Pub Date : 2008-11-17DOI: 10.1109/ICCCN.2008.ECP.78
Muhammad S. Javed, K. Thulasiraman, G. Xue
The problem of designing high capacity and high bit rate IP-over-WDM networks, which can provide uninterrupted service in the presence of network equipment failures, continues to attract significant interest from the research community. An IP-over-WDM network implements Internet Protocol (IP) directly over physical WDM network by establishing lightpaths using IP routers, optical crossconnects (OXC) and optical fibers. Generally an optical fiber carries several lightpaths and all of them get disconnected, if the fiber carrying them fails. Such failures can quickly impact the performance of the entire network. If IP routers can find paths to all the nodes in the network, then the network can continue to provide service without significant performance degradation. This can be achieved by reserving network resources (protection) or provisioning the network with some additional capacity (restoration). Such networks are usually called survivable networks. In this paper, we propose four algorithms based on SMART framework proposed by Kurant and Thiran, and a hybrid approach by Shenai and Sivalingam. The algorithms use a combination of protection and restoration mechanisms to make IP-over-WDM networks survivable such that the protection capacity required is not significant.
{"title":"Logical Topology Design for IP-over-WDM Networks: A Hybrid Approach for Minimum Protection Capacity","authors":"Muhammad S. Javed, K. Thulasiraman, G. Xue","doi":"10.1109/ICCCN.2008.ECP.78","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.78","url":null,"abstract":"The problem of designing high capacity and high bit rate IP-over-WDM networks, which can provide uninterrupted service in the presence of network equipment failures, continues to attract significant interest from the research community. An IP-over-WDM network implements Internet Protocol (IP) directly over physical WDM network by establishing lightpaths using IP routers, optical crossconnects (OXC) and optical fibers. Generally an optical fiber carries several lightpaths and all of them get disconnected, if the fiber carrying them fails. Such failures can quickly impact the performance of the entire network. If IP routers can find paths to all the nodes in the network, then the network can continue to provide service without significant performance degradation. This can be achieved by reserving network resources (protection) or provisioning the network with some additional capacity (restoration). Such networks are usually called survivable networks. In this paper, we propose four algorithms based on SMART framework proposed by Kurant and Thiran, and a hybrid approach by Shenai and Sivalingam. The algorithms use a combination of protection and restoration mechanisms to make IP-over-WDM networks survivable such that the protection capacity required is not significant.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"219 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129840932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-17DOI: 10.1109/ICCCN.2008.ECP.66
Deepak Padmanabhan, Rajesh R. C. Bikram, V. Vokkarane
TCP-based applications account for a majority of data traffic in the Internet; thus understanding and improving the performance of TCP over OBS network is critical. In this paper, we identify the ill-effects of implementing TCP over a hybrid network (IP-access and OBS-core). We purpose a Split- TCP approach for a hybrid IP-OBS network to improve TCP performance. We propose two Split-TCP approaches, namely, 1:1:1 and N:1:N. We evaluate the performance of the proposed approaches over an IP-OBS hybrid network. Based on the simulation results, N:1:N Split-TCP approach outperforms all other approaches.
{"title":"TCP Over Optical Burst Switching (OBS): To Split or Not To Split?","authors":"Deepak Padmanabhan, Rajesh R. C. Bikram, V. Vokkarane","doi":"10.1109/ICCCN.2008.ECP.66","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.66","url":null,"abstract":"TCP-based applications account for a majority of data traffic in the Internet; thus understanding and improving the performance of TCP over OBS network is critical. In this paper, we identify the ill-effects of implementing TCP over a hybrid network (IP-access and OBS-core). We purpose a Split- TCP approach for a hybrid IP-OBS network to improve TCP performance. We propose two Split-TCP approaches, namely, 1:1:1 and N:1:N. We evaluate the performance of the proposed approaches over an IP-OBS hybrid network. Based on the simulation results, N:1:N Split-TCP approach outperforms all other approaches.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-17DOI: 10.1109/ICCCN.2008.ECP.51
T. Nguyen, Duc H. M. Nguyen, B.N. Tran, H. Vu, N. Mittal
In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 standards, whenever a wireless station wants to leave the network, it sends a deauthentication or disassociation frame to the access point. These two frames, however, are sent unencrypted and are not authenticated by the access point. Therefore, an attacker can launch a DoS attack by spoofing these messages and thus disabling the communication between a wireless device and its access point. We propose an efficient solution based on a one way hard function to verify that a deauthentication/disassociation frame is from a legitimate station. We implement our solution on some 802.11 devices and the experimental results show that our protocol is highly effective against this DoS attack.
