lecture notes in computer science 3462978-3-540-32017-3/1.pdf · raouf boutaba kevin almeroth ramon...

28
Lecture Notes in Computer Science 3462 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos NewYork University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Upload: others

Post on 31-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Lecture Notes in Computer Science 3462Commenced Publication in 1973Founding and Former Series Editors:Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board

David HutchisonLancaster University, UK

Takeo KanadeCarnegie Mellon University, Pittsburgh, PA, USA

Josef KittlerUniversity of Surrey, Guildford, UK

Jon M. KleinbergCornell University, Ithaca, NY, USA

Friedemann MatternETH Zurich, Switzerland

John C. MitchellStanford University, CA, USA

Moni NaorWeizmann Institute of Science, Rehovot, Israel

Oscar NierstraszUniversity of Bern, Switzerland

C. Pandu RanganIndian Institute of Technology, Madras, India

Bernhard SteffenUniversity of Dortmund, Germany

Madhu SudanMassachusetts Institute of Technology, MA, USA

Demetri TerzopoulosNew York University, NY, USA

Doug TygarUniversity of California, Berkeley, CA, USA

Moshe Y. VardiRice University, Houston, TX, USA

Gerhard WeikumMax-Planck Institute of Computer Science, Saarbruecken, Germany

Page 2: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Raouf Boutaba Kevin AlmerothRamon Puigjaner Sherman ShenJames P. Black (Eds.)

NETWORKING 2005Networking Technologies, Services,and Protocols; Performance of Computerand Communication Networks; Mobileand Wireless Communication Systems

4th International IFIP-TC6 Networking ConferenceWaterloo, Canada, May 2-6, 2005Proceedings

13

Page 3: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Volume Editors

Raouf BoutabaSherman ShenJames P. BlackUniversity of WaterlooSchool of Computer Science200 University Ave. West, Waterloo, Ontario, N2L 3G1, CanadaE-mail: {rboutaba/sshen/jpblack}@uwaterloo.ca

Kevin AlmerothUniversity of CaliforniaDepartment of Computer ScienceSanta Barbara, CA 93106-5110, USAE-mail: [email protected]

Ramon PuigjanerUniversitat de les Illes BalearsDept. de Ciències Matemàtiques i InformàticaCra. de Valldemossa, km. 7.5, 07122 Palma, Illes Balears, SpainE-mail: [email protected]

Library of Congress Control Number: Applied for

CR Subject Classification (1998): C.2, C.4, H.4, D.2, J.2, J.1, K.6, K.4

ISSN 0302-9743ISBN-10 3-540-25809-4 Springer Berlin Heidelberg New YorkISBN-13 978-3-540-25809-4 Springer Berlin Heidelberg New York

This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.

Springer is a part of Springer Science+Business Media

springeronline.com

© Springer-Verlag Berlin Heidelberg 2005Printed in Germany

Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, IndiaPrinted on acid-free paper SPIN: 11422778 06/3142 5 4 3 2 1 0

Page 4: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Preface

Welcome to the proceedings of Networking 2005, the fourth conference in whatis now an annual series. This was the first time the conference was held outsideEurope, and the University of Waterloo is proud to be the institutional host.

Networking is the flagship conference of Technical Committee 6, Commu-nication Systems, of the International Federation for Information Processing(IFIP TC 6). The conference is sponsored by four of the eleven working groupsin TC 6: Network and Internetwork Architectures (WG 6.2), Performance ofCommunication Systems (WG 6.3), Wireless Communications (WG 6.8), andPhotonic Networking (WG 6.10).

Previously unpublished technical papers were solicited and peer-reviewed inthree tracks: Networking Technologies, Services and Protocols; Performance ofComputer and Communication Networks; and Mobile and Wireless Communica-tion Systems. The final program reflected this organization as much as possible.In addition, four proposals for high-quality workshops were accepted, there werethree keynote speeches and three panel sessions, and a program of tutorials wasput in place. The Organizing Committee endeavored to complement the excitingtechnical program with an attractive social program.

The Technical Program Committee, lead by Raouf Boutaba, accepted 105 fullpapers and 36 poster papers from 430 submissions, originating in 26 countries onfour continents. This placed a large load on the TPC and track chairs, the 199members of the TPC, and more than 600 reviewers who wrote over 1800 reviews.

An international conference of this scope only occurs when many, many indi-viduals contribute in many ways to its success. We wish to thank the Universityof Waterloo for the use of its facilities, conference services, and food services. Weare grateful to the Nortel Networks Institute at the University of Waterloo forfinancial support of the publication of the proceedings by Springer. The Centrefor International Governance Innovation graciously allowed the use of their stun-ningly beautiful atrium for the conference banquet. Members of the OrganizingCommittee worked for many months to make the conference a reality, and theSteering Committee was always present for advice and information. As the mainsponsor, IFIP provided the impetus for the conference, as well as an award forthe best paper and a number of student travel grants.

Finally, and most importantly, we thank the many reviewers and mem-bers of the Technical Program Committee for ensuring the academic vitality ofNetworking 2005.

May 2005 Raouf BoutabaJames P. Black

Page 5: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Organization

Networking 2005 was organized by the University of Waterloo, Canada, andsponsored by the IFIP working groups on Network and Internetwork Architec-tures (WG 6.2), Performance of Communication Systems (WG 6.3), WirelessCommunications (WG 6.8), and Photonic Networking (WG 6.10).

Executive Committee

General Chair: Jay Black (University of Waterloo, Canada)Program Chair: Raouf Boutaba (University of Waterloo, Canada)Chair, Networking Technologies, Services and Protocols Track:

Kevin Almeroth (University of California, Santa Barbara,USA)

Chair, Performance of Computer and Communication Networks Track:Ramon Puigjaner (Universitat de les Illes Balear, Spain)

Chair, Mobile and Wireless Communications Track:Sherman Shen (University of Waterloo, Canada)

Keynote and Panel Co-chairs:Edmundo Monteiro (University of Coimbra, Portugal)Catherine Rosenberg (University of Waterloo, Canada)

Tutorial and Workshop Co-chairs:Lorne Mason (McGill University, Canada)Alex Lopez-Ortiz (University of Waterloo, Canada)

Publicity Co-chairs: Guy Omidyar (Sultan Qaboos University, Oman)Paul Ward (University of Waterloo, Canada)

Publication Chair: Thomas Kunz (Carleton University, Canada)Industrial Relations Chair:

