Cover image for New Trends In Computer Networks.
New Trends In Computer Networks.
Title:
New Trends In Computer Networks.
Author:
Tugcu, Tuna.
ISBN:
9781860947308
Personal Author:
Physical Description:
1 online resource (403 pages)
Contents:
CONTENTS -- Preface -- Invited Talks -- Organization -- A Lightweight Passive Replication Protocol for Deterministic Servers Jinho Ahn -- 1. Introduction -- 2. Traditional Passive Replication Approach -- 3. The Proposed Protocol -- 4. Performance Evaluation -- 5. Conclusion -- References -- A Simple Partial-Path Combination Approach for Constrained Path Selection Murat Sensoy and Murat Zeren -- 1. Introduction -- 2. Partial-Path Combination Approach For Constrained Path Selection -- 3. FAST-BSMA -- 4. Performance Evaluation -- 5. Conclusions -- References -- TCP Start-up Behavior under the Proportional Fair Scheduling Policy J.H. Choi, J.G. Choi and C. Yoo -- 1. Introduction -- 2. System Model and Background -- 2.1. System model description -- 2.2. PF scheduler -- 3. Observation and Problems -- 3.1. Simulation environments -- 3.2. Observation: TCP startup behavior -- 4. Analysis -- 4.1. Condition of TCP timeout -- 4.2. Analysis of the packet transmission delay in the cellular networks -- 4.3. Condition of the initial timeout under PF scheduler -- 4.4. Tendency analysis -- 5. Conclusion and Future work -- References -- The Hop-Limit Approach for Flow Assignment in Survivable Connection-Oriented Networks K. Walkowiak -- 1 Introduction -- 2 Hop-Limit Approach -- 3 Definition of Functions for Link Restoration -- 4 Results of Numerical Experiments -- 5 Concluding Remarks -- 6 Acknowledgements -- References -- A Fair Bandwidth Allocation Scheme for Multimedia Handoff Calls in Cellular Networks M. Salamah and I. Candan -- 1 Introduction -- 2 The Time Threshold Based Scheme (TTS) -- 3 Simulation Parameters and Performance Metrics -- 4 Simulation Results -- 5 Conclusion -- References -- Improving the Performance of Video Streaming Systems Using Video-Locality and Distributed Redundant Hierarchy Servers Hasan Sarper, Mohammed Ahmed, Isik Aybay.

1 Introduction -- 2 The Client System Architecture -- 2.1 Client Mode -- 2.2 LAN Server Mode -- 3 The Server System Architecture -- 3.1 The Proposed Object Location Scheme -- 3.2 Request Life Cycle -- 4 Petri-net Model Developed for the Server Architecture -- 4.1 Assumptions for the Petri-net Model -- 5 Simulation and Results -- 5.1 Simulation Model -- 5.2 Simulation Parameters -- 5.3 Discussion of Results -- 6 Conclusion -- References -- Searching for Low Latency Routes in CPN with Reduced Packet Overhead R. Lent and P. Liu -- 1. Introduction -- 2. QoS Goal Functions -- 3. Testbed Measurements -- 4. Wireless Ad Hoc Simulations -- 5. Conclusions -- Acknowledgments -- References -- A Required Level for Optical Networks Business Model: Integrated Neutral Topology Optimizer (INTO) Haydar Cukurtepe, Sefer Kurnaz and A. Behzat Sahin -- 1. Introduction -- 2. Business model -- 3. Bandwidth as a Commodity -- 4. Disadvantages of Today's Business Model -- 5. An illustrative Scenario -- 6. Integrated Neutral Topology Optimizer (INTO) -- 7. Expected Benefits of INTO -- 8. Conclusion -- References -- Characterizing Voice and Video Traffic Behavior over the Internet Prasad Calyam and Chang-Gun Lee -- 1. Introduction -- 2. Measurement Methodology -- 2.1. World-wide Testbed Setup -- 2.2. Quantizing Network Health Scenarios -- 2.3. Videoconferencing Tasks -- 3. Analysis Of Traffic Traces -- 3.1. Subjective versus Objective Quality Rankings -- 3.2. Packet-size Distributions versus Activity Levels -- 3.3. Audio and Video Inter-packet Delays -- 3.4. Inter-packet Jitter versus Network Health and Packet Sizes -- 3.5. Application-level Packet Loss versus Network Health -- 4. Conclusion -- References -- Dynamic Bandwidth Allocation Considering Utilization and QoS in Cellular Networks Kyungkoo Jun, Seokhoon Kang and Byoungjo Choi -- 1. Introduction.