{"title":"A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks","authors":"T. Nguyen, Duc H. M. Nguyen, B.N. Tran, H. Vu, N. Mittal","doi":"10.1109/ICCCN.2008.ECP.51","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.51","url":null,"abstract":"In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 standards, whenever a wireless station wants to leave the network, it sends a deauthentication or disassociation frame to the access point. These two frames, however, are sent unencrypted and are not authenticated by the access point. Therefore, an attacker can launch a DoS attack by spoofing these messages and thus disabling the communication between a wireless device and its access point. We propose an efficient solution based on a one way hard function to verify that a deauthentication/disassociation frame is from a legitimate station. We implement our solution on some 802.11 devices and the experimental results show that our protocol is highly effective against this DoS attack.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132634098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-17DOI: 10.1109/ICCCN.2008.ECP.120
A. Yoshioka, Shariful Hasan Shaikot, Min Sik Kim
A rule-based intrusion detection system compares the incoming packets against rule set in order to detect intrusion. Unfortunately, it spends the majority of CPU time in packet classification to search for rules that match each packet. A common approach is to build a graph such as rule trees or finite automata for a given rule set, and traverse it using a packet as an input string. Because of the increasing number of security threats and vulnerabilities, the number of rules often exceeds thousands requiring more than hundreds of megabytes of memory. Exploring such a huge graph becomes a major bottleneck in high-speed networks since each packet incurs many memory accesses with little locality. In this paper, we propose rule hashing for fast packet classification in intrusion detection systems. The rule hashing, combined with hierarchical rule trees, saves memory and reduce the number of memory accesses by allowing the whole working set to be accommodated in a cache in most of the time, and thus improves response times in finding matching rules. We implement our algorithm in Snort, a popular open-source intrusion detection system. Experimental results show that our implementation is faster than original Snort to deal with the same real packet traces while consuming an order of magnitude less memory.
基于规则的入侵检测系统将收到的数据包与规则集进行比较,以检测入侵。遗憾的是,在数据包分类过程中,系统需要花费大部分 CPU 时间来搜索与每个数据包相匹配的规则。一种常见的方法是为给定的规则集构建规则树或有限自动机等图形,并将数据包作为输入字符串进行遍历。由于安全威胁和漏洞的数量不断增加,规则的数量往往超过数千条,需要超过数百兆字节的内存。在高速网络中,由于每个数据包都会产生大量内存访问,且几乎没有定位,因此探索这样一个庞大的图成为一个主要瓶颈。在本文中,我们提出了在入侵检测系统中进行快速数据包分类的哈希规则。规则散列与分层规则树相结合,可以节省内存并减少内存访问次数,因为在大多数情况下,整个工作集都可以容纳在缓存中,从而提高了查找匹配规则的响应速度。我们在 Snort(一种流行的开源入侵检测系统)中实现了我们的算法。实验结果表明,在处理相同的真实数据包轨迹时,我们的实现比原始 Snort 更快,同时内存消耗也少了一个数量级。
{"title":"Rule Hashing for Efficient Packet Classification in Network Intrusion Detection","authors":"A. Yoshioka, Shariful Hasan Shaikot, Min Sik Kim","doi":"10.1109/ICCCN.2008.ECP.120","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.120","url":null,"abstract":"A rule-based intrusion detection system compares the incoming packets against rule set in order to detect intrusion. Unfortunately, it spends the majority of CPU time in packet classification to search for rules that match each packet. A common approach is to build a graph such as rule trees or finite automata for a given rule set, and traverse it using a packet as an input string. Because of the increasing number of security threats and vulnerabilities, the number of rules often exceeds thousands requiring more than hundreds of megabytes of memory. Exploring such a huge graph becomes a major bottleneck in high-speed networks since each packet incurs many memory accesses with little locality. In this paper, we propose rule hashing for fast packet classification in intrusion detection systems. The rule hashing, combined with hierarchical rule trees, saves memory and reduce the number of memory accesses by allowing the whole working set to be accommodated in a cache in most of the time, and thus improves response times in finding matching rules. We implement our algorithm in Snort, a popular open-source intrusion detection system. Experimental results show that our implementation is faster than original Snort to deal with the same real packet traces while consuming an order of magnitude less memory.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128135608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-17DOI: 10.1109/ICCCN.2008.ECP.135
I. Martínez, J. Escayola, M. Martínez-Espronceda, L. Serrano, J. Trigo, S. Led, José García
