Information Networking Advances in Data Communications and Wireless Networks: International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected PapersThis volume, LNCS 3961, contains the papers selected from those presented at the International Conference on Information Networking 2006 (ICOIN 2006), held in Sendai, Japan. ICOIN 2006 constituted the 20th Anniversary of ICOIN. This year's conference program mainly focused on the field of ubiquitous and overlay networks, and on technology for ad hoc and sensor networks, mobile networks, transport networks, QoS and resource management, network security, peer-to-peer and overlay networks, resource management, and their applications. In response to the call for papers, 468 papers were submitted by authors from 23 different countries from Europe, the Middle East, and the Americas. Each paper was evaluated by two or three internationally known experts to assure the excellence of the papers presented at ICOIN 2006. To keep within the conference topics, some excellent papers had to be rejected to our regret. After extensive reviews, 141 papers were chosen for presentation in 25 technical sessions. Furthermore, another review of these papers was performed during presentation, and finally 98 papers were selected for printing in LNCS 3961. We expect this will add to the excellence of ICOIN 2006. The papers in LNCS 3961 are categorized into 8 sections: Mobile and Ubiquitous Networking, Ad Hoc and Sensor Networks, Advanced Networking, QoS and Resource Management, Network and Transport Protocols, Network Security, Applications and Services, and Peer-to-Peer and Overlay Networks, ranging from information networking to applications in next generation networks. |
Contents
An Efficient Network Mobility Protocol in IPv6 | 3 |
A Power Control MAC Protocol Based on Fragmentation for 802 | 11 |
Route Enhancement Scheme Using HMIP in Heterogeneous Wireless | 21 |
Resource Reservation for Multi Classes and Regions over OFDMBased | 42 |
Performance Evaluation of Public Key Based Mechanisms for Mobile | 62 |
Efficient Mechanism for Source Mobility in Source Specific Multicast | 82 |
Fast IP Handover for Multimedia Services in Wireless Train | 102 |
Hierarchical Synchronized Multimedia Multicast for Mobile Hosts | 112 |
Improving Delay Characteristics of RealTime Flows by Adaptive Early | 461 |
Voice Traffic Characterization Models in VoIP Transport Network Ilyoung Chong ChulWoon Jang HyunKook Kahng | 473 |
On Flow Distribution over Multiple Paths Based on Traffic | 483 |
Open and Association MCTAs Access and Allocation Scheme | 493 |
CumulativeTIM Method for the Sleep Mode in IEEE 802 16e Wireless | 502 |
An OverloadResilient Flow Removal Algorithm for MLWDF | 512 |
Sink TreeBased Bandwidth Allocation for Scalable QoS Flow SetUp James Lembke Byung Kyu Choi | 521 |
A QoSBased Adaptive Resource Sharing Protection for Optical Burst | 532 |
A New Distributed Scheduling Algorithm to Guarantee QoS Parameters | 132 |
The Soft QoSAware Call Admission Control Scheme for HCCA | 146 |
A Quality of RelayBased Routing Scheme in Multihop Cellular | 166 |
Service Discovery in Mobile Ad Hoc Networks | 186 |
Load Balancing Mechanisms in the MANET with Multiple Internet | 207 |
Multihop Networks | 227 |
PolicyBased Management in Ad Hoc Networks Using Geographic | 237 |
Effects of Storage Architecture on Performance of Sensor Network | 247 |
MobilityAware Distributed Topology Control for Mobile Multihop | 257 |
Synchronizing TCP with Block Acknowledgement over Multihop | 267 |
A GridBased Manycast Scheme for Large Mobile Ad Hoc Networks | 276 |
A GridBased Tracking Mechanism with Satisfaction of Energy | 286 |
Frame Size Adaptive MAC Protocol in LowRate Wireless Personal | 296 |
A Flexible Localization Scheme Based on RFID | 306 |
