new shortest best path tree (SBPT) algorithm for multicast trees. The SBPT algorithm establishes and maintains dynamic multicast trees which maximize the bandwidth to be shared by multiple receivers and simultaneously guarantee the shortest paths for each receiver node. The SBPT algorithm is a distributed algorithm with cost in the same order as the sum of the shortest path tree (SPT) and Greedy algorithms. The SBPT algorithm reduces bandwidth consumption by utilizing partial paths already established for other multicast receiver nodes. The SBPT algorithm finds such partial paths when multiple shortest paths exist. Simulation experiments comparing the SBPT and SPT algorithms show that the SBPT algorithm reduces bandwidth consumption by 5% to 17% when node utilization is greater than approximately 25% and always achieves the same shortest path lengths.
提出了一种新的组播树最短最佳路径树(SBPT)算法。SBPT算法建立并维护动态组播树,使多个接收方共享的带宽最大化,同时保证每个接收方节点的路径最短。SBPT算法是一种分布式算法,其代价顺序与最短路径树(SPT)算法和贪心算法的和相同。SBPT算法通过利用已经为其他组播接收节点建立的部分路径来减少带宽消耗。当存在多个最短路径时,SBPT算法会找到这样的部分路径。对比SBPT算法和SPT算法的仿真实验表明,当节点利用率大于约25%时,SBPT算法的带宽消耗减少了5% ~ 17%,且始终能达到相同的最短路径长度。
{"title":"The new shortest best path tree (SBPT) algorithm for dynamic multicast trees","authors":"H. Fujinoki, Kenneth J. Christensen","doi":"10.1109/LCN.1999.802017","DOIUrl":"https://doi.org/10.1109/LCN.1999.802017","url":null,"abstract":"This paper presents the new shortest best path tree (SBPT) algorithm for multicast trees. The SBPT algorithm establishes and maintains dynamic multicast trees which maximize the bandwidth to be shared by multiple receivers and simultaneously guarantee the shortest paths for each receiver node. The SBPT algorithm is a distributed algorithm with cost in the same order as the sum of the shortest path tree (SPT) and Greedy algorithms. The SBPT algorithm reduces bandwidth consumption by utilizing partial paths already established for other multicast receiver nodes. The SBPT algorithm finds such partial paths when multiple shortest paths exist. Simulation experiments comparing the SBPT and SPT algorithms show that the SBPT algorithm reduces bandwidth consumption by 5% to 17% when node utilization is greater than approximately 25% and always achieves the same shortest path lengths.","PeriodicalId":265611,"journal":{"name":"Proceedings 24th Conference on Local Computer Networks. LCN'99","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115838106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Fuzzy temporal reasoning model for event correlation in network management 网络管理中事件关联的模糊时序推理模型
Pub Date : 1999-10-17 DOI: 10.1109/LCN.1999.802010
E. Aboelela, C. Douligeris
Fault management is used to detect, isolate, and repair problems in communication networks. Alarms are considered an external manifestation of faults occurring inside the managed network. These faults may affect the network's hardware and software components. Alarm correlation identifies the relationships between reported alarms to produce a new, smaller list of alarms. This allows operators to quickly and more accurately to identify the root cause of problems and resolve them faster. Temporal reasoning, reasoning about time, plays a critical role in monitoring network alarms. In this paper, a fuzzy-logic model is proposed for finding the temporal relation between events for correlation purposes. A fuzzy-inference rule base is used to integrate fuzzy membership functions to determine the "best" temporal relation between events. The proposed model is compared to the traditional crisp temporal reasoning.