Vic Diciccio (University of Waterloo, Canada)Local Arrangements: Wendy Rush (University of Waterloo, Canada)

Jean Webster (University of Waterloo, Canada)Webmaster: Herman Li (University of Waterloo, Canada)Steering Committee: Harry Perros (Chair, North Carolina State University,

USA)Augusto Casaca (IST/INESC, Portugal)Guy Omidyar (Sultan Qaboos University, Oman)Guy Pujolle (University of Paris 6, France)Otto Spaniol (Aachen University, Germany)Ioannis Stavrakakis (University of Athens, Greece)

Page 6: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

VIII Organization

Program Committee

Program Chair: Raouf Boutaba, University of Waterloo, Canada

Networking Technologies, Services and ProtocolsChair: Kevin Almeroth, University of California, Santa Barbara, USAMostafa Ammar, Georgia Tech, USASamrat Bhattacharjee, University of Maryland, USAAndrea Bianco, Politecnico di Torino, ItalyMilind Buddhikot, Bell Labs, USAClaudio Casetti, Politecnico di Torino, ItalyJun-Hong Cui, University of Connecticut, USAJordi Domingo-Pascual, University of Catalunya, SpainSonia Fahmy, Purdue University, USAWu-chi Feng, Oregon Graduate Institute, USAMaurice Gagnaire, ENST, FranceManimaran Govindarasu, Iowa State University, USADavid Hutchison, Lancaster University, UKGianluca Iannaccone, Intel Research Cambridge, USAShivkumar Kalyanaram, Rensselaer Polytechnic Institute, USAKimon Kontovasilis, Demokritos Research Center, GreeceGuy Leduc, University of Liege, BelgiumJorg Liebeherr, University of Virginia, USAPeter Marbach, University of Toronto, CanadaLorne Mason, McGill University, CanadaKetan Mayer-Patel, University of North Carolina, USAMichael Menth, University of Wuerzburg, GermanyVishal Misra, Columbia University, USAPrasant Mohapatra, University of California, Davis, USAIoanis Nikolaidis, University of Alberta, USAPeng Ning, North Carolina State University, USAJaudelice de Oliveira, Drexel University, USAChristos Papadopoulos, University of Southern California, USASymeon Papavassiliou, New Jersey Institute of Technology, USAErwin Rathgeb, University of Essen, GermanyReza Rejaie, University of Oregon, USAGeorge Rouskas, North Carolina State University, USASaswati Sarkar, University of Pennsylvania, USAStefan Saroiu, University of Toronto, CanadaAshwin Sridharan, Sprint ATL, USAAaron Striegel, University of Notre Dame, USALars Wolf, Braunschweig University of Technology, GermanyRichard Yang, Yale University, USADaniel Zappala, University of Oregon, USABen Zhao, University of California, Santa Barbara, USA

Page 7: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Organization IX

Performance of Computer and Communication NetworksChair: Ramon Puigjaner, Universitat de les Illes Balear, SpainRon Addie, University of Southern Queensland, AustraliaEitan Altman, INRIA, FranceMiltiades Anagnostou, National Technical University of Athens, GreeceAndrea Baiocchi, University “La Sapienza”, Rome, ItalyChris Blondia, University of Antwerp, BelgiumTosten Braun, University of Bern, SwitzerlandHerwig Bruneel, University of Ghent, BelgiumMariacarla Calzarossa, University of Pavia, ItalyConstantinosCourcoubetis,AthensUniversity of Economics and Business,GreeceKhaled Elsayed, Cairo University, EgyptSebastia Galmes, Universitat de les Illes Balears, SpainJorge Garcıa, Universitat Politecnica de Catalunya, SpainGuenter Haring, University of Vienna, AustriaPeter Harrison, Imperial College, London, UKIlias Iliadis, IBM Research, SwitzerlandFarouk Kamoun, Universite de la Manouba, TunisiaKrishna Kant, Intel Corporation, USAPeter Key, Microsoft Research Ltd., Cambridge, UKWilliam Knottenbelt, Imperial College, London, UKDemetres Kouvatsos, University of Bradford, UKPieter Kritzinger, University of Cape Town, South AfricaEmilio Leonardi, Politecnico di Torino, ItalyAlberto Leon-Garcia, University of Toronto, CanadaMichela Meo, Politecnico di Torino, ItalyEdmundo Monteiro, University of Coimbra, PortugalIlkka Norros, VTT Technical Research Centre of Finland, FinlandLuis Orozco, Universidad de Castilla-La Mancha, SpainHarry Perros, North Carolina State University, USAAndreas Pitsillides, University of Cyprus, CyprusAna Pont, Universitat Politecnica de Valencia, SpainOtto Spaniol, Rheinisch-Westfalische Technische Hochschule Aachen, GermanyYutaka Takahashi, University of Kyoto, JapanYannis Viniotis, North Carolina State University, USA

Mobile and Wireless CommunicationsChair: Sherman Shen, University of Waterloo, CanadaOzgur Akan, Middle Eastern Technical University, TurkeyEitan Altman, INRIA, FranceLuciano Bononi, University of Bologna, ItalyHsiao-Hwa Chen, National Sun Yat-sen University, TaiwanMarco Conti, National Research Council, ItalyChristina Czernuszka, Telus, CanadaEylem Ekici, Ohio State University, USA

Page 8: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

X Organization

Laura Feeney, Swedish Institute of Computer Science, SwedenGabor Fodor, Ericsson, SwedenJerome Galtier, France Telecom R&D and INRIA, FranceSilvia Giordano, ICA-DSC-SUPSI, SwitzerlandEnrico Gregori, National Research Council, ItalyEkram Hossain, University of Manitoba, CanadaYoussef Iraqi, University of Waterloo, CanadaRobin Kravets, University of Illinois at Urbana-Champaign, USAThomas Kunz, Carleton University, CanadaVictor Leung, University of British Columbia, CanadaChuang Lin, Tsinghua University, ChinaGerald Maguire, Royal Institute of Technology, SwedenJelena Misic, University of Manitoba, CanadaZhisheng Niu, Tsinghua University, ChinaStephan Olariu, Old Dominion University, USASergio Palazzo, University of Catania, ItalyJianping Pan, NTT, USANikos Passas, University of Athens, GreeceGeorge Polyzos, Athens University of Economics and Business, GreeceGuy Pujolle, Universite Pierre et Marie Curie (Paris 6), FranceKimmo Raatikainen, University of Helsinki, FinlandAladdin O.M. Saleh, Bell Mobility, CanadaIvan Stojmenovic, University of Ottawa, CanadaViolet Syrotiuk, Arizona State University, USAShahrokh Valaee, University of Toronto, CanadaAndras Valko, Ericsson, SwedenBernhard Walke, Aachen University, GermanyLichun Wang, National Chiao Tung University, TaiwanGualiang (Larry) Xue, Arizona State University, USARichard Yao, Microsoft Research Asia, ChinaXiaohu You, Southeast University, ChinaPing Zhang, Beijing University of Post and Telecommunications, ChinaQian Zhang, Microsoft Research Asia, ChinaYongbing Zhang, University of Tsukuba, JapanDongmei Zhao, McMaster University, Canada

