Information Networking. Towards Ubiquitous Networking and Services International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers

This volume contains the set of revised selected papers presented at the 21st International Conference on Information Networking (ICOIN 2007), which was held in Estoril, Portugal, January 23-25, 2007. The conference series started under the name of Joint Workshop on Computer Communications, in 1986....

Full description

Saved in:
Bibliographic Details
Main Authors Hutchison, David, Kanade, Takeo, Kittler, Josef
Format eBook
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin / Heidelberg 2008
Springer
Edition1
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783540895237
354089523X

Cover

Table of Contents:
  • Geocasting in Wireless Ad Hoc Networks with Guaranteed Delivery* -- Small-World Peer-to-Peer for Resource Discovery -- Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution -- Network Architecture and Protocols for -- BGP/MPLS Based Mobile VPN -- Migration toward DiffServ-Enabled Broadband Access Networks -- Integration of Broadband and Broadcasting Wireless Technologies at the UMTS Radio Access Level -- A Mobility-Aware Resource Reservation Mechanism for the Future Generation Network Environment* -- Proactive Internet Gateway Discovery Mechanisms for Load-Balanced Internet Connectivity in MANET -- An Effective Data Dissemination in Vehicular Ad-Hoc Network -- Packet Forwarding Based on Reachability Information for VANETs* -- Balanced Multipath Source Routing -- Design and Evaluation of a Multi-class Based Multicast Routing Protocol -- Design and Test of the Multicast Session Management Protocol -- Providing Full QoS with 2 VCs in High-Speed Switches -- Fast Re-establishment of QoS with NSIS Protocols in Mobile Networks -- A Probabilistic Approach for Fully Decentralized Resource Management for Grid Systems -- ATS-DA: Adaptive Timeout Scheduling for Data Aggregation in Wireless Sensor Networks -- Sensor Network Deployment Using Circle Packings* -- TSD: Tiny Service Discovery -- A Fault-Tolerant Event Boundary Detection Algorithm in Sensor Networks -- Collision-Free Downlink Scheduling in the IEEE 802.15.4 Network -- Successful Cooperation between Backoff Exponential Mechanisms to Enhance IEEE 802.11 Networks -- Knowledge-Based Exponential Backoff Scheme in IEEE 802.15.4 MAC -- Dynamic Backoff Time Adjustment with Considering Channel Condition for IEEE 802.11e EDCA -- A Framework for Detecting Internet Applications -- Transport Layer Identification of Skype Traffic -- Inter-Domain Access Volume Model: Ranking Autonomous Systems
  • On the Use of Manchester Violation Test in Detecting Collision -- Dynamic Routing Algorithm for Asymmetric Link in Mobile Ad Hoc Networks* -- Dynamic Power Efficient QoS Routing Algorithm for Multimedia Services over Mobile Ad Hoc Networks* -- Two-Hops Neighbor-Aware Routing Protocol in Mobile Ad Hoc Networks -- H2O: Hierarchically Optimized Hybrid Routing Strategies for Multihop Wireless Networks -- Anomaly Detection of Hostile Traffic Based on Network Traffic Distributions -- Investigation of Secure Media Streaming over Wireless Access Network -- A Reliable Multicast Transport Protocol for Communicating Real- Time Distributed Objects* -- Achieving Proportional Delay and Loss Differentiation in a Wireless Network with a Multi-state Link -- Directional Flooding Scheme with Data Aggregation for Energy-Efficient Wireless Sensor Networks -- TCP with Explicit Handoff Notification for a Seamless Vertical Handoff -- Author Index