Advances in information and communication technologies, ICT, are bringing new opportunities in the field of middleware systems oriented to ubiquitous environments and wearable devices used for patient telemonitoring. At a time of such challenges, this paper arises from the need to identify robust technical telemonitoring solutions that are both open and interoperable in home or mobile scenarios. These middleware systems demand standardized solutions to be cost effective and to take advantage of standardized operation and interoperability. Thus, a fundamental challenge is to design a plug-&-play platform that, either as individual elements or as components, can be incorporated in a simple way into different telecare systems, perhaps configuring a personal user network. Moreover, there is an increasing market pressure from companies not traditionally involved in medical markets, asking for a standard for personal health devices (PHD), which foresee a vast demand for telemonitoring, wellness, ambient assisted living (AAL) and applications for ubiquitous-health (u-health). However, the newly emerging situations imply very strict requirements for the protocols involved in the communication. The ISO/IEEE 11073 (X73) family of standards is adapting to new personal devices, implementing high quality sensors, and supporting wireless transport (e.g. Bluetooth) and the access to faster and reliable communication network resources. Its optimized version (X73-PHD) is adequate for this new technology snapshot and might appear the best-positioned international standards to reach this goal. This work presents an updated survey of this standard and its implementation in a middleware telemonitoring platform.
{"title":"Standard-Based Middleware Platform for Medical Sensor Networks and u-Health","authors":"I. Martínez, J. Escayola, M. Martínez-Espronceda, L. Serrano, J. Trigo, S. Led, José García","doi":"10.1109/ICCCN.2008.ECP.135","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.135","url":null,"abstract":"Advances in information and communication technologies, ICT, are bringing new opportunities in the field of middleware systems oriented to ubiquitous environments and wearable devices used for patient telemonitoring. At a time of such challenges, this paper arises from the need to identify robust technical telemonitoring solutions that are both open and interoperable in home or mobile scenarios. These middleware systems demand standardized solutions to be cost effective and to take advantage of standardized operation and interoperability. Thus, a fundamental challenge is to design a plug-&-play platform that, either as individual elements or as components, can be incorporated in a simple way into different telecare systems, perhaps configuring a personal user network. Moreover, there is an increasing market pressure from companies not traditionally involved in medical markets, asking for a standard for personal health devices (PHD), which foresee a vast demand for telemonitoring, wellness, ambient assisted living (AAL) and applications for ubiquitous-health (u-health). However, the newly emerging situations imply very strict requirements for the protocols involved in the communication. The ISO/IEEE 11073 (X73) family of standards is adapting to new personal devices, implementing high quality sensors, and supporting wireless transport (e.g. Bluetooth) and the access to faster and reliable communication network resources. Its optimized version (X73-PHD) is adequate for this new technology snapshot and might appear the best-positioned international standards to reach this goal. This work presents an updated survey of this standard and its implementation in a middleware telemonitoring platform.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128657379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-17DOI: 10.1109/ICCCN.2008.ECP.132
C. R. Storck, A. Ribeiro, Fátima Duarte-Figueiredo
This work proposes CAC-RD: a call admission control for UMTS (universal mobile terrestrial system) networks. Its main challenge is to guaranty the maximum access/network availability while maintaining satisfactory performance levels. It is based on two schemes: channel reservation and network diagnosis. It reserves dynamically some channels to handovers, based on the network behavior. The diagnosis monitors the network utilization giving information to the CAC-RD decisions. There are some utilization thresholds that drive the blockings, telling CAC-RD when to accept or not a new call. Handovers and the conversational class are the CAC-RD priorities. Simulation results show that CAC-RD can guarantee network availability, reducing priority classes blocking and guarantying some network QoS requirements. Simulations had shown an average reduction of 40% and 11% in handovers and new classes blockings, respectively. Thus, results indicate that CAC-RD can guarantee access and QoS, keeping levels of agreement between performance and availability.
