首页 > 最新文献

10th IEEE Symposium on Computers and Communications (ISCC'05)最新文献

英文 中文
The polynomial-assisted ad-hoc charging protocol 多项式辅助自组织充电协议
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.145
J. Barraca, S. Sargento, R. Aguiar
The area of trustworthy charging in self-organized environments has been developed quite recently. This paper introduces a new secure charging-protocol, the polynomial-assisted charging protocol, for these environments. The protocol relies on polynomial composition for speeding the identification process in small groups. This protocol is able to provide strict guarantees of cooperative behavior in traffic forwarding, with minimal network overhead. Protocol performance is evaluated in multiple ad-hoc environments and results are compared with previously proposed work. The performance results show the merits of this protocol in multiple types of environments.
在自组织环境中可靠收费的领域是最近才发展起来的。针对这些环境,本文提出了一种新的安全充电协议——多项式辅助充电协议。该协议依靠多项式组合来加速小团体的识别过程。该协议能够以最小的网络开销对流量转发中的协作行为提供严格的保证。在多个ad-hoc环境下对协议性能进行了评估,并将结果与先前提出的工作进行了比较。性能结果显示了该协议在多种类型环境下的优点。
{"title":"The polynomial-assisted ad-hoc charging protocol","authors":"J. Barraca, S. Sargento, R. Aguiar","doi":"10.1109/ISCC.2005.145","DOIUrl":"https://doi.org/10.1109/ISCC.2005.145","url":null,"abstract":"The area of trustworthy charging in self-organized environments has been developed quite recently. This paper introduces a new secure charging-protocol, the polynomial-assisted charging protocol, for these environments. The protocol relies on polynomial composition for speeding the identification process in small groups. This protocol is able to provide strict guarantees of cooperative behavior in traffic forwarding, with minimal network overhead. Protocol performance is evaluated in multiple ad-hoc environments and results are compared with previously proposed work. The performance results show the merits of this protocol in multiple types of environments.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126527537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Outage probability analysis in cellular systems with noisy Weibull-faded lognormal-shadowed links 带噪声威布尔衰落对数正态阴影链路的元胞系统中断概率分析
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.117
M. H. Ismail, M. Matalgah
We consider the problem of determining the outage probability in cellular systems where each of the links is lognormal-shadowed, Weibull-faded and corrupted by additive noise. We propose two solutions for this problem; a simple lower bound on the outage probability based on the concavity of the logarithmic function and an approximate expression based on the use of the central limit theorem. The approximate expression is slightly more complicated than the lower bound but provides a better accuracy for most of the parameters values. We verify the accuracy of the proposed expressions by comparing them to the outage probability obtained by means of Monte Carlo simulations.
我们考虑在每个链路都是对数正态阴影、威布尔衰落和被加性噪声破坏的元胞系统中确定中断概率的问题。对于这个问题,我们提出了两种解决方案;基于对数函数的凹性给出了停机概率的简单下界,并利用中心极限定理给出了停机概率的近似表达式。近似表达式比下界稍微复杂一些,但对大多数参数值提供了更好的精度。通过与蒙特卡罗模拟得到的停电概率进行比较,验证了所提表达式的准确性。
{"title":"Outage probability analysis in cellular systems with noisy Weibull-faded lognormal-shadowed links","authors":"M. H. Ismail, M. Matalgah","doi":"10.1109/ISCC.2005.117","DOIUrl":"https://doi.org/10.1109/ISCC.2005.117","url":null,"abstract":"We consider the problem of determining the outage probability in cellular systems where each of the links is lognormal-shadowed, Weibull-faded and corrupted by additive noise. We propose two solutions for this problem; a simple lower bound on the outage probability based on the concavity of the logarithmic function and an approximate expression based on the use of the central limit theorem. The approximate expression is slightly more complicated than the lower bound but provides a better accuracy for most of the parameters values. We verify the accuracy of the proposed expressions by comparing them to the outage probability obtained by means of Monte Carlo simulations.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123126578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An energy-aware medium-access-control protocol with frequent sleeps for wireless sensor networks 无线传感器网络中具有频繁睡眠的能量感知介质访问控制协议
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.26
C. K. Nguyen, Anup Kumar
The paper proposes an energy-aware contention-based protocol for the medium access control (MAC) sub-layer for wireless sensor networks. The innovative approach with frequent sleeps proactively and aggressively reduces the wasted energy while increasing the throughput and decreasing the latency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control-packet overhead, and overhearing. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach, especially compared to the S-MAC and T-MAC protocols.