  • Intro -- Preface -- Conference Committees -- Table of Contents -- Signaling-Embedded Short Preamble MAC for Multihop Wireless Sensor Networks -- Data Diffusion Considering Target Mobility in Large-Scale Wireless Sensor Network -- Improving the Performance of Optical Burst-Switched Networks with Limited- Range Wavelength Conversion through Traffic Engineering in the Wavelength Domain -- On the Early Release of Burst-Control Packets in Optical Burst-Switched Networks -- 1+X: A Novel Protection Scheme for Optical Burst Switched Networks -- Satisfaction-Based Handover Control Algorithm for Multimedia Services in Heterogeneous Wireless Networks -- Adaptive Qos-Aware Wireless Packet Scheduling in OFDMA Broadband Wireless Systems -- Scheduled Uplink Packet Transmission Schemes for Voice Traffic in OFDMA-Based Wireless Communication Systems -- Cognitive Radio MAC Protocol for Hidden Incumbent System Detection*,** -- De-triangulation Optimal Solutions for Mobility Scenarios with Asymmetric Links -- Analysis of Hierarchical Paging -- Wireless Loss Detection for TCP Friendly Rate Control Algorithm in Wireless Networks -- Rate-Adaptive TCP Spoofing with Segment Aggregation over Asymmetric Long Delay Links -- Effects of the Number of Hops on TCP Performance in Multi-hop Cellular Systems -- Traffic-Aware MAC Protocol Using Adaptive Duty Cycle for Wireless Sensor Networks -- mTBCP-Based Overlay Construction and Evaluation for Broadcasting Mini- system -- A Network I/O Architecture for Terminal-Initiated Traffics in an Ubiquitous Service Server -- Analyzing and Modeling Router-Level Internet Topology -- Does the Average Path Length Grow in the Internet? -- An Implicit Cluster-Based Overlay Multicast Protocol Exploiting Tree Division for Mobile Ad Hoc Networks -- An Efficient Address Assignment Mechanism for Mobile Ad-Hoc Networks
  • Achieving Network Efficient Stateful Anycast Communications -- Scalable RTLS: Design and Implementation of the Scalable Real Time Locating System Using Active RFID -- Collision-Resilient Symbol Based Extension of Query Tree Protocol for Fast RFID Tag Identification -- Performance Study of Anti-collision Algorithms for EPC-C1 Gen2 RFID Protocol -- A Lightweight Management System for a Military Ad Hoc Network -- Efficient Partitioning Strategies for Distributed Web Crawling -- A Secure Message Percolation Scheme for Wireless Sensor Network* -- Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks -- On Modeling Counteraction against TCP SYN Flooding -- Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations -- Reducing Energy Consumption through the Union of Disjoint Set Forests Algorithm in Sensor Networks -- Packet Delay and Energy Consumption Based on Markov Chain Model of the Frame- Based S-MAC Protocol under Unsaturated Conditions -- A Novel Local-Centric Mobility System -- An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks -- An Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks -- Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks -- A MAP Changing Scheme Using Virtual Domain for Mobile IPv6 Networks -- Proposal and Evaluation of a Network Construction Method for a Scalable P2P Video Conferencing System -- H.264 Video Broadcast Scheme Using Feedback Information over IEEE 802.11e WLAN -- Quality Adaptation with Temporal Scalability for Adaptive Video Streaming -- Simple and Efficient Fast Staggered Data Broadcasting Scheme for Popular Video Services -- An Enhanced Bandwidth Allocation Algorithms for QoS Provision in IEEE 802.16 BWA -- Robust Transmission Power and Position Estimation in Cognitive Radio
  • Comparisons on Complexities and Overhead of Mobile VPN Access Mechanisms
  • Intro -- Title Page -- Preface -- Organization -- Table of Contents -- Part I -- Signaling-Embedded Short Preamble MAC for Multihop Wireless Sensor Networks -- Introduction -- Design of SESP-MAC -- Basic Operation of SESP-MAC -- Avoiding Receiving Redundant Flooded-Messages -- Reducing Control Packet Overhead -- Other Advantages -- Considerations for Implementation -- Performance Analysis -- Conclusion -- References -- Data Diffusion Considering Target Mobility in Large-Scale Wireless Sensor Network -- Introduction -- TTDD -- DDTM -- Terminology -- Message and Cache Table -- Operation of DDTM -- Performance Evaluation -- Model and Notations -- Target Mobility -- Scalability -- Conclusion -- References -- Improving the Performance of Optical Burst-Switched Networks with Limited-Range Wavelength Conversion through Traffic Engineering in the Wavelength Domain -- Introduction -- OBS Network Architecture and Enabling Technologies -- Traffic Engineering in the Wavelength Domain for Minimizing