Page 9: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Organization XI

Reviewers

Atef AbdrabouAnthony AcamporaNaotoshi AdachiRonald AddieIshfaq AhmadOzgur AkanOzdemir AkinIan AkyildizRoberto AlbaneseGuido AlbertengoKevin AlmerothEitan AltmanMostafa AmmarMiltos AnagnostouAkkihebbal L. AnandaEmilio AncillottiAnnamalai AnnamalaiJosephina AntoniouJohn ApostolopoulosSupavadee AramvithAshok Argent-KatwalaJari ArkkoSusanna Au-YeungIrfan AwanAmr AyadVahid AzhariSang BaeVittorio BaginiPradeep BahlAndrea BaiocchiS. BalasubramaniamIlia BaldineAshok BaldotraAshok Kumar BaldotraNilanjan BanerjeeLuis BarbosaJose BarceloAntonio BariliPeter BartaLina BattestilliRoberto BattitiDaniel BauerFlorian BaumgartnerChristian Becker

Abdelfettah BelghithOmar BenaliPeter BenkoChristian BettstetterKonstantin BeznosovSamrat BhattacharjeeAmiya BhattacharyaSupratik BhattacharyyaMauro BiagiAndrea BiancoAndreas BinzenhoeferDanilo BlasiChris BlondiaThomas BohnertLuciano BononiEleonora BorgiaNizar BouabdallahAli BoudaniRaouf BoutabaArnold BraggTorsten BraunMarc BrogleHerwig BruneelRaffaele BrunoMilind BuddhikotNirupama BulusuIoana BurceaLevente ButtyanAlberto

Cabellos-AparicioFilippo CacaceMario CagaljJun CaiMaria CalzarossaAndrew CampbellSrdjan CapkunLicia CapraClaudio CasettiLlorenc CerdaKrishnendu ChakrabartyY. ChandramouliGirish ChandranmenonDongyan ChenHsiao-Hwa Chen

Qing ChenWen-Tsuen ChenXiaobo ChenYue ChenZhen ChenYu ChengRoman ChertovJan CheynsCarla-Fabiana

ChiasseriniImrich ChlamtacSunghyun ChoiChristophoros

ChristophorouChrysostomos

ChrysostomouAndrea ClementiMarco ContiCostas CourcoubetisRazvan CristescuJun-Hong CuiLaurie CuthbertChristina CzernuszkaHui DaiSajal DasSamir DasSubir DasPartha DasguptaTugrul DayarJuan Carlos De MartinJaudelice de OliveiraAndrea De VendictisDanny De VleeschauwerFranca DelmastroJing DengAjay DholakiaNicholas DingleJordi Domingo-PascualAndre DrummondDavid DuRudra DuttaEylem EkiciBrandon EllisonKhaled Elsayed

Page 10: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

XII Organization

Vincenzo EramoFazli ErbasDo Young EunFarid FadaieSonia FahmyAfshin FallahiYuguang FangRamy FarhaBabak FariabiJabed FaruqueLaura FeeneyBenjamin FengKai-Ten FengWu-chi FengDavid FilaniJoe FinneyJorge FinochiettoMarco FioreGabor FodorViktoria FodorMirko FranceschinisMario FreireRod FretwellAnders FuruskarMaurice GagnaireGiulio GalanteSebastia GalmesJerome GaltierShashidhar GandhamDeepak GanesanAyalvadi GaneshWilfried GanstererAlberto Garcıa MartınezMarıa Luisa

Garcıa-OsmaJorge GarciaVangelis GazisDipak GhosalMonisha GhoshPaolo GiacconeJose GilSilvia GiordanoEnrico Maria GiraudoBernd GirodTom Goff

Jose LuisGonzalez-Sanchez

Manimaran GovindarasuBob GrayEnrico GregoriAdelbert GroebbensDirk GrunwaldChao GuiVehbi Cagri GungorMeng GuoOzgur GurbuzAndrei GurtovRick HaRobert HaasReda HaddadGeorge HadjipollasRichard HanUli HarderKhaled HarfoushGuenter HaringPeter HarrisonMasoud HashemiSeyed Naser HashemiQi HeYuning HeWendi HeinzelmanMarc HeissenbuettelAbdelsalam HelalAhmed HelmyJeffrey HightowerAbdulrahman HijaziHelmut HlavacsPin-Han HoEkram HossainXiaomeng HuangYueh-Ming HuangDanny HughesTian Hui HuiKarin HummelPaul HurleyDavid HutchisonGianluca IannacconeIlias IliadisMary IngramYoussef Iraqi

Brent IshibashiMohammad IslamTeerawat IssariyakulRobert IstepanianEisaburo ItakuraRavishankar IyerJ.H. JamesRalf JennenHai JiangYixin JiangEmil JovanovJiang JunShivkumar KalyanaramFarouk KamounIntae KangKrishna KantMartin KappesDilek KarabudakNaoyuki KarasawaAhmed KarmouchShoji KasaharaYoshihiro KawaharaGeorge KesidisCsaba KeszeiPeter KeyBabak H. KhalajWolfgang KiessJorma KilpiMyung Sup KimSeong-Lyun KimAim KindNaoki KitaWilliam KnottenbeltMasayoshi KobayashiKimon KontovasilisDavid KotzDimitrios KoutsourisDemetres KouvatsosAndrey KrendzelPieter KritzingerAdlen KsentiniFerenc KubinszkyFernando KuipersThomas KunzIoannis Lambadaris