{"title":"CAC-RD: A Call Admission Control for UMTS Networks","authors":"C. R. Storck, A. Ribeiro, Fátima Duarte-Figueiredo","doi":"10.1109/ICCCN.2008.ECP.132","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.132","url":null,"abstract":"This work proposes CAC-RD: a call admission control for UMTS (universal mobile terrestrial system) networks. Its main challenge is to guaranty the maximum access/network availability while maintaining satisfactory performance levels. It is based on two schemes: channel reservation and network diagnosis. It reserves dynamically some channels to handovers, based on the network behavior. The diagnosis monitors the network utilization giving information to the CAC-RD decisions. There are some utilization thresholds that drive the blockings, telling CAC-RD when to accept or not a new call. Handovers and the conversational class are the CAC-RD priorities. Simulation results show that CAC-RD can guarantee network availability, reducing priority classes blocking and guarantying some network QoS requirements. Simulations had shown an average reduction of 40% and 11% in handovers and new classes blockings, respectively. Thus, results indicate that CAC-RD can guarantee access and QoS, keeping levels of agreement between performance and availability.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129431326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-17DOI: 10.1109/ICCCN.2008.ECP.157
C. Bellettini, G. Mazzini
In this paper we present the difficulties involved in recognizing pitch-shifted audio, discussing its usage and implications. In the framework of audio fingerprinting techniques, we address the issue by proposing two complementary solutions, both of which can be exploited without affecting an existing reference database. As fingerprint algorithm, a well-known, robust method is employed in a modified version and providing insights on its peculiarities. Tests were carried out on a vast song library and exhibit an excellent success rate, up to considerable distortion magnitudes.
{"title":"Reliable Automatic Recognition for Pitch-Shifted Audio","authors":"C. Bellettini, G. Mazzini","doi":"10.1109/ICCCN.2008.ECP.157","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.157","url":null,"abstract":"In this paper we present the difficulties involved in recognizing pitch-shifted audio, discussing its usage and implications. In the framework of audio fingerprinting techniques, we address the issue by proposing two complementary solutions, both of which can be exploited without affecting an existing reference database. As fingerprint algorithm, a well-known, robust method is employed in a modified version and providing insights on its peculiarities. Tests were carried out on a vast song library and exhibit an excellent success rate, up to considerable distortion magnitudes.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129199392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-17DOI: 10.1109/ICCCN.2008.ECP.118
Yue Shang, Dong Wang, D. Birru
Ultra-wide-band (UWB) is expected to enable highspeed short-range wireless connectivity of numerous devices in the consumer application space. It is also a very promising candidate technology for medical applications. However, a good understanding of the performance of the technology in the medical application environment is essential. In this paper, we present the results of the study on the effects of human body interfering with (blocking) the UWB radio signal, focusing on the performance of the WiMedia UWB technology for medical applications. The study includes channel measurements, modeling and performance evaluation using the channel models. The impact of human blockages on the wireless link is studied via system simulations for different UWB configurations, including the standard WiMedia UWB system with single receive (RX) antenna, (co-located) receive antenna selection system, and the (separately-located) device selection system. Link margin analysis is also performed to quantitatively evaluate the link robustness of different UWB setups against human blockages.