针对无线传感器网络的介质访问控制(MAC)子层,提出了一种能量感知的基于争用的协议。频繁休眠的创新方法在提高吞吐量和降低延迟的同时,主动和积极地减少了浪费的能量。提出的MAC协议解决了由于空闲侦听、控制包开销和侦听而造成的能量不足的问题。仿真实验证明了该方法的有效性,特别是与S-MAC和T-MAC协议进行了比较。
{"title":"An energy-aware medium-access-control protocol with frequent sleeps for wireless sensor networks","authors":"C. K. Nguyen, Anup Kumar","doi":"10.1109/ISCC.2005.26","DOIUrl":"https://doi.org/10.1109/ISCC.2005.26","url":null,"abstract":"The paper proposes an energy-aware contention-based protocol for the medium access control (MAC) sub-layer for wireless sensor networks. The innovative approach with frequent sleeps proactively and aggressively reduces the wasted energy while increasing the throughput and decreasing the latency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control-packet overhead, and overhearing. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach, especially compared to the S-MAC and T-MAC protocols.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"66 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Understanding current IPv6 performance: a measurement study 了解当前IPv6性能:一项测量研究
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.151
Yi Wang, Shaozhi Ye, Xing Li
Much work has been done on IPv6 standards and testbeds deployment. However, little is known about the performance of the real IPv6 Internet, especially from the perspective of end users. In this paper, we present a measurement study of current IPv6 performance conducted from CERNET. We study 585, 680 packet-level traces with 133,340 million packets collected from 936 IPv4/IPv6 dual-stack Web servers located in 44 countries. We present a comprehensive performance comparison of IPv6 and IPv4, including connectivity, packet loss rate, round-trip time, etc. Our measurement results show that IPv6 connections tend to have smaller RTTs than their IPv4 counterparts, but suffer higher packet loss rate at the same time. We also notice that tunneled paths do not show notable performance degradation compared with native paths. To our best knowledge, this paper is the first performance study based on both large scale TCP and ICMP traffic measurement in real IPv6 Internet.
在IPv6标准和测试平台部署方面已经做了很多工作。然而,人们对真正的IPv6互联网的性能知之甚少,尤其是从终端用户的角度来看。在本文中,我们提出了从CERNET进行的当前IPv6性能的测量研究。我们研究了来自44个国家的936个IPv4/IPv6双栈Web服务器的585,680个包级跟踪,收集了133340万个数据包。我们提出了一个全面的性能比较IPv6和IPv4,包括连通性,丢包率,往返时间等。我们的测量结果表明,IPv6连接往往比IPv4连接具有更小的rtt,但同时遭受更高的丢包率。我们还注意到,与本地路径相比,隧道路径没有表现出明显的性能下降。据我们所知,本文是第一个在真实IPv6互联网中基于大规模TCP和ICMP流量测量的性能研究。
{"title":"Understanding current IPv6 performance: a measurement study","authors":"Yi Wang, Shaozhi Ye, Xing Li","doi":"10.1109/ISCC.2005.151","DOIUrl":"https://doi.org/10.1109/ISCC.2005.151","url":null,"abstract":"Much work has been done on IPv6 standards and testbeds deployment. However, little is known about the performance of the real IPv6 Internet, especially from the perspective of end users. In this paper, we present a measurement study of current IPv6 performance conducted from CERNET. We study 585, 680 packet-level traces with 133,340 million packets collected from 936 IPv4/IPv6 dual-stack Web servers located in 44 countries. We present a comprehensive performance comparison of IPv6 and IPv4, including connectivity, packet loss rate, round-trip time, etc. Our measurement results show that IPv6 connections tend to have smaller RTTs than their IPv4 counterparts, but suffer higher packet loss rate at the same time. We also notice that tunneled paths do not show notable performance degradation compared with native paths. To our best knowledge, this paper is the first performance study based on both large scale TCP and ICMP traffic measurement in real IPv6 Internet.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116059451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
A distributed spatial reuse (DSR) MAC protocol for IEEE 802.11 ad-hoc wireless LANs 用于IEEE 802.11自组织无线局域网的分布式空间复用(DSR) MAC协议
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.9
K. Shih, Chien-Min Chou, Mu-Ying Lu, Szu-Min Chen
The paper proposes a distributed spatial reuse (DSR) MAC protocol for IEEE 802.11 ad-hoc wireless LANs (WLANs) to increase bandwidth utilization and reduce power consumption. Through power control, the communications that do not interfere with each other can transmit simultaneously. Therefore, the overall efficiency and effectiveness of IEEE 802.11 ad-hoc WLANs can be enhanced. DSR allows the maximum number of interference-free communication pairs to transmit in parallel without collisions. According to the experiment results, DSR is much better than traditional WLAN protocol, IEEE 802.11 DCF, and the related work. The protocol indeed can effectively enhance the overall WLANs efficiency.
本文提出了一种用于IEEE 802.11自组织无线局域网(wlan)的分布式空间复用(DSR) MAC协议,以提高带宽利用率和降低功耗。通过功率控制,可以实现互不干扰的通信同时传输。因此,可以提高IEEE 802.11 ad-hoc wlan的整体效率和有效性。DSR允许最大数量的无干扰通信对并行传输而不发生碰撞。实验结果表明,DSR比传统的WLAN协议、IEEE 802.11 DCF以及相关工作都要好得多。该协议确实可以有效地提高wlan的整体效率。
{"title":"A distributed spatial reuse (DSR) MAC protocol for IEEE 802.11 ad-hoc wireless LANs","authors":"K. Shih, Chien-Min Chou, Mu-Ying Lu, Szu-Min Chen","doi":"10.1109/ISCC.2005.9","DOIUrl":"https://doi.org/10.1109/ISCC.2005.9","url":null,"abstract":"The paper proposes a distributed spatial reuse (DSR) MAC protocol for IEEE 802.11 ad-hoc wireless LANs (WLANs) to increase bandwidth utilization and reduce power consumption. Through power control, the communications that do not interfere with each other can transmit simultaneously. Therefore, the overall efficiency and effectiveness of IEEE 802.11 ad-hoc WLANs can be enhanced. DSR allows the maximum number of interference-free communication pairs to transmit in parallel without collisions. According to the experiment results, DSR is much better than traditional WLAN protocol, IEEE 802.11 DCF, and the related work. The protocol indeed can effectively enhance the overall WLANs efficiency.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116668642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Capacity assignment for video traffic in multiservice IP networks with statistical QoS guarantees 具有统计QoS保证的多业务IP网络视频流量容量分配
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.41
S. Sharafeddine, Z. Dawy
Transport of compressed video is expected to pervade computer networks in the near future. Video is commonly encoded in variable bit rate traffic to improve video quality and reduce encoding delays and yet to make efficient use of the available capacity using statistical multiplexing. Variable bit rate coded video imposes a real challenge to network planners who aim to evaluate its necessary capacity share. In this paper, we present a dimensioning model tailored especially for variable bit rate video transmission over IP networks taking the network delay into account unlike existing dimensioning models. We investigate this new model in terms of different system parameters.
预计在不久的将来,压缩视频的传输将遍及计算机网络。视频通常在可变比特率流量中编码,以提高视频质量和减少编码延迟,并通过统计多路复用有效利用可用容量。可变比特率编码视频给网络规划者提出了一个真正的挑战,他们的目标是评估其必要的容量共享。在本文中,我们提出了一个专门为IP网络上的可变比特率视频传输量身定制的维度模型,与现有的维度模型不同,该模型考虑了网络延迟。我们根据不同的系统参数来研究这个新模型。
{"title":"Capacity assignment for video traffic in multiservice IP networks with statistical QoS guarantees","authors":"S. Sharafeddine, Z. Dawy","doi":"10.1109/ISCC.2005.41","DOIUrl":"https://doi.org/10.1109/ISCC.2005.41","url":null,"abstract":"Transport of compressed video is expected to pervade computer networks in the near future. Video is commonly encoded in variable bit rate traffic to improve video quality and reduce encoding delays and yet to make efficient use of the available capacity using statistical multiplexing. Variable bit rate coded video imposes a real challenge to network planners who aim to evaluate its necessary capacity share. In this paper, we present a dimensioning model tailored especially for variable bit rate video transmission over IP networks taking the network delay into account unlike existing dimensioning models. We investigate this new model in terms of different system parameters.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116723499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new approach for computation result protection in the mobile agent paradigm 移动代理范式中计算结果保护的一种新方法
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.14
Suphithat Songsiri
One of the primary security challenges of the mobile agent paradigm is that of protecting the result of computation carried out by a mobile agent against an attack by a malicious host. There are various proposals that appeared in the literature. Beside their benefits, a well-known vulnerability of their technique is the collusion attack. The collusion attack mainly considered in this paper is the two colluders truncation attack, which could be engendered by the leakage of a one time private key. This paper demonstrates the prevention of the two colluders truncation attack, the detection of other forms of collusion attacks, and the identification of the malicious host. The proposed protocol incorporates and extends the notion of publicly verified chained signature (G. Karjoth, et al., 1998) by using a list of route information and a trusted third party to generate a one time public/private key pair.