2. Dynamic Bandwidth Allocation Model and Algorithm -- 2.1. Algorithm -- 3. Performance Evaluation -- 3.1. Comparison with other schemes -- 3.2. Effect of the bandwidth update interval -- 4. Conclusions -- References -- A Path Restoration Algorithm Sharing the Resource in GMPLS Network Tae-Man Han, You-Hyeon Jeong, Jun-Hwa Lee, Sang-Ha Kim and Dong- Won Kim -- 1 Introduction -- 2 The restoration scheme sharing the resources -- 2.1 The problem of Kini algorithm -- 2.2 The proposed algorithm -- 3 Applying scheme of GMPLS network -- 3.1 Working Path -- 3.2 Backup Path -- 3.3 The activity of the backup path when a fault occurs -- 4 Requirements -- 4.1 The extension RSVP-TE and the message format -- 4.1.1 PATH-TYPE Object -- 4.1.2 WP-LABEL-SET Object -- 4.1.3 BP-LABEL-SET Object -- 4.1.4 LSP-SET Object -- 5 Performance Evaluation -- 6 Performance Evaluation -- References -- Design of a Chirped Fiber Bragg Grating for Use in Wideband Dispersion Compensation Isa Navruz and Ahmet Altuncu -- 1 Introduction -- 2 Theoretical Model -- 3 Numerical Results -- 4 Results and Discussion -- References -- Voronoi-Based Approach for Constructing Connected Cover Set in Wireless Sensor Networks Jie Jiang, Zhen Song, Heying Zhang and Wenhua Dou -- 1. Introduction -- 2. Related Work -- 3. Problem Statement -- 4. Centralized Approximation Algorithm -- 4.1. Algorithm for Constructing the Minimal Cover Set -- 4.1.1. Identifying Redundant Sensors -- 4.1.2. Determining Active Sensor Set -- 4.2. SMT Based Connection Algorithm -- 5. Experimental Results -- 6. Conclusions -- References -- Messages Scheduling of CAN-Based Network for a Humanoid Robot J.-S. Kong, Y.-K. Sung, J.-G. Kim and B.-H. Lee -- 1. Introduction -- 2. Basic Configuration -- 3. The Distributed Architecture -- 3.1. Main Controller -- 3.2. Local Controller -- 3.3. Communication Method -- 4. Temporal Analysis of CAN.