Page 11: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Organization XIII

George LampropoulosKoen LangendoenNikolaos LaoutarisEddie LawLong LeGuy LeducMing LeiJohn LeisIlhem LenglizAlberto Leon-GarciaEmilio LeonardiVictor LeungBo LiChengzhou LiJiandong LiLei LiYue LiZheng LiZhi LiZhi LiBen LiangWanjiun LiaoJorg LiebeherrNoura LimamChuang LinTao LinTsung-Nan LinXiaojun LinXinhua LingDonggang LiuJing LiuXiaoShan LiuYanbin (Grace) LiuRenato Lo CignoMatthias LottSteven LowSteven LumettaSasa LygizouWenchao MaSridhar MachirajuGerald (Chip) MaguireCarlo MajoraniSzabolcs MalomsokyStefan MangoldJosep Mangues-Bafalluy

Sotiris ManiatisPetteri MannersaloCosta ManuelPeter MarbachGianluca MardenteRaymond MarieRuediger MartinGaia MaselliXavier Masip-BruinLorne MasonLuisa MassariHiroyuki MasuyamaKetan Mayer-PatelGary McAlpineDaniel McClarySteve McLaughlinJanise McNairMarco MelliaTommaso MelodiaMichael MenthMichela MeoVivek MhatreGyorgy MiklosFabio MilanJens MilbrandtDragan MilicGeyong MinChen MingEnzo MingozziJelena MisicVojislav MisicVishal MisraMichel MissonKeith MitchellIs-Haka MkwawaShantidev MohantyPrasant MohapatraUgo MonacoEdmundo MonteiroUday MudoiBiswanath MukherjeeAlaa MuqattashAmy MurphyLuca MuscarielloHedi Nabli

Keisuke NakanoSanjiv NandaSaishankar NandagopalanIoanis NikolaidisRaja NimmelapelliBobby NinanPeng NingCristina Nita-RotaruZhisheng NiuDusit NiyatoKoji NonobeAlessandro NordioIlkka NorrosAntonio NucciStephan OlariuRuy OliveiraLyndon OngPhoemphun OothongsapJitendra PadhyeSergio PalazzoJianping PanAntonis PanagakisIoannis PapadimitriouChristos PapadopoulosSymeon PapavassiliouSarantis PaskalisNikos PassasGiovanni PauJon PehaLuciana PelusiXue-hai PengCharles PerkinsHarry PerrosDaniele PerucchiniMarinella PetrocchiGian Pietro PiccoChiara PiglionePaulo PintoAndreas PitsillidesRoman PletkaChristos PolitisGeorge PolyzosDario PompiliAna PontAdrian Popescu

Page 12: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

XIV Organization

Ramon PuigjanerGuy PujolleVishwas PuttasubbappaHe QiKimmo RaatikainenPertti RaatikainenJan RabaeyAndras RaczS.V. RaghavanIdris RaiParmesh RamanathanRajesh RaoSanjay RaoErwin RathgebSylvia RatnasamyMiklos Aurel RonaiDouglas ReevesHannu ReittuReza RejaieFengyuan RenXiangshi RenJulien RidouxRui RochaMeysam RoodiMeysam RoodiSean RooneyMichele RossiAngelos RouskasGeorge RouskasAntony RowstronMohamed SaadTarek SaadawiAmit SahooJulio SahuquilloAmir SaidLeila SaidaneAladdin SalehTheodoros SalonidisSusana SargentoSaswati SarkarJahangir SarkerStefan SaroiuCarla SavageAmir SayeghSergio Sanchez-Lopez

Nicola ScalabrinoMatthias ScheideggerEnrico SchiattarellaGregor SchielePegah SeddighianKari SeppanenRenue Serral-GraciaNeel ShahNirmala ShenoyHanif SheraliMatthias SiebertArne SimonssonMayank SinghalHarry SkianisDimitris SkyrianoglouPaul SmithJungmin SoKatayoun SohrabiHesham SolimanJoo-Han SongMohit SoodAugustin SouleLiew Soung ChangOtto SpaniolAshwin SridharanMatthias StallmannVladica StanisicIoannis StavrakakisLothar StiborIvan StojmenovicAaron StriegelMarinos StylianouWeilian SuXiao SuKamala SubramaniamKun SunKarthikeyan SundaresanChi Wan SungArak SutivongTamas SutoViolet SyrotiukTakuji TachibanaRahim TafazolliChristopher TaggartAkira Takahashi

Yutaka TakahashiHideaki TakusagawaZhangxi TanXiaofeng TaoAlessandro TarelloCamillo TaylorDaniele TesseraVijay TewariGeorge ThanosNigel ThomasAsavari ThombareDavid ThornleyAli TizghadamTerence D. ToddAlfredo TodiniChai Keong TohC.K. TohFujita TomonoriHajer TounsiAleksandar TrifunovicAnand TripathiHua-Wen TsaiDavid TseAthanasios TsokanosGiovanni TuriLeonidas TzevelekasRaza Ul-MustafaMurat UysalFrancesco VacircaAthanasios VaiosShahrokh ValaeeAndras ValkoMassimo VallaAndrea VallettaConstantinos VassilakisVasos VassiliouMalathi VeeraraghavanYannis ViniotisNeophytos VlotomasMehmet VuranSonia WaharteBernhard WalkeBin WangChunJiang WangHao Wang

Page 13: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Organization XV

Jiahong WangLan WangLi-Chun WangPan WangPing WangQuanhong WangWenye WangXudong WangYao WangYaya WeiErik WeissYu WenJeffrey WieselthierLars WolfAdam WoliszTung Chong WongWing Shing WongDe-An WuHaitao WuKui WuChristos XenakisJin XiaoYang XiaoHaiyong XieJiang Xie

Linlin XieYufeng XinYongqiang XiongDan XuJun XuLisong XuPeng XuSheng XuGuoliang XueMeeta YadavBai YanZhu YanfengFan YangJi YangJie YangQu YangShun-Ren YangXinjie YangYang Richard YangMarcelo YannuzziRichard YaoJian YeTao YeChangchuan YinWang Ying

Liu YingzhuangMika YlianttilaS.J. Ben YooXiaohu YouOssama YounisTang YouxiHelen Yu-ZhangGuangxin YueTheodore ZahariadisDaniel ZappalaHarf ZatschlerJames ZeidlerKeith Q.T. ZhangPing ZhangQian ZhangYongbing ZhangZhongwei ZhangBen ZhaoDongmei ZhaoLian ZhaoKan ZhengKarla Ziri-CastroJoachim Zottl

Page 14: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

XVI Organization

Conference Sponsors

Bell Canada

Research in Motion

Sun Microsystems

Technical Committee 6, Communication Systems, of theInternational Federation for Information Processing

Proceedings Sponsor

Software Telecommunications Group of theNortel Networks Institute, University of Waterloo

Page 15: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Table of Contents

Peer-to-Peer Networks

Topology-Aware Peer-to-Peer On-demand StreamingRongmei Zhang, Ali R. Butt, Y. Charlie Hu . . . . . . . . . . . . . . . . . . . . . . . 1

The Scalability of Swarming Peer-to-Peer Content DeliveryDaniel Stutzbach, Daniel Zappala, Reza Rejaie . . . . . . . . . . . . . . . . . . . . 15

Leopard: A Locality Aware Peer-To-Peer System with No Hot SpotYinzhe Yu, Sanghwan Lee, Zhi-Li Zhang . . . . . . . . . . . . . . . . . . . . . . . . . 27

PeerMint: Decentralized and Secure Accounting for Peer-to-PeerApplications

David Hausheer, Burkhard Stiller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Performance of Internet Protocols I

Highly Responsive and Efficient QoS Routing Using Pre- andOn-demand Computations Along with a New Normal Measure

Yanxing Zheng, Turgay Korkmaz, Wenhua Dou . . . . . . . . . . . . . . . . . . . . 53

An Architecture for Software-Based iSCSI: Experiences and AnalysesAnnie Foong, Gary McAlpine, Dave Minturn, Greg Regnier,Vikram Saletore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Reorder Density (RD): A Formal, Comprehensive Metric for PacketReordering

Nischal M. Piratla, Anura P. Jayasumana, Abhijit A. Bare . . . . . . . . . 78

Batch Scheduling Algorithms for Optical Burst Switching NetworksAyman Kaheel, Hussein Alnuweiri . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

Wireless Security

ECC Based Threshold Cryptography for Secure Data Forwarding andSecure Key Exchange in MANET (I)

Levent Ertaul, Weimin Lu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Page 16: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

XVIII Table of Contents

Mutual Authentication and Key Exchange Protocols with AnonymityProperty for Roaming Services

Yixin Jiang, Chuang Lin, Xuemin Shen, Minghui Shi . . . . . . . . . . . . . . 114

An Energy-Efficient Image Representation for Secure Mobile SystemsTim Woo, Catherine Gebotys, Sagar Naik . . . . . . . . . . . . . . . . . . . . . . . . . 126

Efficient Clustering for Multicast Key Distribution in MANETsMohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor . . . . . . . 138

Network Security

Using Secure Coprocessors to Protect Access to Enterprise NetworksHaidong Xia, Jayashree Kanchana, Jose Carlos Brustoloni . . . . . . . . . . 154

Trusted Security Devices for Bandwidth Conservation in IPSecEnvironments

C.D. Mano, A. Striegel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

LIPS: Lightweight Internet Permit System for Stopping UnwantedPackets

Changho Choi, Yingfei Dong, Zhi-Li Zhang . . . . . . . . . . . . . . . . . . . . . . . 178

Victim-Assisted Mitigation Technique for TCP-Based Reflector DDoSAttacks

Basheer Al-Duwairi, G. Manimaran . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

Wireless Performance

Performance Analysis of the Uplink of a CDMA Cell Supporting ElasticServices

Gabor Fodor, Miklos Telek . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

Queue Analysis for Wireless Packet Data TrafficShahram Teymori, Weihua Zhuang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

Modeling a Beacon Enabled 802.15.4 Cluster with Bidirectional TrafficJelena Misic, Shairmina Shafi, Vojislav B. Misic . . . . . . . . . . . . . . . . . . 228

Analysis of Windowing and Peering Schemes for Cache Coherency inMobile Devices

Sandhya Narayan, Julee Pandya, Prasant Mohapatra,Dipak Ghosal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240

Page 17: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Table of Contents XIX

Network Service Support

Fast Scalable Robust Node EnumerationRichard Black, Austin Donnelly, Alexandru Gavrilescu,Dave Thaler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252

gTrace: Simple Mechanisms for Monitoring of Multicast SessionsGısli Hjalmtysson, Olafur Ragnar Helgason, Bjorn Brynjulfsson . . . . . 264

Toward Feasibility and Scalability of Session Initiation and DynamicQoS Provisioning in Policy-Enabled Networks

Kamel Haddadou, Yacine M. Ghamri-Doudane, Marc Girod-Genet,Ahmed Meddahi, Laurent Bernard, Gilles Vanwormhoudt,Hossam Afifi, Nazim Agoulmine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

Modeling Soft State Protocols with SDLXiaoming Fu, Dieter Hogrefe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

Network Modeling and Simulations

Inferring Traffic Burstiness by Sampling the Buffer OccupancyMichel Mandjes, Remco van de Meent . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303

Modeling Available Bandwidth for an Efficient QoS Characterizationof a Network Path

Alexander Chobanyan, Matt W. Mutka, V.S. Mandrekar, Ning Xi . . . . 316

Reducing Large Internet Topologies for Faster SimulationsV. Krishnamurthy, M. Faloutsos, M. Chrobak, L. Lao, J-H. Cui,A.G. Percus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328

Dimensioning the Contention Channel of DOCSIS Cable ModemNetworks

J. Lambert, B. Van Houdt, C. Blondia . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342

Wireless LANs

CONTI: Constant-Time Contention Resolution for WLAN AccessZakhia G. Abichar, J. Morris Chang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

Efficient 3G/WLAN Interworking Techniques for Seamless RoamingServices with Location-Aware Authentication

Minsoo Lee, Gwanyeon Kim, Sehyun Park, Sungik Jun,Jaehoon Nah, Ohyoung Song . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

Page 18: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

XX Table of Contents

A New per-Class Flow Fixed Proportional Differentiated Service forMulti-service Wireless LAN

Meng Chang Chen, Li-Ping Tung, Yeali S. Sun,Wei-Kuan Shih . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382

Reservation and Grouping Stations for the IEEE 802.11 DCFYang Xiao, Haizhon Li, Kui Wu, Kin K. Leung, Qiang Ni . . . . . . . . . . 395

Optical Networking

Path Switching in OBS NetworksLi Yang, George N. Rouskas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406

A Priority-Aware Protection Technique for Quality of Service EnabledWDM Networks

W. Fawaz, F. Martignon, K. Chen, G. Pujolle . . . . . . . . . . . . . . . . . . . . . 419

Wavelength Rerouting in Survivable WDM NetworksYingyu Wan, Weifa Liang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

Performance of Internet & Web Applications

Performance of Server Selection Algorithms for Content ReplicationNetworks

David Starobinski, Tao Wu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443

Local Utility Aware Content ReplicationNikolaos Laoutaris, Orestis Telelis, Vassilios Zissimopoulos,Ioannis Stavrakakis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455

Improving Network Convergence Time and Network Stability of anOSPF-Routed IP Network

Amir Siddiqi, Biswajit Nandy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

Ad Hoc Networks I

Non-cooperative Forwarding in Ad-Hoc NetworksEitan Altman, Arzad A. Kherani, Pietro Michiardi, Refik Molva . . . . . 486

Efficient Broadcasting in Ad Hoc Networks Using Directional AntennasFei Dai, Jie Wu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499

Page 19: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Table of Contents XXI

Trellis-Based Virtual Regular Addressing Structures in Self-organizedNetworks

Julien Ridoux, Anne Fladenmuller, Yannis Viniotis,Kave Salamatian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511

Adaptive Networking

Network of Shortcuts: An Adaptive Data Structure for Tree-BasedSearch Methods

Andrea Bergamini, Lukas Kencl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523

Multipath Routing Algorithms for Congestion MinimizationRon Banner, Ariel Orda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536

Improving TCP in Wireless Networks with an Adaptive Machine-LearntClassifier of Packet Loss Causes

Ibtissam El Khayat, Pierre Geurts, Guy Leduc . . . . . . . . . . . . . . . . . . . . . 549

Performance of Internet Protocols II

A Multiple Time-Scale Model for TCP Bandwidth Sharing Under UserHeterogeneity

Dirk Abendroth, Hans van den Berg, Michel Mandjes . . . . . . . . . . . . . . . 561

A Multizone Pipeline Cache for IP RoutingSoraya Kasnavi, Paul Berube, Vincent C. Gaudet,Jose Nelson Amaral . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574

Aggregated Aggressiveness Control on Groups of TCP FlowsSoohyun Cho, Riccardo Bettati . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586

Radio Resource Management

Multi-level Dynamic Guard Channels for Priority Access in CellularSystems

Tung Chong Wong, Jon W. Mark, Kee Chaing Chua . . . . . . . . . . . . . . . 598

Slotted Aloha with Priorities and Random PowerE. Altman, D. Barman, A. Benslimane, R. El Azouzi . . . . . . . . . . . . . . 610

Downlink Packet Scheduling with Minimum Throughput Guarantee inTDD-OFDMA Cellular Network

Young Min Ki, Eun Sun Kim, Sung Il Woo, Dong Ku Kim . . . . . . . . . 623

Page 20: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

XXII Table of Contents

Internet Routing

Making IGP Routing Robust to Link FailuresAshwin Sridharan, Roch Guerin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634

Interdomain Ingress Traffic Engineering Through Optimized AS-PathPrepending

Ruomei Gao, Constantinos Dovrolis, Ellen W. Zegura . . . . . . . . . . . . . 647

Describing and Simulating Internet RoutesJeremie Leguay, Matthieu Latapy, Timur Friedman,Kave Salamatian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659

A Growth-Based Address Allocation Scheme for IPv6Mei Wang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671

Queuing Models

Are Multiple Descriptions Better Than One?Gyorgy Dan, Viktoria Fodor, Gunnar Karlsson . . . . . . . . . . . . . . . . . . . . 684

An Approximate Queueing Model for Limited-Range WavelengthConversion in an OBS Switch

Vishwas S. Puttasubbappa, Harry G. Perros . . . . . . . . . . . . . . . . . . . . . . . 697

On Fairness, Optimal Download Performance and ProportionalReplication in Peer-to-Peer Networks

Saurabh Tewari, Leonard Kleinrock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709

A Novel Direct Upper Approximation for Workload Loss Ratio inGeneral Buffered Systems

Jozsef J. Bıro, Andras Gulyas, Zalan Heszberger . . . . . . . . . . . . . . . . . . . 718

Network Monitoring, Measurement and Profiling

PISA: Automatic Extraction of Traffic SignaturesParminder Chhabra, Ajita John, Huzur Saran . . . . . . . . . . . . . . . . . . . . . 730

FPL-3: Towards Language Support for Distributed Packet ProcessingMihai Lucian Cristea, Willem de Bruijn, Herbert Bos . . . . . . . . . . . . . 743

Efficient Deployment of Honeynets for Statistical and Forensic Analysisof Attacks from the Internet

Stephan Riebach, Erwin P. Rathgeb, Birger Toedtmann . . . . . . . . . . . . . 756

Page 21: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Table of Contents XXIII

Measuring Round Trip Times to Determine the Distance BetweenWLAN Nodes

Andre Gunther, Christian Hoene . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768

Network Management Systems

End-to-End Asymmetric Link Capacity EstimationLing-Jyh Chen, Tony Sun, Guang Yang, M.Y. Sanadidi,Mario Gerla . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 780

Impact of Resource Sharability on Dual Failure Restorability in OpticalMesh Networks

Chadi Assi, Wei Huo, Abdallah Shami . . . . . . . . . . . . . . . . . . . . . . . . . . . . 792

Efficient Distributed Solution for MPLS Fast RerouteDongmei Wang, Guangzhi Li . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804

Pricing for Heterogeneous Services at a Discriminatory ProcessorSharing Queue

Yezekael Hayel, Bruno Tuffin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816

Sensor and Ad Hoc Networks

Joint Sensor Selection and Data Routing in Sensor NetworksOzgur Ercetin, Ozgur Gurbuz, Kerem Bulbul, Aylin Aksu . . . . . . . . . . . 828

Peer Collaboration in Wireless Ad Hoc NetworksLin Cai, Jianping Pan, Xuemin Shen, Jon W. Mark . . . . . . . . . . . . . . . 840

Fireworks: An Adaptive Group Communications Protocol for MobileAd Hoc Networks

Lap Kong Law, Srikanth V. Krishnamurthy, Michalis Faloutsos . . . . . . 853

An Optimized TCP for Internet Access of Vehicular Ad Hoc NetworksMarc Bechler, Sven Jaap, Lars Wolf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869

Overlay Multicast

Cooperative Failure Detection in Overlay MulticastMengkun Yang, Zongming Fei . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881