移动代理范式的主要安全挑战之一是保护移动代理执行的计算结果免受恶意主机的攻击。文献中出现了各种各样的建议。除了它们的好处之外,它们技术的一个众所周知的弱点是串通攻击。本文主要考虑的合谋攻击是由一次性私钥泄露导致的双合谋截断攻击。本文演示了双合谋截断攻击的防范,其他形式的合谋攻击的检测,以及恶意主机的识别。提议的协议通过使用路由信息列表和可信第三方生成一次性公钥/私钥对,合并并扩展了公开验证链签名的概念(G. Karjoth等人,1998)。
{"title":"A new approach for computation result protection in the mobile agent paradigm","authors":"Suphithat Songsiri","doi":"10.1109/ISCC.2005.14","DOIUrl":"https://doi.org/10.1109/ISCC.2005.14","url":null,"abstract":"One of the primary security challenges of the mobile agent paradigm is that of protecting the result of computation carried out by a mobile agent against an attack by a malicious host. There are various proposals that appeared in the literature. Beside their benefits, a well-known vulnerability of their technique is the collusion attack. The collusion attack mainly considered in this paper is the two colluders truncation attack, which could be engendered by the leakage of a one time private key. This paper demonstrates the prevention of the two colluders truncation attack, the detection of other forms of collusion attacks, and the identification of the malicious host. The proposed protocol incorporates and extends the notion of publicly verified chained signature (G. Karjoth, et al., 1998) by using a list of route information and a trusted third party to generate a one time public/private key pair.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125619170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Server placement algorithms for the construction of a QoS enabled gaming infrastructure 用于构建支持QoS的游戏基础设施的服务器放置算法
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.137
Bart De Vleeschauwer, F. Turck, B. Dhoedt, P. Demeester
With the deployment of broadband Internet access, a new set of applications that is becoming more and more popular are highly interactive services such as online gaming. When the delay experienced in an online game passes a certain threshold, the quality of service (QoS) degrades enormously, as a result the clients are no longer satisfied and might decide to leave the game or to cancel the subscription. Thus, delay is critical to the success of this type of service. Network delay is a result of the way the data is distributed between the players. In this paper we propose the use of a set of game servers. These servers not only play the role of a traditional game server but also form an overlay network which can be used as an application layer routing infrastructure, allowing us to route along low delay paths and thereby increasing the QoS of the game. We study algorithms that determine the ideal location of the servers in a network and look at the performance of the resulting overlay networks in terms of end-to-end delay and the relationship between the number of servers in the overlay network and the offered QoS. We also compare our distributed architecture with both a single server and a peer-to-peer architecture.