4.1. Analysis of CAN Response Time -- 4.2. Analysis of CAN Response Time under Error Conditions -- 5. Temporal Analysis of CAN -- 6. Conclusion -- References -- Acknowledgements -- More Efficient Java RMI for GPRS Devices Jalal Kawash, Ghassan Samara and Ahmad El-Halabi -- 1. Introduction -- 2. Background -- 2.1 J2ME -- 2.2 Data Compression -- 3. RMI Enhanced Optional Package -- 4. Experimental Analysis of RMI EOP -- 4.1 Java object benchmark -- 4.2 Development and Testing Environment -- 4.3 Summay Results -- 5 Conclusions -- References -- Implementation and Performance Analysis of iSCSI-Based Virtual Storage System with Wireless Networks Hyotaek Lam, Saebom Choi and Daehun Nyang -- 1. Introduction -- 2. Design and Implementation -- 2.1. System Strzccture -- 2.2. Data Tmnsfer Procedure -- 2.2.1. iSCSI Read Process -- 2.2.2. iSCSI Write Process -- 2.2.3. User Interface -- 3. Performance Evaluation -- 3.1. Measurement environment -- 3.2. Performance Analysis -- 4. Conclusion -- References -- A Robust Cluster-Based Multi-Hop Routing Algorithm in Wireless Sensor Networks Xiao Chen, Mingwei Xu and Yong Cui -- 1. Introduction -- 2. Related Work -- 3. Architecture -- 3.1. Cluster Construction Phase -- 3.2. Data Forwarding Phase -- 4. Detail -- 4.1. Cluster Construction Algorithm -- 4.2. Initial Construction of Cluster -- 4.3. Dynamic Header Rotation Mechanism -- 4.4. Node Fail-to-Resume Mechanism -- 4.5. Data Forwarding Algorithm -- 5. Performance Evaluation -- 5.1. Experiment -- 5.2. Energy Threshold a -- 5.3. Forwarding Offset -- 6. Conclusion -- References -- Cluster-Based Security Mechanism for Sensor Network Communication Inshil Doh, Hayoung Oh and Kajoon Chae -- 1. Introduction -- 2. Key management schemes in sensor networks -- 2.1. Random key predistribution -- 2.2. Polynomial-based key predistribution -- 3. Cluster-based key predistribution.

3.1. Assumptions and Network model -- 3.2. Key establishment mechanism -- 3.2.1. Key-related information pre-distribution -- 3.2.2. Direct K e y establishment -- 3.2.3. Path Key establishment -- 4. Cluster-based authentication mechanism -- 4.1. Node-to-node authentication -- 4.2. Broadcast authentication -- 5. Performance Evaluation -- 5.1. Security against Node Captures -- 5.2. Simulation Results -- 5.3. Analysis -- 6. Conclusions and Future work -- References -- HTTP-MPLEX: An Application Layer Multiplexing Protocol for the Hypertext Transfer Protocol (HTTP) R.L.R. Mattson and S. Ghosh -- 1. Introduction -- 2. HTTP Request Compression -- 2.1. Header Compression Algorithm -- 3. HTTP-MPLEX Response Encoding -- 3.1. The format of an MPLEX compliant response -- -- 4. Content Response Encoding Scheme -- 4.1. mplexHdr -- 4.2. mplexChanHdr -- 4.3. mplexChunkHdr -- 5. Future Work -- References -- A New Approach to Detect DDOS Attacks Using Support Vector Machine Jungtaek Seo, Cheolho Lee, Taeshik Shon and Jongsub Moon -- 1 Introduction -- 2 Related Work -- 3 Overview of Traffic Rate Analysis and Support Vector Machine -- 3.1 Definition of Traflc Rate Analysis -- 3.2 SVMfor Categorization -- 4 Experiment -- 4.1 ExperimentalEnvironment -- 4.2 Feature Extraction -- 4.3 Detection Performance -- 4.3.1 Training Set and Test Set -- 4.3.2 Results of Testing -- 5 Conclusion -- References -- Performance Evaluation of End-to-End Security in Wireless Applications Using WTLS Handshake Protocol Burak Bayoglu, Albert Levi and Erkay Savas -- 1. Introduction -- 2. Background -- 2.1 WTLS Handshake Protocols -- 3. WTLS Handshake Protocol Performance Evaluation -- 3.1 Processing Time Analysis -- 3.2 Transmission Time Analysis -- 3.3 Total Handshake Time Analysis -- 3.4 Queue Delay Analysis -- 4. Conclusions -- References.

Integrating Semantic Context Model into Adaptive Middleware for Ubiquitous Computing Qing Wu, Zhaohui Wu and Jie Sun.
Abstract:
This book presents a selective collection of papers from the 20th International Symposium on Computer and Information Sciences, held in Istanbul, Turkey. The selected papers span a wide spectrum of topics in computer networks, including internet and multimedia, security and cryptography, wireless networks, parallel and distributed computing, and performance evaluation. These papers represent the results of the latest research of academicians from more than 30 countries.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: