首页 > 最新文献

2008 Third International Conference on Systems and Networks Communications最新文献

英文 中文
Impacts of Transmission Range in Homogeneous Wireless Networks 同质无线网络中传输距离的影响
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.64
M. Djoudi
In this paper the issue of transmission range in homogeneous wireless networks (HWNs) is addressed. In such networks, wireless mobile nodes are assumed to use the same transmission ranges. In HWNs, higher transmission ranges reduce the number of hops that packets need to reach their destinations, but they also increase the number of nodes that locally compete for the medium access. On the other hand, shorter transmission ranges allow simultaneous transmissions in different areas of the network. However, for such short transmission ranges the probability of a disconnected network increases. To deal with the fore mentioned dilemma, a new approach based on analytically defining an initial transmission range that keeps the network connected is presented herein. The simulation carried out under various network loads has focused on a set of metrics, namely: packets delivery ratio, average end to end delay and normalized routing overhead. The simulation results have shown that using short transmission range may not lead always to optimal performance.
本文研究了同构无线网络(HWNs)的传输距离问题。在这种网络中,假定无线移动节点使用相同的传输范围。在hwn中,更高的传输距离减少了数据包到达目的地所需的跳数,但也增加了本地竞争介质访问的节点数量。另一方面,较短的传输距离允许在网络的不同区域同时传输。然而,对于如此短的传输范围,网络断开的可能性增加了。为了解决上述困境,本文提出了一种基于解析定义保持网络连接的初始传输范围的新方法。在各种网络负载下进行的仿真集中在一组指标上,即:数据包传送率、平均端到端延迟和规范化路由开销。仿真结果表明,使用较短的传输距离不一定能获得最佳性能。
{"title":"Impacts of Transmission Range in Homogeneous Wireless Networks","authors":"M. Djoudi","doi":"10.1109/ICSNC.2008.64","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.64","url":null,"abstract":"In this paper the issue of transmission range in homogeneous wireless networks (HWNs) is addressed. In such networks, wireless mobile nodes are assumed to use the same transmission ranges. In HWNs, higher transmission ranges reduce the number of hops that packets need to reach their destinations, but they also increase the number of nodes that locally compete for the medium access. On the other hand, shorter transmission ranges allow simultaneous transmissions in different areas of the network. However, for such short transmission ranges the probability of a disconnected network increases. To deal with the fore mentioned dilemma, a new approach based on analytically defining an initial transmission range that keeps the network connected is presented herein. The simulation carried out under various network loads has focused on a set of metrics, namely: packets delivery ratio, average end to end delay and normalized routing overhead. The simulation results have shown that using short transmission range may not lead always to optimal performance.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114062907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gradual Adaption Model for Estimation of User Information Access Behavior 用户信息访问行为估计的逐步适应模型
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.56
Jing Chen, Roman Y. Shtykh, Qun Jin
In this study, we propose a gradual adaption model for estimation of user information access behavior. A variety of userspsila information access data are collected by unit of a day for each user, and analyzed in terms of short, medium, long periods, and by remarkable and exceptional categories. The proposed model is then established by analyzing the pre-processed data based on Full Bayesian Estimation. We further present experimental simulation results, and show the operability and effectiveness of our proposed model.
在本研究中,我们提出了一个渐进适应模型来估计用户信息访问行为。以每天为单位收集每个用户的各种用户信息访问数据,并按短期、中期、长期、显著和异常类别进行分析。然后基于全贝叶斯估计对预处理数据进行分析,建立模型。最后给出了实验仿真结果,验证了所提模型的可操作性和有效性。
{"title":"Gradual Adaption Model for Estimation of User Information Access Behavior","authors":"Jing Chen, Roman Y. Shtykh, Qun Jin","doi":"10.1109/ICSNC.2008.56","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.56","url":null,"abstract":"In this study, we propose a gradual adaption model for estimation of user information access behavior. A variety of userspsila information access data are collected by unit of a day for each user, and analyzed in terms of short, medium, long periods, and by remarkable and exceptional categories. The proposed model is then established by analyzing the pre-processed data based on Full Bayesian Estimation. We further present experimental simulation results, and show the operability and effectiveness of our proposed model.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120938147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Preemption Algorithm Supporting Differentiated Services Aware Traffic Engineering 支持差异化业务感知流量工程的一种新的抢占算法
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.19
A. Kotti, R. Hamza, K. Bouleimen
This paper presents a new bandwidth preemption algorithm supporting differentiated services aware traffic engineering (DS-TE) in the multi-protocol label switching (MPLS). The paper presents the following contributions. Firstly, we look at the problem of organizing the mapping of label switching paths (LSPs) in an optimal way such that we can compromise between several traffic engineering (TE) objectives: load-balancing, avoiding network bottlenecks, reducing routing cost, and minimizing path hop count. Secondly, we introduce DS-TE bandwidth management and admission control mechanisms by proposing a new bandwidth preemption algorithm for the maximum allocation model (MAM). Finally, in our proposed scheme, we conduct preemption in tow dimensions: class type (CT) and preemption level so that an LSP of CT ct and priority p can not be preempted as long as any LSP of weaker precedence remains. A case study is also provided to show how our algorithm performs in MPLS networks where DS-TE is applied.