{"title":"Performance Analysis of WiMedia UWB System for Medical Applications with Human Blockage","authors":"Yue Shang, Dong Wang, D. Birru","doi":"10.1109/ICCCN.2008.ECP.118","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.118","url":null,"abstract":"Ultra-wide-band (UWB) is expected to enable highspeed short-range wireless connectivity of numerous devices in the consumer application space. It is also a very promising candidate technology for medical applications. However, a good understanding of the performance of the technology in the medical application environment is essential. In this paper, we present the results of the study on the effects of human body interfering with (blocking) the UWB radio signal, focusing on the performance of the WiMedia UWB technology for medical applications. The study includes channel measurements, modeling and performance evaluation using the channel models. The impact of human blockages on the wireless link is studied via system simulations for different UWB configurations, including the standard WiMedia UWB system with single receive (RX) antenna, (co-located) receive antenna selection system, and the (separately-located) device selection system. Link margin analysis is also performed to quantitatively evaluate the link robustness of different UWB setups against human blockages.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-17DOI: 10.1109/ICCCN.2008.ECP.172
Laercio Cruvinel, T. Vazão, Fernando M. Silva, António Fonseca
Quality of service for video and audio transmissions over IP is bound by the best-effort nature of this protocol. The road for achieving optimal behavior for selected flows of traffic includes better controlling and tuning one or more elements of the transmission - the characteristics of the traffic itself or the supporting hardware and software. This tuning may be static or dynamic, profile-based or adaptive. This paper presents results and insights of using an architecture for adapting QoS parameters in a DiffServ-enabled network, in an effort to dynamically reach the best choice of values in each given situation. The architecture is named distributed dynamic quality of service - DDQoS - and includes separate, but interoperating, models for the core and for the edge of the network. The momentum experienced by the transmission of multimedia content over the Internet, and the extended range of options for adapting this kind of traffic, derived from its particular characteristics when compared with other data, motivate this work on adaptation mechanisms for improving the quality of service.
{"title":"Dynamic QoS Adaptation for Multimedia Traffic","authors":"Laercio Cruvinel, T. Vazão, Fernando M. Silva, António Fonseca","doi":"10.1109/ICCCN.2008.ECP.172","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.172","url":null,"abstract":"Quality of service for video and audio transmissions over IP is bound by the best-effort nature of this protocol. The road for achieving optimal behavior for selected flows of traffic includes better controlling and tuning one or more elements of the transmission - the characteristics of the traffic itself or the supporting hardware and software. This tuning may be static or dynamic, profile-based or adaptive. This paper presents results and insights of using an architecture for adapting QoS parameters in a DiffServ-enabled network, in an effort to dynamically reach the best choice of values in each given situation. The architecture is named distributed dynamic quality of service - DDQoS - and includes separate, but interoperating, models for the core and for the edge of the network. The momentum experienced by the transmission of multimedia content over the Internet, and the extended range of options for adapting this kind of traffic, derived from its particular characteristics when compared with other data, motivate this work on adaptation mechanisms for improving the quality of service.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124027501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-17DOI: 10.1109/ICCCN.2008.ECP.44
A. Keller, T. Hossmann, M. May, Ghazi Bouabene, Christophe Jelger, C. Tschudin
A majority of network architectures aim at solving specific shortcomings of the original Internet architecture. While providing solutions for the particular problems, they often lack in flexibility and do not provide general concepts for future networking requirements. In contrast, we introduce a network architecture that aims to be versatile enough to serve as a foundation for the future Internet. The main pillars of our architecture are communication pivots called information dispatch points (IDPs) which embed the concept of modularity at all levels of the architecture. IDPs completely decouple functional entities by means of indirection thus enabling evolving protocol stacks. Our architecture also provides a consistent application programming interface (API) to access node-local or network-wide functionality. In addition to the description of this architecture, we report about a working prototype of the architecture and we give examples of its application.
{"title":"A System Architecture for Evolving Protocol Stacks (Invited Paper)","authors":"A. Keller, T. Hossmann, M. May, Ghazi Bouabene, Christophe Jelger, C. Tschudin","doi":"10.1109/ICCCN.2008.ECP.44","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.44","url":null,"abstract":"A majority of network architectures aim at solving specific shortcomings of the original Internet architecture. While providing solutions for the particular problems, they often lack in flexibility and do not provide general concepts for future networking requirements. In contrast, we introduce a network architecture that aims to be versatile enough to serve as a foundation for the future Internet. The main pillars of our architecture are communication pivots called information dispatch points (IDPs) which embed the concept of modularity at all levels of the architecture. IDPs completely decouple functional entities by means of indirection thus enabling evolving protocol stacks. Our architecture also provides a consistent application programming interface (API) to access node-local or network-wide functionality. In addition to the description of this architecture, we report about a working prototype of the architecture and we give examples of its application.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}