首页 > 最新文献

2006 International Symposium on Computer Networks最新文献

英文 中文
Performance analysis of an efficient packet-based IEEE 802.16 MAC supporting adaptive modulation and coding 支持自适应调制和编码的高效基于分组的IEEE 802.16 MAC性能分析
Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662501
M. Settembre, M. Puleri, S. Garritano, P. Testa, R. Albanese, M. Mancini, V. L. Curto
The challenge for broadband fixed wireless access (BFWA) systems, which represent an attractive solution for broadband access in the last mile and for wireless backhauling applications in the "middle mile", lies in providing high data rates and quality of service (QoS). Such requirements mainly derive from the need to provide new bandwidth consuming multimedia services and applications, efficient handling of IP traffic, effective use of the limited radio spectrum and a greater backhaul capacity to support the increased number of users per cell site. IEEE 802.16 family of standards and its associated consortium WiMAX are gaining more and more interest in the telecommunication areas as broadband fixed wireless access solution with possible extension in nomadic and mobile area. Its main leverages are an efficient handling of IP traffic, the support of channel adaptivity and advanced QoS management. This paper aims at defining a new packet-based scheduling strategy for an IEEE 802.16 system supporting variable length MAC protocol data units (PDUs) and adaptive coding and modulation while fulfilling QoS requirements. A performance analysis of the proposed scheduler is presented and discussed in terms of packet transfer delay, MAC overhead and average throughput
宽带固定无线接入(BFWA)系统代表了最后一英里宽带接入和“中间一英里”无线回传应用的一种有吸引力的解决方案,其挑战在于提供高数据速率和服务质量(QoS)。这些需求主要来自需要提供新的消耗带宽的多媒体服务和应用、有效处理IP通信、有效利用有限的无线电频谱和更大的回程容量,以支持每个小区站点增加的用户数量。IEEE 802.16系列标准及其相关联盟WiMAX作为宽带固定无线接入解决方案在电信领域越来越受到关注,并有可能扩展到游牧和移动领域。它的主要优势是有效处理IP流量,支持信道自适应和先进的QoS管理。本文旨在为IEEE 802.16系统定义一种新的基于分组的调度策略,支持可变长度MAC协议数据单元(pdu)和自适应编码和调制,同时满足QoS要求。从分组传输延迟、MAC开销和平均吞吐量等方面对所提出的调度器进行了性能分析
{"title":"Performance analysis of an efficient packet-based IEEE 802.16 MAC supporting adaptive modulation and coding","authors":"M. Settembre, M. Puleri, S. Garritano, P. Testa, R. Albanese, M. Mancini, V. L. Curto","doi":"10.1109/ISCN.2006.1662501","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662501","url":null,"abstract":"The challenge for broadband fixed wireless access (BFWA) systems, which represent an attractive solution for broadband access in the last mile and for wireless backhauling applications in the \"middle mile\", lies in providing high data rates and quality of service (QoS). Such requirements mainly derive from the need to provide new bandwidth consuming multimedia services and applications, efficient handling of IP traffic, effective use of the limited radio spectrum and a greater backhaul capacity to support the increased number of users per cell site. IEEE 802.16 family of standards and its associated consortium WiMAX are gaining more and more interest in the telecommunication areas as broadband fixed wireless access solution with possible extension in nomadic and mobile area. Its main leverages are an efficient handling of IP traffic, the support of channel adaptivity and advanced QoS management. This paper aims at defining a new packet-based scheduling strategy for an IEEE 802.16 system supporting variable length MAC protocol data units (PDUs) and adaptive coding and modulation while fulfilling QoS requirements. A performance analysis of the proposed scheduler is presented and discussed in terms of packet transfer delay, MAC overhead and average throughput","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"499 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Performance of the application of chaotic signals in IEEE 802.11b and wireless sensor networks 混沌信号在IEEE 802.11b和无线传感器网络中的应用性能
Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662544
Grigorios Plitsis