随着宽带互联网接入的普及,网络游戏等交互性很强的服务也越来越受到人们的欢迎。当在线游戏中的延迟超过一定阈值时,服务质量(QoS)就会大大降低,导致客户端不再满意,并可能决定离开游戏或取消订阅。因此,延迟对此类服务的成功至关重要。网络延迟是数据在玩家之间分配的方式的结果。在本文中,我们建议使用一套游戏服务器。这些服务器不仅扮演传统游戏服务器的角色,而且还形成了一个覆盖网络,可以用作应用层路由基础设施,允许我们沿着低延迟路径路由,从而提高游戏的QoS。我们研究了确定网络中服务器理想位置的算法,并根据端到端延迟以及覆盖网络中服务器数量与提供的QoS之间的关系,研究了由此产生的覆盖网络的性能。我们还将分布式体系结构与单服务器和点对点体系结构进行了比较。
{"title":"Server placement algorithms for the construction of a QoS enabled gaming infrastructure","authors":"Bart De Vleeschauwer, F. Turck, B. Dhoedt, P. Demeester","doi":"10.1109/ISCC.2005.137","DOIUrl":"https://doi.org/10.1109/ISCC.2005.137","url":null,"abstract":"With the deployment of broadband Internet access, a new set of applications that is becoming more and more popular are highly interactive services such as online gaming. When the delay experienced in an online game passes a certain threshold, the quality of service (QoS) degrades enormously, as a result the clients are no longer satisfied and might decide to leave the game or to cancel the subscription. Thus, delay is critical to the success of this type of service. Network delay is a result of the way the data is distributed between the players. In this paper we propose the use of a set of game servers. These servers not only play the role of a traditional game server but also form an overlay network which can be used as an application layer routing infrastructure, allowing us to route along low delay paths and thereby increasing the QoS of the game. We study algorithms that determine the ideal location of the servers in a network and look at the performance of the resulting overlay networks in terms of end-to-end delay and the relationship between the number of servers in the overlay network and the offered QoS. We also compare our distributed architecture with both a single server and a peer-to-peer architecture.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122467768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Call admission control in hierarchical mobile networks 分层移动网络中的呼叫允许控制
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.40
Dario Bruneo, L. Paladina, M. Paone, A. Puliafito
Mobile networks are requested to provide several added value services with different QoS levels. An efficient call admission control (CAC) is one of the strategic components that a network management policy requires, which defines how to allocate network resources to roaming and new users. We assume a hierarchical network architecture constituted of several cellular IP regions which may communicate each other accessing the Internet through a Mobile IP protocol. In such scenario, we demonstrate the importance of CAC not only in the ingress wireless points, but in the wired network too. An integrated approach to CAC is then proposed whose advantages are shown through simulation analysis.
移动网络被要求提供多种具有不同QoS级别的增值业务。有效的call admission control (CAC)是网络管理策略的一个重要组成部分,它定义了如何将网络资源分配给漫游用户和新用户。我们假设一个分层的网络体系结构,由几个蜂窝IP区域组成,这些区域可以通过移动IP协议访问互联网相互通信。在这种情况下,我们证明了CAC不仅在入口无线点,而且在有线网络中的重要性。在此基础上,提出了一种集成的CAC方法,并通过仿真分析证明了该方法的优越性。
{"title":"Call admission control in hierarchical mobile networks","authors":"Dario Bruneo, L. Paladina, M. Paone, A. Puliafito","doi":"10.1109/ISCC.2005.40","DOIUrl":"https://doi.org/10.1109/ISCC.2005.40","url":null,"abstract":"Mobile networks are requested to provide several added value services with different QoS levels. An efficient call admission control (CAC) is one of the strategic components that a network management policy requires, which defines how to allocate network resources to roaming and new users. We assume a hierarchical network architecture constituted of several cellular IP regions which may communicate each other accessing the Internet through a Mobile IP protocol. In such scenario, we demonstrate the importance of CAC not only in the ingress wireless points, but in the wired network too. An integrated approach to CAC is then proposed whose advantages are shown through simulation analysis.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132692599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An empirical study of the congestion response of RealPlayer, Windows MediaPlayer and Quicktime RealPlayer、Windows MediaPlayer和Quicktime的拥塞响应实证研究
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.25
Sven Hessler, M. Welzl
Properly reacting to congestion is known to be a requirement for maintaining the stability of the Internet; in addition, UDP based applications should do so for their own sake if they are delay- or loss-sensitive. We measured the responsiveness of the three popular streaming media applications RealPlayer, Windows MediaPIayer and Quicktime with a varying amount of cross traffic and present a comparison of the results.
众所周知,对拥塞作出适当反应是维护互联网稳定的必要条件;此外,如果基于UDP的应用程序对延迟或丢失敏感,则应该这样做。我们测量了三个流行的流媒体应用程序RealPlayer, Windows MediaPIayer和Quicktime在不同数量的交叉流量下的响应性,并给出了结果的比较。
{"title":"An empirical study of the congestion response of RealPlayer, Windows MediaPlayer and Quicktime","authors":"Sven Hessler, M. Welzl","doi":"10.1109/ISCC.2005.25","DOIUrl":"https://doi.org/10.1109/ISCC.2005.25","url":null,"abstract":"Properly reacting to congestion is known to be a requirement for maintaining the stability of the Internet; in addition, UDP based applications should do so for their own sake if they are delay- or loss-sensitive. We measured the responsiveness of the three popular streaming media applications RealPlayer, Windows MediaPIayer and Quicktime with a varying amount of cross traffic and present a comparison of the results.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
10th IEEE Symposium on Computers and Communications (ISCC'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1