Security Enhancement Mechanism for AdHoc OLSR Protocol Inshil Doh Kijoon Chae Howon Kim Kyoil Chung | 317 |
Mitigating Route Request Flooding Attacks in Mobile Ad | 327 |
Performance Analysis of an Efficient Network Transition Mechanism | 338 |
LoadAdaptive Internet Gateway Discovery for Ubiquitous | 349 |
Fast Restoration of ResilienceGuaranteed Segments Under Multiple | 359 |
Impact of Burst Control Packet Congestion on Burst Loss Rate | 369 |
A New Congestion Control for Fast LongDistance Networks | 379 |
Dynamic Routing Tables Using Simple Balanced Search Trees | 389 |
On the Use of Balking for Estimation of the Blocking Probability | 399 |
Dropping Policy for Improving the Throughput of TCP over Optical | 409 |
A LoadBalanced Semiminimal Routing Algorithm in Cellular | 419 |
A Study of Matching Output Queueing with a 3DVOQ Switch DingJyh Tsaur HsuanKuei Cheng ChiaLung Liu Woei Lin | 429 |
BGP Route Selection Notice | 440 |
Unicast and Multicast RWA Algorithms in DWDMBased OVPN | 450 |
Request Scheduling for Differentiated QoS at Website Gateway ChingMing Tien ShuoYen Wen YingDar Lin YuanCheng Lai | 542 |
A TunnelBased QoS Management Framework for Delivering | 552 |
A Resource Management Mechanism for Hose Model Based VPN | 562 |
Analysis of Multimedia Streaming Service over ServerBased | 572 |
Performance Evaluation and Comparison of Two Random Walk | 582 |
A New Sampling Method for Recording More | 590 |
A Deep Study on Traffic Sampling Performance Evaluation of an Enhanced DistanceBased Registration | 610 |
Interoperability Experiences on Integrating Between Different Active | 630 |
Enhancing TCP Throughput and Fairness with a TimerBased | 650 |
Improved Wireless TCP by Discriminative Control Using Loss Cause | 670 |
ApplicationRate Aware Congestion Control Algorithm for Video | 690 |
Proposal for a Practical Cipher Communication Protocol That | 713 |
TopologyAware Key Management Scheme for Secure Overlay | 733 |
SVM Based Packet Marking Technique for Traceback on Malicious | 754 |
Detecting Unknown Worms Using Randomness Check | 775 |
An IP Address Anonymization Scheme with Multiple Access Levels | 793 |
Design of a Video Door Phone Service Providing Personal Mobility | 815 |
An Early Decision Algorithm to Accelerate Web Content Filtering | 833 |
NearDuplicate Mail Detection Based on URL Information for Spam | 842 |
A Protocol Switching Scheme for Developing Network Management | 862 |
A Realization Method of Voice over IP System Passing Through | 883 |
Integration of Ontologies and Semantic Annotations with Resource | 902 |
Performance Evaluation of QoSAware Routing in Overlay Network | 925 |
Dynamic Algorithms to Provide a Robust and Scalable Overlay | 945 |
A Decentralized Scheme for NetworkAware Reliable Overlay | 955 |
Heterogeneity Aware P2P Algorithm by Using Mobile nodeID | 975 |
Author Index | 995 |
Other editions - View all
Common terms and phrases
ad hoc networks algorithm analysis AODV architecture attack average bandwidth Berlin Heidelberg 2006 BIC TCP blocking probability buffer burst cell channel communication Computer congestion control connection CWND destination detection distributed DRSSI efficient entity evaluate flows gateway grid handover header hoc networks HSMM HSTCP ICOIN IEEE IETF increases INFOCOM Internet IP address IPv4 IPv6 Kawahara Eds Korea KTOM latency layer MCGA mechanism metric mobile host Mobile IP Mobile Networks mobile nodes multicast tree NEMO optimal overhead packet loss paper parameters path performance prefix priority proposed scheme queue queuing delay random received registration relaying request resource router RREQs sampling Scalable Section sends sensor server shows simulation results switch Table TFRC throughput topology traffic transmission range transmitted trust rating tunnel TXOP update vertical handoff VoIP wireless networks WLAN