Pub Date : 2003-03-27DOI: 10.1109/AINA.2003.1192858
D. Nakamura, Noriki Uchida, Hideaki Asahi, Kazuo Takahata, K. Hashimoto, Y. Shibata
So far, we have investigated a unified wide area disaster information network (WDN) using the Internet based on the combination of both wired and wireless networks. In this paper, we introduce resource management system (RMS) for WDN to recover from system failure with serious damage when the disaster happened. The system configuration and architecture are described and their functions are precisely explained. A prototyped system based on our suggested WDN was built to demonstrate its functionality.
{"title":"Wide area disaster information network and its resource management system","authors":"D. Nakamura, Noriki Uchida, Hideaki Asahi, Kazuo Takahata, K. Hashimoto, Y. Shibata","doi":"10.1109/AINA.2003.1192858","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192858","url":null,"abstract":"So far, we have investigated a unified wide area disaster information network (WDN) using the Internet based on the combination of both wired and wireless networks. In this paper, we introduce resource management system (RMS) for WDN to recover from system failure with serious damage when the disaster happened. The system configuration and architecture are described and their functions are precisely explained. A prototyped system based on our suggested WDN was built to demonstrate its functionality.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130745828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-03-27DOI: 10.1109/AINA.2003.1193003
Liqiang Zhao, Changxin Fan
The paper presents a multi-cell dynamic reservation (MCDR) protocol to support voice with CBR, video with VBR and data with ABR over IEEE 802.11 Ad hoc wireless LAN. The quality of real-time service (voice and video) can be guaranteed by reserving cell. Moreover, MCDR defines multi-cell respectively for CBR and VBR real-time services to meet their different requirement on QoS. A suitable analytical approach is proposed in order to evaluate the performance of real-time traffic. Simulations show that MCDR is able to provide almost 90% channel utilization, low packet loss due to delay exceeded, and low jitter for voice.
{"title":"A multi-cell dynamic reservation protocol for multimedia over IEEE 802.11 ad hoc WLAN","authors":"Liqiang Zhao, Changxin Fan","doi":"10.1109/AINA.2003.1193003","DOIUrl":"https://doi.org/10.1109/AINA.2003.1193003","url":null,"abstract":"The paper presents a multi-cell dynamic reservation (MCDR) protocol to support voice with CBR, video with VBR and data with ABR over IEEE 802.11 Ad hoc wireless LAN. The quality of real-time service (voice and video) can be guaranteed by reserving cell. Moreover, MCDR defines multi-cell respectively for CBR and VBR real-time services to meet their different requirement on QoS. A suitable analytical approach is proposed in order to evaluate the performance of real-time traffic. Simulations show that MCDR is able to provide almost 90% channel utilization, low packet loss due to delay exceeded, and low jitter for voice.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130879037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-03-27DOI: 10.1109/AINA.2003.1192952
S. Osada, H. Higaki
In order to achieve fault-tolerant distributed systems, checkpoint-recovery has been researched and many protocols have been designed. A global checkpoint taken by the protocols have to be consistent. In conventional network applications, a global checkpoint is consistent if there is no inconsistent message in any communication channel. However, in multimedia network applications, there are different requirements for time-constrained failure-free execution and large-size message transmissions where lost of a part of the message is acceptable by applications. This paper proposes novel criteria, consistency and duplexity for global checkpoints in multimedia network applications.
{"title":"Multimedia checkpoint protocol with lower recovery overhead","authors":"S. Osada, H. Higaki","doi":"10.1109/AINA.2003.1192952","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192952","url":null,"abstract":"In order to achieve fault-tolerant distributed systems, checkpoint-recovery has been researched and many protocols have been designed. A global checkpoint taken by the protocols have to be consistent. In conventional network applications, a global checkpoint is consistent if there is no inconsistent message in any communication channel. However, in multimedia network applications, there are different requirements for time-constrained failure-free execution and large-size message transmissions where lost of a part of the message is acceptable by applications. This paper proposes novel criteria, consistency and duplexity for global checkpoints in multimedia network applications.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131148931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-03-27DOI: 10.1109/AINA.2003.1192869
Wang Changjie, Chen Xiaofeng, Wang Yumin
Software agent technology is starting to create a series of new possibilities for the area of electronic commerce over Internet. In this paper, we intend to apply software agent technology along with cryptographic technology to automate and secure online auction over Internet. Furthermore, we proposed a novel implementing protocol for agent-based secure multi-rounds online auction with sealed bits, which not only retains the agent's mobility and flexibility, but also takes secure measures to prevent the attacks from malicious bidders.