Eliminating Bottlenecks in Overlay MulticastMin Sik Kim, Yi Li, Simon S. Lam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893

Page 22: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

XXIV Table of Contents

TOMA: A Viable Solution for Large-Scale Multicast Service SupportLi Lao, Jun-Hong Cui, Mario Gerla . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906

Quality of Service

The Burstiness Behavior of Regulated Flows in NetworksYu Ying, Ravi Mazumdar, Catherine Rosenberg,Fabrice Guillemin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 918

A Credit-Based Active Queue Management (AQM) Mechanism toAchieve Fairness in the Internet

Gwyn Chatranon, Miguel A. Labrador, Sujata Banerjee . . . . . . . . . . . . . 930

Optimizing End-to-End Throughput for Data Transfers on anOverlay-TCP Path

Pradnya Karbhari, Mostafa Ammar, Ellen Zegura . . . . . . . . . . . . . . . . . . 943

Wireless Scheduling

Randomized Coverage-Preserving Scheduling Schemes for WirelessSensor Networks

Chong Liu, Kui Wu, Valerie King . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 956

Dynamic Scheduling for Scalable Media Transmission over cdma20001xEV-DO Broadcast and Multicast Networks

Kyungtae Kang, Jinsung Cho, Yongwoo Cho, Heonshik Shin . . . . . . . . . 968

Proxy-Assisted Scheduling for Energy-Efficient Multimedia Streamingover Wireless LAN

Fan Zhang, Samuel T. Chanson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980

Improving Multicast Communication

Encodings of Multicast TreesVijay Arya, Thierry Turletti, Shivkumar Kalyanaraman . . . . . . . . . . . . 992

Efficient Bandwidth Guaranteed Restoration Algorithms for MulticastConnections

William Lau, Sanjay Jha, Suman Banerjee . . . . . . . . . . . . . . . . . . . . . . . . 1005

Scheduling Uplink Bandwidth in Application-Layer Multicast TreesSridhar Srinivasan, Ellen Zegura . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1018

Page 23: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Table of Contents XXV

Traffic Management and Engineering I

A Novel Packet Marking Function for Real-Time Interactive MPEG-4Video Applications in a Differentiated Services Network

Shane O’Neill, Alan Marshall, Roger Woods . . . . . . . . . . . . . . . . . . . . . . . 1031

On Multipath Routing with Transit HubsA. Sen, B. Hao, B.H. Shen, S. Murthy, S. Ganguly . . . . . . . . . . . . . . . . 1043

Comparison of Border-to-Border Budget Based Network AdmissionControl and Capacity Overprovisioning

Ruediger Martin, Michael Menth, Joachim Charzinski . . . . . . . . . . . . . . 1056

Ad Hoc Networks II

RIDA: Robust Intrusion Detection in Ad Hoc NetworksDhanant Subhadrabandhu, Saswati Sarkar, Farroq Anjum . . . . . . . . . . . 1069

Self-configurable Key Pre-distribution in Mobile Ad Hoc NetworksClaude Castelluccia, Nitesh Saxena, Jeong Hyun Yi . . . . . . . . . . . . . . . . 1083

Efficient Use of Route Requests for Loop-Free On-demand Routing inAd Hoc Networks

Hari Rangarajan, J.J. Garcia-Luna-Aceves . . . . . . . . . . . . . . . . . . . . . . . . 1096

Traffic Management and Engineering II

Penalty Shaper to Enforce Assured Service for TCP FlowsEmmanuel Lochin, Pascal Anelli, Serge Fdida . . . . . . . . . . . . . . . . . . . . . 1108

QoS Dynamic Routing in Content Delivery NetworksKrzysztof Walkowiak . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1120

Exploiting Traffic Localities for Efficient Flow State LookupTao Peng, Christopher Leckie, Kotagiri Ramamohanarao . . . . . . . . . . . 1133

The Interaction of Forward Error Correction and Active QueueManagement

Tigist Alemu, Yvan Calas, Alain Jean-Marie . . . . . . . . . . . . . . . . . . . . . . 1146

Mobility Management

ELIP: Embedded Location Information ProtocolFarid Benbadis, Marcelo Dias de Amorim, Serge Fdida . . . . . . . . . . . . . 1156

Page 24: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

XXVI Table of Contents

Coordinated Interaction Using Reliable Broadcast in Mobile WirelessNetworks

Theodore L. Willke, Nicholas F. Maxemchuk . . . . . . . . . . . . . . . . . . . . . . 1168

Delay Tolerant Mobile Networks (DTMNs): Controlled Flooding inSparse Mobile Networks

Khaled A. Harras, Kevin C. Almeroth, Elizabeth M. Belding-Royer . . . 1180

Application Signal Threshold Adaptation for Vertical Handoff inHeterogeneous Wireless Networks

Ben Liang, Ahmed H. Zahran, Aladdin O. M. Saleh . . . . . . . . . . . . . . . . 1193

Bandwidth Management

Justice: Flexible and Enforceable Per-Source Bandwidth AllocationJakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy . . . . . . . . 1206

A Novel Approach for Transparent Bandwidth ConservationDavid Salyers, Aaron Striegel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1219

Efficient Bandwidth Sharing in Bus-Based Optical Access NetworksAndre-Luc Beylot, Nizar Bouabdallah, Guy Pujolle . . . . . . . . . . . . . . . . . 1231

CDMA

Cross-Layer Radio Resource Allocation in Packet CDMA WirelessMobile Networks with LMMSE Receivers

Fei Yu, Vikram Krishnamurthy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1243

Stabilization of Contention-Based CDMA Ranging Channel in WirelessMetropolitan Area Networks

Jeong-Jae Won, Choong-Ho Cho, Hyong-Woo Lee,Victor C.M. Leung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1255

Load Balancing and Relaying Framework in TDD W-CDMA Multi-hopCellular Networks

Y. Hung Tam, Ahmed M. Safwat, Hossam S. Hassanein . . . . . . . . . . . . 1267

Wireless Resource Management

Stochastic Decision-Based Analysis of Admission Control Policy inMultimedia Wireless Networks

Nidal Nasser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1281

Page 25: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Table of Contents XXVII

Improving the Performance of Rate Adaptation Schemes inHeterogeneous Wireless Networks