Wavelength Contention in OBS Networks with LRWCs -- Results and Discussion -- Conclusions -- References -- On the Early Release of Burst-Control Packets in Optical Burst-Switched Networks -- Introduction -- Statistical Analysis of the Burst-Release Time -- Problem Statement -- Probability Distribution of the Burst-Release Time -- Case 1: Over-Reservation of Resources -- Case 2: Waiting Time Distribution -- Experiments -- Validation -- Numerical Example -- Summary and Conclusions -- References -- 1+X: A Novel Protection Scheme for Optical Burst Switched Networks -- Introduction -- Related Work -- 1+X Protection -- Numerical Analysis -- Conclusions -- References -- Satisfaction-Based Handover Control Algorithm for Multimedia Services in Heterogeneous Wireless Networks -- Introduction -- The Architecture of Proposed Algorithm -- Network Architecture
  • Buffer Utilization, Control Load and Data Load Results -- Conclusions -- References -- Analysis of Hierarchical Paging -- Introduction -- Terminology -- Hierarchical Mobility Management -- Paging -- Related Work -- Hierarchical Paging -- The Approach -- Mechanisms -- Analytical Model -- Network Model -- Mobility Model -- Markov-Model -- Analysis -- The Effect of k -- Flat vs. Hierarchical Paging -- The Effect of L -- The Effect of p -- Conclusions and Future Work -- References -- Wireless Loss Detection for TCP Friendly Rate Control Algorithm in Wireless Networks -- Introduction -- Wireless Loss Detection Algorithms -- Biaz Algorithm -- ZigZag Algorithm -- WLD -- Experiments and Analysis -- Configuration of Experiments -- Experiments Results and Analysis -- Conclusions and Future Work -- References -- Rate-Adaptive TCP Spoofing with Segment Aggregation over Asymmetric Long Delay Links -- Introduction -- New PEP Mechanisms -- Rate-Adaptive Spoofing -- Segment Aggregation -- Performance Analysis -- Conclusions -- References -- Effects of the Number of Hops on TCP Performance in Multi-hop Cellular Systems -- Introduction -- The Wireless Multi-hop Cellular System Model -- Simulation Model -- Numerical Results -- Conclusion -- References -- Traffic-Aware MAC Protocol Using Adaptive Duty Cycle for Wireless Sensor Networks -- Introduction -- Proposed Adaptive MAC Protocol -- Tree Topology in Sensor Networks -- Basic Idea -- Superframe Format -- Analysis -- Schedule Decision Frame Overhead -- Superframe Size Decision -- Simulation Result -- Conclusion -- References -- mTBCP-Based Overlay Construction and Evaluation for Broadcasting Mini-system -- Introduction -- Related Work -- Overlay Broadcasting System -- Session Architecture in Overlay Broadcasting System -- Requirements for Member Join -- Limitation of Traditional TBCP
  • Problem with Concurrent Member Join -- Modified-TBCP (mTBCP) Scheme -- A Simplified Architecture of mTBCP -- Concurrent Member Join under mTBCP -- Simulation Setup and Results -- Simulation Setup -- Simulation Results -- Discussion and Further Scope -- References -- A Network I/O Architecture for Terminal-Initiated Traffics in an Ubiquitous Service Server -- Introduction -- Motivation -- Latona Architecture -- Overview of Latona -- Design Details of Latona Kernel -- Design Details of Latona Hardware -- Experimental Results -- Kernel Execution Time with Legacy TCP/IP Stack -- Packets-Per-Second and Bandwidth of Latona Architecture -- Profiling of Processing Distribution in Latona Architecture -- Conclusion and Future Work -- References -- Analyzing and Modeling Router-Level Internet Topology -- Introduction -- Structural Properties of Router-Level Topology -- Network Motif -- Detailed Analysis of Router-Level Topology -- Modeling Methodology for Router-Level Topologies -- FKP Topology: Distance-Based Modeling -- New Modeling Method for Router-Level Topologies -- Structural Properties of Our Modeling Method -- Application to the Evaluation on Routing Control -- Optimal RoutingMethod -- Method for Allocating Link Capacities -- Distribution of Link Utilization -- Concluding Remarks -- References -- Does the Average Path Length Grow in the Internet? -- Introduction -- Background and Metrics -- Topology of the Internet -- Average Path Length -- Statistic of Average Path Length -- Prediction on the Average Path Length -- Conclusion -- References -- An Implicit Cluster-Based Overlay Multicast Protocol Exploiting Tree Division for Mobile Ad Hoc Networks -- Introduction -- Analysis of Related Work -- An Implicit Cluster-Based Overlay Multicast Protocol Exploiting Tree Division (ICOM-TD) -- Protocol Design Principles and Assumptions