Chaos engineering for wireless communications is an emerging field of research. There are certain advantages that chaotic dynamics could offer to conventional wireless access systems such as increased security and encryption, low-power communication, and hardware simplicity. This paper describes how chaotic spreading could be used in broadband wireless access systems such as IEEE 802.11b by replacing the spreading sequences with chaotic ones and thus improving the performance under narrowband sinusoidal jammer and Bluetooth interference. The results are being presented with the use of link level simulations. It also describes how quadrature chaos shift keying (QCSK) could be used for wireless sensor networks (WSNs) as the simplicity of hardware when using chaos in communication protocols could successfully lead to cubic millimeter scale sensor nodes and presents the performance of QCSK under narrowband sinusoidal jammer with the use of mathematical models
无线通信混沌工程是一个新兴的研究领域。混沌动力学可以为传统的无线接入系统提供某些优势,例如提高安全性和加密性、低功耗通信和硬件简单性。本文介绍了如何在IEEE 802.11b等宽带无线接入系统中,用混沌扩展序列代替混沌扩展序列,从而提高在窄带正弦干扰和蓝牙干扰下的性能。使用链路级模拟给出了结果。本文还描述了如何将正交混沌移位键控(QCSK)用于无线传感器网络(WSNs),因为在通信协议中使用混沌时硬件的简单性可以成功地产生立方毫米尺度的传感器节点,并利用数学模型展示了QCSK在窄带正弦干扰下的性能
{"title":"Performance of the application of chaotic signals in IEEE 802.11b and wireless sensor networks","authors":"Grigorios Plitsis","doi":"10.1109/ISCN.2006.1662544","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662544","url":null,"abstract":"Chaos engineering for wireless communications is an emerging field of research. There are certain advantages that chaotic dynamics could offer to conventional wireless access systems such as increased security and encryption, low-power communication, and hardware simplicity. This paper describes how chaotic spreading could be used in broadband wireless access systems such as IEEE 802.11b by replacing the spreading sequences with chaotic ones and thus improving the performance under narrowband sinusoidal jammer and Bluetooth interference. The results are being presented with the use of link level simulations. It also describes how quadrature chaos shift keying (QCSK) could be used for wireless sensor networks (WSNs) as the simplicity of hardware when using chaos in communication protocols could successfully lead to cubic millimeter scale sensor nodes and presents the performance of QCSK under narrowband sinusoidal jammer with the use of mathematical models","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116924213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Heart-like fair queuing algorithms (HLFQA) 类心公平排队算法(HLFQA)
Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662534
R. Dragos, M. Collier
We propose a new family of fair, work conserving traffic scheduling mechanisms that imitate the behavior of the human heart in the cardiovascular system. The algorithms have MAX (where MAX is the maximum packet size) fairness and O(log N) complexity and thus compare favorably with existing algorithms. The algorithms are simple enough to be implemented in hardware
我们提出了一个新的家庭公平,节省工作的交通调度机制,模仿人类心脏在心血管系统中的行为。这些算法具有MAX(其中MAX是最大数据包大小)公平性和O(log N)复杂度,因此与现有算法相比具有优势。这些算法非常简单,可以在硬件上实现
{"title":"Heart-like fair queuing algorithms (HLFQA)","authors":"R. Dragos, M. Collier","doi":"10.1109/ISCN.2006.1662534","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662534","url":null,"abstract":"We propose a new family of fair, work conserving traffic scheduling mechanisms that imitate the behavior of the human heart in the cardiovascular system. The algorithms have MAX (where MAX is the maximum packet size) fairness and O(log N) complexity and thus compare favorably with existing algorithms. The algorithms are simple enough to be implemented in hardware","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122317107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks 无线局域网的安全机制及其性能影响
Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662520
Gulsum Zeynep Gurkas Aydin, A. Zaim, M. Aydin
Rapidly growing 802.11 wireless local area networks continue to gain popularity in business and computer industry. This growing popularity and usage also caused many improvements on both physical layer and security mechanisms. In this study we investigated the performance of wireless local area networks (WLANs) and security mechanisms available for WLANs. These security mechanisms are wired equivalent privacy (WEP), Wi-Fi protected access (WPA) and 802.11i (WPA2). To examine the impacts of encryption and integrity protection mechanisms provided by WEP, WPA and WPA2, we developed a simulation software. In the first part of our study we tested the performance of IEEE 802.11b, 802.11g and 802.11i networks without security. In the second part we implemented the security mechanisms and investigated the impacts of these security mechanisms on the performance of wireless local area networks