P. Stathopoulos, L. Sarakis, N. Mitrou . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1297

Stochastic Admission Control for Quality of Service in Wireless PacketNetworks

Majid Ghaderi, Raouf Boutaba, Gary W. Kenward . . . . . . . . . . . . . . . . . 1309

Posters

Extending the Birkhoff-von-Neumann Switching Strategy to MulticastSwitches

Jay Kumar Sundararajan, Supratim Deb, Muriel Medard . . . . . . . . . . . 1321

A New TCP-Friendly Rate Control Algorithm for Scalable VideoStreams

Jinyao Yan, Martin May, Kostas Katrinis, Bernhard Plattner . . . . . . . 1326

802.11 Link Interference: A Simple Model and a PerformanceEnhancement

Hoon Chang, Vishal Misra . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1330

Impact of Routing Lags on Internet Routing FailuresFeng Wang, Lixin Gao . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1334

Control and Forwarding Plane Interaction in Distributed RoutersMarkus Hidell, Peter Sjodin, Olof Hagsand . . . . . . . . . . . . . . . . . . . . . . . . 1339

Performance Analysis of 802.11 WLANs Under Sporadic TrafficM. Garetto, C.-F. Chiasserini . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1343

Virtual Multi-Homing: On the Feasibility of Combining OverlayRouting with BGP Routing

Zhi Li, Prasant Mohapatra, Chen-Nee Chuah . . . . . . . . . . . . . . . . . . . . . . 1348

Measurement of Rain Attenuation of Microwaves at 12.25GHz in KoreaDong You Choi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1353

Scalable Route Selection for IPv6 Multihomed SitesCedric de Launois, Steve Uhlig, Olivier Bonaventure . . . . . . . . . . . . . . . 1357

On the Efficient Resource Allocation for High Quality Video Streamsand FTP Traffic over Next Generation Wireless Networks

Polychronis Koutsakis, Spyros Psychis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1362

Page 26: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

XXVIII Table of Contents

A Self-organizing Routing Scheme for Random NetworksThomas Fuhrmann . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1366

A Novel Extension for On-demand Routing Protocol in Event-DrivenSensor Networks

Dong-Hyun Chae, Kyu-Ho Han, Kyung-Soo Lim, Sun-Shin An . . . . . . 1370

Equivalent Gibbs Duhem Law in Network QueueSandeep Sudeep, Joseph Y. Hui . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1374

Bandwidth Sharing of Low Priority Services for Efficient Call AdmissionControl in Cellular Networks

Kyungkoo Jun, Seokhoon Kang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1379

COPACC: A Cooperative Proxy-Client Caching System for On-demandMedia Streaming

Alan T.S. Ip, Jiangchuan Liu, John C.S. Lui . . . . . . . . . . . . . . . . . . . . . . 1383

A Rule-Based Approach for Consistent Proportional DelayDifferentiation

Jianbin Wei, Cheng-Zhong Xu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1388

Extended Dominating Set in Ad Hoc Networks Using CooperativeCommunication

Jie Wu, Mihaela Cardei, Fei Dai, Shuhui Yang . . . . . . . . . . . . . . . . . . . . 1393

INTERMON: An Architecture for Inter-domain Monitoring, Modellingand Simulation

Elisa Boschi, Salvatore D’Antonio, Paul Malone, Carsten Schmoll . . . 1397

An UNA-Based Approach to Support Mobility in the InternetMahnhoon Lee, Yongik Yoon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1401

QoS Scalable Tree AggregationJoanna Moulierac, Alexandre Guitton . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1405

Supermedia Transport for Teleoperations over Overlay NetworksZhiwei Cen, Matt W. Mutka, Danyu Zhu, Ning Xi . . . . . . . . . . . . . . . . 1409

A Simple and Fast Algorithm for Bluetooth Network FormationYuh-Jzer Joung, Geng-Dian Hwang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1413

A Node Cooperative ARQ Scheme for Wireless Ad-Hoc NetworksMehrdad Dianati, Xinhua Ling, Sagar Naik, Xuemin Shen . . . . . . . . . . 1418

Page 27: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

Table of Contents XXIX

SWATCH: a StepWise AdapTive Clustering Hierarchy in WirelessSensor Networks

Quanhong Wang, Kenan Xu, Hossam Hassanein, Glen Takahara . . . . 1422

Design and Performance Evaluation of WDM/TDMA-Based MACProtocol in AWG-Based WDM-PON

Kyeong-Eun Han, Yang He, Seung-Hyun Lee, Biswanath Mukherjee,Young-Chon Kim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1426

A Backup Tree Algorithm for Multicast Overlay NetworksTorsten Braun, Vijay Arya, Thierry Turletti . . . . . . . . . . . . . . . . . . . . . . 1430

Tradeoffs for Web Communications Fast AnalysisOlivier Paul, Jean-Etienne Kiba . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1435

Benefits of Multiple Battery Levels for the Lifetime of Large WirelessSensor Networks

Mihail L. Sichitiu, Rudra Dutta . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1440

Enhanced Data Services in GPRS Networks via Auction-Based Pricesfor Admission

Saravut Yaipairoj, Fotios C. Harmantzis . . . . . . . . . . . . . . . . . . . . . . . . . . 1445

Achieving Stability and Fairness in Mobile Ad Hoc NetworksAhmed M. Mahdy, Jitender S. Deogun, Jun Wang . . . . . . . . . . . . . . . . . 1449

A Novel Method for SCTP Load SharingAndreas Jungmaier, Erwin P. Rathgeb . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1453

Attaining VoIP–Grade QoS via Deflection: A Buffer Space TradeoffStudy

Andre Muezerie, Ioanis Nikolaidis, Pawel Gburzynski . . . . . . . . . . . . . . . 1457

Applying the DiffServ Model to a Resilient Packet Ring NetworkFredrik Davik, Stein Gjessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1461

Maximizing the Number of Connections in Multifiber WDM Chain,Ring and Star Networks

Katerina Potika . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1465

A Hierarchical Secure Ring-Oriented Multicast Protocol over MobileAd Hoc Network

Choong Seon Hong, Yubai Yang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1471

Page 28: Lecture Notes in Computer Science 3462978-3-540-32017-3/1.pdf · Raouf Boutaba Kevin Almeroth Ramon Puigjaner Sherman Shen James P. Black (Eds.) NETWORKING 2005 Networking Technologies,

XXX Table of Contents

Performance Analysis of a Multimedia CDMA System Using DynamicRate Control

Seung Sik Choi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1475

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1479