故障管理是对通信网络中的问题进行检测、隔离和修复。告警被认为是被管理网络内部发生故障的一种外部表现。这些故障可能会影响网络的硬件和软件组件。告警关联识别已报告的告警之间的关系,以产生一个新的、更小的告警列表。这使得操作人员能够更快、更准确地识别问题的根本原因,并更快地解决问题。时间推理,即对时间的推理,在监控网络报警中起着至关重要的作用。本文提出了一种模糊逻辑模型,用于寻找事件之间的时间关系,以达到关联的目的。利用模糊推理规则库对模糊隶属函数进行整合,确定事件间的“最佳”时间关系。将该模型与传统的清晰时间推理进行了比较。
{"title":"Fuzzy temporal reasoning model for event correlation in network management","authors":"E. Aboelela, C. Douligeris","doi":"10.1109/LCN.1999.802010","DOIUrl":"https://doi.org/10.1109/LCN.1999.802010","url":null,"abstract":"Fault management is used to detect, isolate, and repair problems in communication networks. Alarms are considered an external manifestation of faults occurring inside the managed network. These faults may affect the network's hardware and software components. Alarm correlation identifies the relationships between reported alarms to produce a new, smaller list of alarms. This allows operators to quickly and more accurately to identify the root cause of problems and resolve them faster. Temporal reasoning, reasoning about time, plays a critical role in monitoring network alarms. In this paper, a fuzzy-logic model is proposed for finding the temporal relation between events for correlation purposes. A fuzzy-inference rule base is used to integrate fuzzy membership functions to determine the \"best\" temporal relation between events. The proposed model is compared to the traditional crisp temporal reasoning.","PeriodicalId":265611,"journal":{"name":"Proceedings 24th Conference on Local Computer Networks. LCN'99","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127544785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Evaluating performance of the HIPERLAN CAC layer protocol for asynchronous traffic 评估异步流量下HIPERLAN CAC层协议的性能
Pub Date : 1999-10-17 DOI: 10.1109/LCN.1999.801992
C. Coutras, P. Wan
The growing interest in wireless systems and networks has led to the first wireless LAN (WLAN) protocols. The medium access control (MAC) layer protocols of such protocol suites are of key importance. The Radio Equipment and Systems (RES) Technical Committee of the European Telecommunications Standards Institute has proposed the High PErformance Radio LAN (HIPERLAN) protocol suite. We present study, analyze and evaluate the performance of the MAC layer of the HIPERLAN protocol suite for asynchronous data transfer. Analytical models that take into account the phenomena of hidden nodes and capture are presented during the analysis. Numerical results from both analysis and simulation are presented, so that the issues involved are better understood.
对无线系统和网络日益增长的兴趣导致了第一个无线局域网(WLAN)协议的出现。这些协议组中的介质访问控制(MAC)层协议是至关重要的。欧洲电信标准协会无线电设备和系统(RES)技术委员会提出了高性能无线局域网(HIPERLAN)协议套件。本文研究、分析和评估了用于异步数据传输的HIPERLAN协议套件的MAC层的性能。在分析过程中,提出了考虑隐节点和捕获现象的分析模型。给出了分析和模拟的数值结果,以便更好地理解所涉及的问题。
{"title":"Evaluating performance of the HIPERLAN CAC layer protocol for asynchronous traffic","authors":"C. Coutras, P. Wan","doi":"10.1109/LCN.1999.801992","DOIUrl":"https://doi.org/10.1109/LCN.1999.801992","url":null,"abstract":"The growing interest in wireless systems and networks has led to the first wireless LAN (WLAN) protocols. The medium access control (MAC) layer protocols of such protocol suites are of key importance. The Radio Equipment and Systems (RES) Technical Committee of the European Telecommunications Standards Institute has proposed the High PErformance Radio LAN (HIPERLAN) protocol suite. We present study, analyze and evaluate the performance of the MAC layer of the HIPERLAN protocol suite for asynchronous data transfer. Analytical models that take into account the phenomena of hidden nodes and capture are presented during the analysis. Numerical results from both analysis and simulation are presented, so that the issues involved are better understood.","PeriodicalId":265611,"journal":{"name":"Proceedings 24th Conference on Local Computer Networks. LCN'99","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Distributed gatekeeper architecture for H.323-based multimedia telephony 基于h .323的多媒体电话分布式看门人体系结构
Pub Date : 1999-10-17 DOI: 10.1109/LCN.1999.801999
R. Roy
This paper proposes to facilitate the inter-gatekeeper communications with distributed gatekeeper architecture through acquiring knowledge of the destinations served by other GKs dynamically, of cache management, and of extension of the existing H.323 signaling messages. The only new field that needs to be added to extend the signaling message set is hopCount in order to avoid looping, especially in distributive environment similar to messages of Recommendation H.225.0 Annex G. The existing two fields defined in H.323v2 that need to be added to all signaling message sets are endpointType and gatekeeperIdentifier. This simple extension in the H.323 signaling message set will satisfy the needs for inter-gatekeeper communications.