{"title":"An agent-based multi rounds online auction protocol with sealed bids","authors":"Wang Changjie, Chen Xiaofeng, Wang Yumin","doi":"10.1109/AINA.2003.1192869","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192869","url":null,"abstract":"Software agent technology is starting to create a series of new possibilities for the area of electronic commerce over Internet. In this paper, we intend to apply software agent technology along with cryptographic technology to automate and secure online auction over Internet. Furthermore, we proposed a novel implementing protocol for agent-based secure multi-rounds online auction with sealed bits, which not only retains the agent's mobility and flexibility, but also takes secure measures to prevent the attacks from malicious bidders.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116893060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-03-27DOI: 10.1109/AINA.2003.1192994
S. Ohzahata, S. Kimura, Y. Ebihara
In this paper we propose an adaptive handoff algorithm based on the "threshold-with-hysteresis". In general, such handoff algorithms are proposed to improve the handoff decision for a specific user Our algorithm aims to provide effective network utilization for all users. To realize the handoff decision based on the mobile nodes, the agent advertisements include information of the congestion status at the base station in the algorithm. For implementing the algorithm to Mobile IP, we also propose the system architecture with a QoS mechanism. The simulation experiment shows that our proposed algorithm improves the average handoff blocking rate than the previous method in spite of low overhead of our expansion.
{"title":"Adaptive handoff algorithm for efficient network resource utilization","authors":"S. Ohzahata, S. Kimura, Y. Ebihara","doi":"10.1109/AINA.2003.1192994","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192994","url":null,"abstract":"In this paper we propose an adaptive handoff algorithm based on the \"threshold-with-hysteresis\". In general, such handoff algorithms are proposed to improve the handoff decision for a specific user Our algorithm aims to provide effective network utilization for all users. To realize the handoff decision based on the mobile nodes, the agent advertisements include information of the congestion status at the base station in the algorithm. For implementing the algorithm to Mobile IP, we also propose the system architecture with a QoS mechanism. The simulation experiment shows that our proposed algorithm improves the average handoff blocking rate than the previous method in spite of low overhead of our expansion.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115497586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-03-27DOI: 10.1109/AINA.2003.1192875
Haruhiko Hiramatsu, Y. Kidawara, K. Uehara
Soon all people will have mobile terminals and they will collect information based on their interests and purposes in usual situations. We propose the method of information delivery for communications in temporary groups which are built in mobile environments in this paper. In our proposed method, profiles of a temporary group are automatically generated from contents which are stored into mobile terminals, and then, information is delivered to a temporary group based on profiles. It is possible to support communication in mobile environments by, using our proposed method.
{"title":"Information delivery system for communication in mobile environment","authors":"Haruhiko Hiramatsu, Y. Kidawara, K. Uehara","doi":"10.1109/AINA.2003.1192875","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192875","url":null,"abstract":"Soon all people will have mobile terminals and they will collect information based on their interests and purposes in usual situations. We propose the method of information delivery for communications in temporary groups which are built in mobile environments in this paper. In our proposed method, profiles of a temporary group are automatically generated from contents which are stored into mobile terminals, and then, information is delivered to a temporary group based on profiles. It is possible to support communication in mobile environments by, using our proposed method.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123183053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-03-27DOI: 10.1109/AINA.2003.1192919
Yukitaka Kusumura, Y. Hijikata, S. Nishida
Net auctions have been widely utilized with the recent development of the Internet. However it has a problem that there are too many items for bidders to select the most suitable one. We aim at supporting bidders on net auctions by automatically extracting the information of the item's features from Web pages in net auctions and generating a table containing the features of some items for comparison. But because descriptions are not uniform in net auctions, there are two problems in extracting the features. The first problem is that there are some formats. The second problem is that the keywords of features are sometimes omitted. We proposed the solutions to the problems. The solution to the first problem is to distinguish the format type from tables, items and sentences, and extract the feature values in the most suitable way. The solution to the second problem is to learn the keywords in extracting from the descriptions with the keywords. And after that, the keywords are used in extracting from the descriptions without keywords. And we constructed the system which collects the information of items, extracts their features from their text information by text mining methods and generates the table containing extracted features.
{"title":"Extracting fixed information from miscellaneous documents on net auction","authors":"Yukitaka Kusumura, Y. Hijikata, S. Nishida","doi":"10.1109/AINA.2003.1192919","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192919","url":null,"abstract":"Net auctions have been widely utilized with the recent development of the Internet. However it has a problem that there are too many items for bidders to select the most suitable one. We aim at supporting bidders on net auctions by automatically extracting the information of the item's features from Web pages in net auctions and generating a table containing the features of some items for comparison. But because descriptions are not uniform in net auctions, there are two problems in extracting the features. The first problem is that there are some formats. The second problem is that the keywords of features are sometimes omitted. We proposed the solutions to the problems. The solution to the first problem is to distinguish the format type from tables, items and sentences, and extract the feature values in the most suitable way. The solution to the second problem is to learn the keywords in extracting from the descriptions with the keywords. And after that, the keywords are used in extracting from the descriptions without keywords. And we constructed the system which collects the information of items, extracts their features from their text information by text mining methods and generates the table containing extracted features.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114946969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-03-27DOI: 10.1109/AINA.2003.1192989
M. Aoki, M. Saito, H. Aida, H. Tokuda
Mobile ad hoc networks (MANETs) are temporarily constructed by mobile hosts in the absence of established infrastructures. Such networks can constitute a base for human cooperative works as well as for communications between information systems. However, there has not been sufficient work of name resolution scheme suitable for MANETs after assignment of IP addresses. In this paper, we propose a name resolution system called Autonomous Name Resolution Scheme (ANARCH). ANARCH provides a node with a unique user-oriented name and relieves users and their applications from the necessity of identifying the network addresses (i.e., IP addresses) of destination nodes. ANARCH exchanges control messages merely between nodes in the one-hop reach area. However, it resolves names beyond the one-hop reach area, namely, it adapts to a multi-hop function of MANETs. We have designed and implemented ANARCH on FreeBSD, and evaluated the performance in a MANET system built with PCs running the Dynamic Source Routing (DSR) protocol. In our experimental results, ANARCH exhibited effective name resolution in a practical time while resolving conflicting names.