  • Flexible Bound Admission Control Algorithm -- Softness Profile -- Flexible Bound Admission Control Algorithm -- System Model and Numerical Analysis -- Numerical Results -- Conclusion -- References -- Adaptive Qos-Aware Wireless Packet Scheduling in OFDMA Broadband Wireless Systems -- Introduction -- System Model -- Scheduling with Time Constraints -- The Urgency of Scheduling -- Efficiency of Radio Resource Usage -- UEPS Algorithm -- The Proposed UEPS Algorithm -- An Optimized and A Fast Implementation-Based Packet Loading Methods -- Performance Evaluation -- Traffic Types and System Parameters -- Performance Evaluation -- Conclusions and Further Study Issues -- References -- Scheduled Uplink Packet Transmission Schemes for Voice Traffic in OFDMA-Based Wireless Communication Systems -- Introduction -- System Model -- Uplink Packet Scheduling Algorithm -- Voice Traffic Model Analysis -- Proposed Uplink Packet Scheduling Technique for Voice Traffic -- Simulation Environments -- Simulation Results -- Conclusion -- References -- Cognitive Radio MAC Protocol for Hidden Incumbent System Detection -- Introduction -- Channel Sensing and Frequency Changing Procedure -- Hidden Incumbent System Detection MAC -- Hidden Incumbent System -- Hidden Incumbent System Detection Protocol: Inband Signaling -- Hidden Incumbent System Detection Protocol: Outband Signaling -- Simulation Results -- Conclusion -- References -- De-triangulation Optimal Solutions for Mobility Scenarios with Asymmetric Links -- Introduction -- Analytical Framework and Problem Definition -- Problem Statement -- De-triangulation Mechanism Description -- Analysing the Direct De-triangulation Problem -- Proposed Solutions -- Conservative Algorithm -- Optimal Algorithm for Symmetric Links -- Optimal Algorithm for Asymmetric Links -- Simulation Studies -- Simulation Scenario -- Loss and Delay Results
  • Network Architectures -- Protocol Description -- Group Communications of the ICOM-TD -- Performance Evaluation -- Analysis on Rates of Participation in Multicast Routing -- Simulation Experimental Results -- Conclusion and Future Work -- References -- An Efficient Address Assignment Mechanism for Mobile Ad-Hoc Networks -- Introduction -- Related Work -- LiA Protocol -- LiACR Protocol -- Our E-LiACR Protocol -- Assumption and Notations -- Control Messages and Timers -- E-LiACR -- Performance Evaluation -- Conclusions -- References -- Geocasting in Wireless Ad Hoc Networks with Guaranteed Delivery -- Introduction -- Proposed Mechanism -- Island Discovery and Leader Election -- Main Entry Points (MEPs) -- Maintenance of Geocast Region -- Merging of Two Islands -- Partitioning of Islands -- Analysis and Discussion -- Evaluation -- Conclusion -- References -- Small-World Peer-to-Peer for Resource Discovery -- Introduction -- Related Work -- Algorithm Descriptions -- Intra-group Content Searching -- Inter-group Content Searching -- Clustering Coefficient -- Performance Evaluation -- Intra-group Search -- Inter-group Search -- Simulation Results -- Simulation in Dynamic Environments -- Performance Comparison -- Conclusion -- References -- Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution -- Introduction -- Proximity Based P2P Networks (P3ON) -- Proximity Based ID Assignment -- Two Tier Ring -- Two-Phase Lookup Algorithm -- Load Distribution -- Numerical Results -- Simulation Parameters -- Lookup Latency -- Load Distribution -- Conclusion -- References -- Network Architecture and Protocols for BGP/MPLS Based Mobile VPN -- Introduction -- Mobile BGP/MPLS VPN -- Network Architecture and Protocol Entities for Mobile BGP/MPLS VPN Services -- Mobile BGP/MPLS VPN Establishment and Access