迅速发展的802.11无线局域网在商业和计算机行业中继续受到欢迎。这种日益流行和使用也导致了物理层和安全机制的许多改进。在这项研究中,我们研究了无线局域网(wlan)的性能和可用的安全机制。这些安全机制是有线等效隐私(WEP)、Wi-Fi保护访问(WPA)和802.11i (WPA2)。为了研究WEP、WPA和WPA2提供的加密和完整性保护机制的影响,我们开发了一个仿真软件。在我们研究的第一部分,我们测试了没有安全的IEEE 802.11b、802.11g和802.11i网络的性能。在第二部分,我们实现了安全机制,并研究了这些安全机制对无线局域网性能的影响
{"title":"Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks","authors":"Gulsum Zeynep Gurkas Aydin, A. Zaim, M. Aydin","doi":"10.1109/ISCN.2006.1662520","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662520","url":null,"abstract":"Rapidly growing 802.11 wireless local area networks continue to gain popularity in business and computer industry. This growing popularity and usage also caused many improvements on both physical layer and security mechanisms. In this study we investigated the performance of wireless local area networks (WLANs) and security mechanisms available for WLANs. These security mechanisms are wired equivalent privacy (WEP), Wi-Fi protected access (WPA) and 802.11i (WPA2). To examine the impacts of encryption and integrity protection mechanisms provided by WEP, WPA and WPA2, we developed a simulation software. In the first part of our study we tested the performance of IEEE 802.11b, 802.11g and 802.11i networks without security. In the second part we implemented the security mechanisms and investigated the impacts of these security mechanisms on the performance of wireless local area networks","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122479450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Effects of the triggering policy on the performance of an adaptive WR-OBS network with QoS support 触发策略对支持QoS的自适应WR-OBS网络性能的影响
Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662527
N. Rikli, Khaled Al-Omran
A wavelength-routed (WR) optical network using an adaptive burst size (ABS) optical burst switching (OBS) scheme is to be considered. The aim is to improve the offered QoS and offer distinctive class-of-service (CoS) separation for various network conditions in an adaptive way. Specifically, a hybrid triggering policy is suggested to achieve the required network performance, such as average packet loss, average packet delay, and average network utilization, under both light and heavy traffic conditions. Performance results under dynamic and bursty traffic conditions are presented and analyzed
研究了一种采用自适应突发大小(ABS)光突发交换(OBS)方案的波长路由光网络。其目的是提高所提供的QoS,并以自适应的方式为各种网络条件提供独特的服务分类(CoS)分离。具体来说,建议采用混合触发策略,以满足轻流量和大流量情况下所需的网络性能要求,如平均丢包率、平均包延迟和平均网络利用率。给出并分析了在动态和突发交通条件下的性能结果
{"title":"Effects of the triggering policy on the performance of an adaptive WR-OBS network with QoS support","authors":"N. Rikli, Khaled Al-Omran","doi":"10.1109/ISCN.2006.1662527","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662527","url":null,"abstract":"A wavelength-routed (WR) optical network using an adaptive burst size (ABS) optical burst switching (OBS) scheme is to be considered. The aim is to improve the offered QoS and offer distinctive class-of-service (CoS) separation for various network conditions in an adaptive way. Specifically, a hybrid triggering policy is suggested to achieve the required network performance, such as average packet loss, average packet delay, and average network utilization, under both light and heavy traffic conditions. Performance results under dynamic and bursty traffic conditions are presented and analyzed","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SeCond: a system for epidemic peer-to-peer content distribution 第二:一个流行的点对点内容分发系统
Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662542
A. Alagoz, Öznur Özkasap, M. Çağlar
We propose an efficient cooperative content distribution protocol in which the cooperation among participants is based on a peer-to-peer (P2P) paradigm. Our main contribution to P2P content distribution is the use of an epidemic communication approach. Since epidemic algorithms are easy to use, robust and adaptive to dynamic conditions, they have found several application areas in distributed systems such as failure detection, data aggregation and database replication. However, they have not been used in cooperative content distribution before. In addition to the use of epidemic algorithms for state exchange among peers, we propose some methods in order to increase utilization of system resources during distribution of the files. We demonstrate effectiveness and scalability of the protocol through our simulation model