{"title":"ANARCH: a name resolution scheme for mobile ad hoc networks","authors":"M. Aoki, M. Saito, H. Aida, H. Tokuda","doi":"10.1109/AINA.2003.1192989","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192989","url":null,"abstract":"Mobile ad hoc networks (MANETs) are temporarily constructed by mobile hosts in the absence of established infrastructures. Such networks can constitute a base for human cooperative works as well as for communications between information systems. However, there has not been sufficient work of name resolution scheme suitable for MANETs after assignment of IP addresses. In this paper, we propose a name resolution system called Autonomous Name Resolution Scheme (ANARCH). ANARCH provides a node with a unique user-oriented name and relieves users and their applications from the necessity of identifying the network addresses (i.e., IP addresses) of destination nodes. ANARCH exchanges control messages merely between nodes in the one-hop reach area. However, it resolves names beyond the one-hop reach area, namely, it adapts to a multi-hop function of MANETs. We have designed and implemented ANARCH on FreeBSD, and evaluated the performance in a MANET system built with PCs running the Dynamic Source Routing (DSR) protocol. In our experimental results, ANARCH exhibited effective name resolution in a practical time while resolving conflicting names.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129405252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-03-27DOI: 10.1109/AINA.2003.1192867
Robert R. Roxas, N. Mirenkov
A visual approach for specifying input/output (I/O) operations and watching them in different modes is presented. The discussion includes a brief overview of our system and an example of specifying I/O operations. In our approach, we allow a programmer to view a software component in any of the six different groups of views related to the different features of a component. Each group is supported by its own subsystem. One can make a part of a programming work in any of these subsystems. To make this work, each subsystem provides a few different modes. For example, the specification of I/O operations is just based on one of the subsystems and has three modes discussed in this paper. A special interface panel is provided for each mode and all specifications or programming will be done by mouse click operations only.
{"title":"Visual input/output specification in different modes","authors":"Robert R. Roxas, N. Mirenkov","doi":"10.1109/AINA.2003.1192867","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192867","url":null,"abstract":"A visual approach for specifying input/output (I/O) operations and watching them in different modes is presented. The discussion includes a brief overview of our system and an example of specifying I/O operations. In our approach, we allow a programmer to view a software component in any of the six different groups of views related to the different features of a component. Each group is supported by its own subsystem. One can make a part of a programming work in any of these subsystems. To make this work, each subsystem provides a few different modes. For example, the specification of I/O operations is just based on one of the subsystems and has three modes discussed in this paper. A special interface panel is provided for each mode and all specifications or programming will be done by mouse click operations only.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116405982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-03-27DOI: 10.1109/AINA.2003.1192971
J. Stevens, S. Saniepour
The exponential growth of Internet traffic has made public servers increasingly vulnerable to unauthorized accesses and intrusions. So far the focus of most studies of this problem has been on either blocking unused ports (fire-walling) or detecting attacks with an intrusion detection system (IDS). In this paper we introduce the design and implementation of SecureDirect, which is an attempt at addressing the problem of intrusion prevention by combining an IDS with a stateful load balancer SecureDirect is a real time load balancer that distinguishes between traffic coming from "good" clients and traffic originating from attackers. Based on this, traffic from an identified attacker is redirected to an alternative server where damage can be mitigated. The advantage of this system is that it blocks intrusions in a manner transparent to the attacker and allows for observation and investigation of attacks in order to enable the administrator to take appropriate action. We also suggest possible uses for this type of system, and then present the results of a series of stress tests against our implementation of the idea.
{"title":"SecureDirect: proactive security through content based traffic control","authors":"J. Stevens, S. Saniepour","doi":"10.1109/AINA.2003.1192971","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192971","url":null,"abstract":"The exponential growth of Internet traffic has made public servers increasingly vulnerable to unauthorized accesses and intrusions. So far the focus of most studies of this problem has been on either blocking unused ports (fire-walling) or detecting attacks with an intrusion detection system (IDS). In this paper we introduce the design and implementation of SecureDirect, which is an attempt at addressing the problem of intrusion prevention by combining an IDS with a stateful load balancer SecureDirect is a real time load balancer that distinguishes between traffic coming from \"good\" clients and traffic originating from attackers. Based on this, traffic from an identified attacker is redirected to an alternative server where damage can be mitigated. The advantage of this system is that it blocks intrusions in a manner transparent to the attacker and allows for observation and investigation of attacks in order to enable the administrator to take appropriate action. We also suggest possible uses for this type of system, and then present the results of a series of stress tests against our implementation of the idea.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122718479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}