本文提出通过动态获取其他网关所服务的目的地的信息、缓存管理和现有H.323信令消息的扩展,利用分布式网关架构促进网关之间的通信。为了避免循环,特别是在类似于H.225.0建议附件g的消息的分布式环境中,需要添加的唯一新字段是hopCount,以扩展信令消息集。在H.323v2中定义的现有两个字段需要添加到所有信令消息集中是endpointType和gatekeeperIdentifier。这个简单的H.323信令消息集扩展将满足网守间通信的需要。
{"title":"Distributed gatekeeper architecture for H.323-based multimedia telephony","authors":"R. Roy","doi":"10.1109/LCN.1999.801999","DOIUrl":"https://doi.org/10.1109/LCN.1999.801999","url":null,"abstract":"This paper proposes to facilitate the inter-gatekeeper communications with distributed gatekeeper architecture through acquiring knowledge of the destinations served by other GKs dynamically, of cache management, and of extension of the existing H.323 signaling messages. The only new field that needs to be added to extend the signaling message set is hopCount in order to avoid looping, especially in distributive environment similar to messages of Recommendation H.225.0 Annex G. The existing two fields defined in H.323v2 that need to be added to all signaling message sets are endpointType and gatekeeperIdentifier. This simple extension in the H.323 signaling message set will satisfy the needs for inter-gatekeeper communications.","PeriodicalId":265611,"journal":{"name":"Proceedings 24th Conference on Local Computer Networks. LCN'99","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123238376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel prediction system for wireless LAN based on the genetic algorithm and neural network 一种基于遗传算法和神经网络的无线局域网预测系统
Pub Date : 1999-10-17 DOI: 10.1109/LCN.1999.802072
Wen-Ching Chang, Chih-Hui Ko, Yang-Han Lee, Shiann-Tsong Sheu, Yu-Jie Zheng
The integrated technology of a novel prediction system with a high prediction accuracy for indoor wireless LAN is proposed. Different from conventional methods, the genetic algorithm and neural network are employed to compute the environmental parameters and enhance the prediction accuracy, respectively.
提出了一种新型室内无线局域网预测系统的集成技术,具有较高的预测精度。与传统方法不同,采用遗传算法和神经网络分别计算环境参数,提高预测精度。
{"title":"A novel prediction system for wireless LAN based on the genetic algorithm and neural network","authors":"Wen-Ching Chang, Chih-Hui Ko, Yang-Han Lee, Shiann-Tsong Sheu, Yu-Jie Zheng","doi":"10.1109/LCN.1999.802072","DOIUrl":"https://doi.org/10.1109/LCN.1999.802072","url":null,"abstract":"The integrated technology of a novel prediction system with a high prediction accuracy for indoor wireless LAN is proposed. Different from conventional methods, the genetic algorithm and neural network are employed to compute the environmental parameters and enhance the prediction accuracy, respectively.","PeriodicalId":265611,"journal":{"name":"Proceedings 24th Conference on Local Computer Networks. LCN'99","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122482217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings 24th Conference on Local Computer Networks. LCN'99
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1