提出了一种基于点对点(P2P)模式的高效合作内容分发协议。我们对P2P内容分发的主要贡献是使用了一种流行的通信方法。由于流行病算法易于使用,鲁棒性和自适应动态条件,它们在分布式系统中发现了几个应用领域,如故障检测,数据聚合和数据库复制。然而,它们在合作内容分发中还没有被使用过。除了使用流行算法在对等体之间进行状态交换外,我们还提出了一些方法来提高文件分发过程中系统资源的利用率。通过仿真模型验证了该协议的有效性和可扩展性
{"title":"SeCond: a system for epidemic peer-to-peer content distribution","authors":"A. Alagoz, Öznur Özkasap, M. Çağlar","doi":"10.1109/ISCN.2006.1662542","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662542","url":null,"abstract":"We propose an efficient cooperative content distribution protocol in which the cooperation among participants is based on a peer-to-peer (P2P) paradigm. Our main contribution to P2P content distribution is the use of an epidemic communication approach. Since epidemic algorithms are easy to use, robust and adaptive to dynamic conditions, they have found several application areas in distributed systems such as failure detection, data aggregation and database replication. However, they have not been used in cooperative content distribution before. In addition to the use of epidemic algorithms for state exchange among peers, we propose some methods in order to increase utilization of system resources during distribution of the files. We demonstrate effectiveness and scalability of the protocol through our simulation model","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115781219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The evaluation of high reliability in an autonomous decentralized IC card ticket system 自主分散式IC卡票务系统的高可靠性评估
Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662535
A. Shiibashi, Takeyuki Yajima, Xiaodong Lu, K. Mori
Both high performance and high reliability are necessary for the automatic fare collection system. The IC card ticket system, developed in order to improve the passengers' satisfaction and to reduce the maintenance costs, cannot avoid the requirements, either. However, this new system has a problem; high performance on wireless communications lowers reliability. The solutions are the "autonomous decentralized architecture," the "autonomous decentralized algorithm," and the "autonomous decentralized data consistency technology." This paper introduces the "autonomous decentralized data consistency technology" for high reliability and evaluates the effectiveness by the functional reliability, which depends on how many times this technology runs and how many data the IC card contains. The results show the decentralized processes competitive to the centralized processes under the particular conditions. These conditions are made use of the practical "Suica" system at East Japan Railway Company and the system is running satisfactorily, without any fatal errors
自动收费系统必须兼具高性能和高可靠性。为了提高乘客的满意度和降低维护成本而开发的IC卡票务系统也无法回避这一要求。然而,这个新系统有一个问题;无线通信的高性能降低了可靠性。解决方案是“自治去中心化架构”、“自治去中心化算法”和“自治去中心化数据一致性技术”。本文介绍了高可靠性的“自主分散数据一致性技术”,并通过功能可靠性来评价其有效性,该技术的可靠性取决于该技术运行的次数和IC卡包含的数据量。结果表明,在特定条件下,分散过程与集中过程具有竞争关系。这些条件在东日本铁路公司的实际“Suica”系统中得到了应用,该系统运行良好,没有出现任何致命错误
{"title":"The evaluation of high reliability in an autonomous decentralized IC card ticket system","authors":"A. Shiibashi, Takeyuki Yajima, Xiaodong Lu, K. Mori","doi":"10.1109/ISCN.2006.1662535","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662535","url":null,"abstract":"Both high performance and high reliability are necessary for the automatic fare collection system. The IC card ticket system, developed in order to improve the passengers' satisfaction and to reduce the maintenance costs, cannot avoid the requirements, either. However, this new system has a problem; high performance on wireless communications lowers reliability. The solutions are the \"autonomous decentralized architecture,\" the \"autonomous decentralized algorithm,\" and the \"autonomous decentralized data consistency technology.\" This paper introduces the \"autonomous decentralized data consistency technology\" for high reliability and evaluates the effectiveness by the functional reliability, which depends on how many times this technology runs and how many data the IC card contains. The results show the decentralized processes competitive to the centralized processes under the particular conditions. These conditions are made use of the practical \"Suica\" system at East Japan Railway Company and the system is running satisfactorily, without any fatal errors","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133248747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IPSEC over satellite links: a new flow identification method 卫星链路上的IPSEC:一种新的流量识别方法
Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662523
Dilek Demirel Isci, Fatih Alagöz, M. Çaglayan
Acknowledgment based transport protocols such as TCP have low performance in satellite links, which are characterized by high latencies and high bit error rates. Low performance of TCP in satellite links is due to the fact that TCP packet losses are assumed to be the cause of congestion in the network, which turns out to be an invalid assumption for satellite links. TCP performance enhancing proxies (PEPs) are widely used to overcome the limitations of TCP over satellite links. However, when end-to-end security mechanisms, such as IPSEC, are used, TCP PEP mechanisms can not be used. IPSEC encrypts and/or authenticates the packet header fields that the PEP needs to read or modify. We propose a novel mechanism to integrate IPSEC with TCP PEPs. In our approach, a cryptographic hash of flow identification information is generated and stored in the IP header. The TCP sequence number is also stored in the IP header. Using the hash value and sequence numbers, the PEP is able to match packets and corresponding acknowledgements to regulate the flow. This approach is applicable to PEP mechanisms that need read access to the IP and TCP headers
基于确认的传输协议(如TCP)在卫星链路中性能较差,具有高延迟和高误码率的特点。卫星链路中TCP的低性能是由于假定TCP丢包是导致网络拥塞的原因,而这对卫星链路来说是一个无效的假设。TCP性能增强代理(pep)被广泛用于克服卫星链路上TCP的局限性。但是,当使用IPSEC等端到端安全机制时,不能使用TCP PEP机制。IPSEC对PEP需要读取或修改的包头字段进行加密和/或认证。我们提出了一种新的机制来集成IPSEC和TCP pep。在我们的方法中,流标识信息的加密散列被生成并存储在IP报头中。TCP序列号也存储在IP报头中。通过使用哈希值和序列号,PEP能够匹配数据包和相应的确认来调节流。这种方法适用于需要对IP和TCP头进行读访问的PEP机制
{"title":"IPSEC over satellite links: a new flow identification method","authors":"Dilek Demirel Isci, Fatih Alagöz, M. Çaglayan","doi":"10.1109/ISCN.2006.1662523","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662523","url":null,"abstract":"Acknowledgment based transport protocols such as TCP have low performance in satellite links, which are characterized by high latencies and high bit error rates. Low performance of TCP in satellite links is due to the fact that TCP packet losses are assumed to be the cause of congestion in the network, which turns out to be an invalid assumption for satellite links. TCP performance enhancing proxies (PEPs) are widely used to overcome the limitations of TCP over satellite links. However, when end-to-end security mechanisms, such as IPSEC, are used, TCP PEP mechanisms can not be used. IPSEC encrypts and/or authenticates the packet header fields that the PEP needs to read or modify. We propose a novel mechanism to integrate IPSEC with TCP PEPs. In our approach, a cryptographic hash of flow identification information is generated and stored in the IP header. The TCP sequence number is also stored in the IP header. Using the hash value and sequence numbers, the PEP is able to match packets and corresponding acknowledgements to regulate the flow. This approach is applicable to PEP mechanisms that need read access to the IP and TCP headers","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133770668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Raptor versus Reed Solomon forward error correction codes 猛禽对里德·所罗门的纠错码
Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662545
U. Demir, Özlem Aktaş
Network conditions generally cause errors on network packets. Correction of these errors is in the subject of "forward error correction." Forward error correction is divided into two categories: bit-level forward error correction and packet-level forward error correction. These two categories are unfamiliar. The aim of this study is to make a literature comparison of two alternative packet-level forward error correction codes: Raptor and Reed Solomon. Nowadays when packet-level error correction codes are mentioned, these two techniques are remembered. Reed Solomon FEC codes are found on the Internet and are tested with different network conditions. Raptor codes are commercial and not used broadly yet. But several new technologies (MBMS, DVB and etc.) uses Raptor. This study shows the cases, where Raptor and Reed Solomon are appropriate to use
网络状况通常会导致网络报文出现错误。这些错误的纠正是在“前向纠错”的主题。前向纠错分为位级前向纠错和包级前向纠错两类。这两个类别是不熟悉的。本研究的目的是使两个替代包级前向纠错码的文献比较:猛禽和里德所罗门。现在,当提到包级纠错码时,就会想到这两种技术。里德所罗门FEC代码在互联网上找到,并在不同的网络条件下进行了测试。猛禽代码是商业的,还没有广泛使用。但一些新技术(MBMS, DVB等)使用猛禽。本研究展示了Raptor和Reed Solomon适合使用的情况
{"title":"Raptor versus Reed Solomon forward error correction codes","authors":"U. Demir, Özlem Aktaş","doi":"10.1109/ISCN.2006.1662545","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662545","url":null,"abstract":"Network conditions generally cause errors on network packets. Correction of these errors is in the subject of \"forward error correction.\" Forward error correction is divided into two categories: bit-level forward error correction and packet-level forward error correction. These two categories are unfamiliar. The aim of this study is to make a literature comparison of two alternative packet-level forward error correction codes: Raptor and Reed Solomon. Nowadays when packet-level error correction codes are mentioned, these two techniques are remembered. Reed Solomon FEC codes are found on the Internet and are tested with different network conditions. Raptor codes are commercial and not used broadly yet. But several new technologies (MBMS, DVB and etc.) uses Raptor. This study shows the cases, where Raptor and Reed Solomon are appropriate to use","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128388861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
A time-threshold based multi-guard bandwidth allocation scheme for cellular networks 一种基于时间阈值的蜂窝网络多保护带宽分配方案
Pub Date : 2006-07-31 DOI: 10.1109/ISCN.2006.1662517
I. Candan, M. Salamah
In this paper, a time-threshold based multi-guard bandwidth allocation scheme for voice calls is presented. The main idea of the new scheme is based on monitoring the elapsed real time of handoff calls and according to a time threshold (te), a handoff call is either slightly-prioritized or fully-prioritised. A slightly-prioritized handoff call has higher priority than a new call and lower priority than a fully-prioritized handoff call. Also in this paper, the performances of different bandwidth allocation schemes are measured using a crucial general performance metric Z. Z, which is a performance/cost ratio, is a function of the new call blocking probability, handoff call dropping probability and system utilization all together. The results indicate that our scheme outperforms other traditional schemes in terms of performance/cost ratio, and maintains its superiority under different network circumstances
提出了一种基于时间阈值的语音多保护带宽分配方案。新方案的主要思想是基于监视切换调用的实时运行时间,并根据时间阈值(te),切换调用是轻微优先级还是完全优先级。轻微优先级切换呼叫的优先级高于新呼叫,低于完全优先级切换呼叫。此外,本文还使用一个关键的通用性能指标Z来衡量不同带宽分配方案的性能。Z是一个性能/成本比,是新呼叫阻塞概率、切换呼叫丢弃概率和系统利用率的函数。结果表明,我们的方案在性能/成本比方面优于其他传统方案,并在不同的网络环境下保持其优势
{"title":"A time-threshold based multi-guard bandwidth allocation scheme for cellular networks","authors":"I. Candan, M. Salamah","doi":"10.1109/ISCN.2006.1662517","DOIUrl":"https://doi.org/10.1109/ISCN.2006.1662517","url":null,"abstract":"In this paper, a time-threshold based multi-guard bandwidth allocation scheme for voice calls is presented. The main idea of the new scheme is based on monitoring the elapsed real time of handoff calls and according to a time threshold (te), a handoff call is either slightly-prioritized or fully-prioritised. A slightly-prioritized handoff call has higher priority than a new call and lower priority than a fully-prioritized handoff call. Also in this paper, the performances of different bandwidth allocation schemes are measured using a crucial general performance metric Z. Z, which is a performance/cost ratio, is a function of the new call blocking probability, handoff call dropping probability and system utilization all together. The results indicate that our scheme outperforms other traditional schemes in terms of performance/cost ratio, and maintains its superiority under different network circumstances","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126557681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2006 International Symposium on Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1