提出了一种支持多协议标签交换(MPLS)中差异化业务感知流量工程(DS-TE)的带宽抢占算法。本文提出了以下贡献。首先,我们研究了以最优方式组织标签交换路径(lsp)映射的问题,这样我们就可以在几个流量工程(TE)目标之间达成妥协:负载平衡、避免网络瓶颈、减少路由成本和最小化路径跳数。其次,通过提出一种新的最大分配模型(MAM)带宽抢占算法,引入了DS-TE带宽管理和准入控制机制。最后,在我们提出的方案中,我们从类类型(class type, CT)和抢占级别两个维度进行抢占,使得CT CT和优先级p的LSP只要有优先级较弱的LSP存在,就不会被抢占。本文还通过一个案例研究展示了我们的算法在应用DS-TE的MPLS网络中的性能。
{"title":"A New Preemption Algorithm Supporting Differentiated Services Aware Traffic Engineering","authors":"A. Kotti, R. Hamza, K. Bouleimen","doi":"10.1109/ICSNC.2008.19","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.19","url":null,"abstract":"This paper presents a new bandwidth preemption algorithm supporting differentiated services aware traffic engineering (DS-TE) in the multi-protocol label switching (MPLS). The paper presents the following contributions. Firstly, we look at the problem of organizing the mapping of label switching paths (LSPs) in an optimal way such that we can compromise between several traffic engineering (TE) objectives: load-balancing, avoiding network bottlenecks, reducing routing cost, and minimizing path hop count. Secondly, we introduce DS-TE bandwidth management and admission control mechanisms by proposing a new bandwidth preemption algorithm for the maximum allocation model (MAM). Finally, in our proposed scheme, we conduct preemption in tow dimensions: class type (CT) and preemption level so that an LSP of CT ct and priority p can not be preempted as long as any LSP of weaker precedence remains. A case study is also provided to show how our algorithm performs in MPLS networks where DS-TE is applied.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modified DMAC Clustering Algorithm for VANETs 改进的VANETs DMAC聚类算法
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.28
G. Wolny
In this paper a new clustering algorithm for vehicular ad-hoc networks (VANET) is presented. The proposed solution is a modification of the Basagnipsilas distributed and mobility-adaptive clustering (DMAC) algorithm. Some additional conditions that have to be fulfilled before the cluster head change, are introduced to better suit the road traffic. Tests performed in the simulation environment consisting of VanetMobiSim and JiST/SWANS++ show that algorithm performs better than the original solution - the clusters stability is significantly increased.
提出了一种新的车载自组织网络聚类算法。提出的解决方案是对Basagnipsilas分布式和移动自适应聚类(DMAC)算法的改进。为了更好地适应道路交通,引入了在簇头改变之前必须满足的一些附加条件。在VanetMobiSim和JiST/SWANS++仿真环境中进行的测试表明,该算法的性能优于原方案,簇的稳定性显著提高。
{"title":"Modified DMAC Clustering Algorithm for VANETs","authors":"G. Wolny","doi":"10.1109/ICSNC.2008.28","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.28","url":null,"abstract":"In this paper a new clustering algorithm for vehicular ad-hoc networks (VANET) is presented. The proposed solution is a modification of the Basagnipsilas distributed and mobility-adaptive clustering (DMAC) algorithm. Some additional conditions that have to be fulfilled before the cluster head change, are introduced to better suit the road traffic. Tests performed in the simulation environment consisting of VanetMobiSim and JiST/SWANS++ show that algorithm performs better than the original solution - the clusters stability is significantly increased.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
Wireless Routing Protocol Based on Trust Evaluation 基于信任评估的无线路由协议
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.74
Ben Arbia Anis, Hédi Hamdi, Youssef Habib
Wireless networks have specific characteristics that are totally different from conventional networks. In fact, ad hoc networks are closely depending on the distributed cooperation among mobile nodes. Deploying trust evaluation in such environment will be an extra challenge. In this paper, we present a newest model permitting trust evaluation and establishment based on ad hoc routing protocol. Trust evaluation and establishment provide representing, evaluating and maintaining trust within the network, and serve as the basis for higher level routing operations. Our model is an events-based according to the routingpsilas relationships between mobile nodes. Logical and computational trust analysis and evaluation are deployed among network nodes. Each node's evaluation of trust on other nodes should be based on experience statistics computed around two routing events: NRE (new route events) and RFE (route failure events). First ones refer to the new requests or responses in order to establish a new route; however, second ones are consequences of a loss or errors due to existing route problems. To ensure efficiency, the experience statistics are computed by being based on linear temporal logic (LTL) model. Finally and in order to prove the applicability of the proposed solution, we further present an adaptive routing protocol (A2ODV: adaptive AODV) and analyze its efficiency around some performances metrics.
无线网络具有与传统网络完全不同的特点。事实上,自组织网络密切依赖于移动节点之间的分布式协作。在这样的环境中部署信任评估将是一个额外的挑战。本文提出了一种新的基于自组织路由协议的信任评估和建立模型。信任的评估和建立为网络内的信任提供了表征、评估和维护,是进行更高层路由操作的基础。根据移动节点之间的路由关系,我们的模型是基于事件的。在网络节点之间部署逻辑和计算信任分析与评估。每个节点对其他节点信任的评估应该基于围绕两个路由事件计算的经验统计:NRE(新路由事件)和RFE(路由失败事件)。第一种是为了建立新的路由而提出的新的请求或响应;然而,第二种是由于存在路由问题而导致的丢失或错误的后果。为了保证效率,基于线性时间逻辑(LTL)模型计算经验统计量。最后,为了证明该方案的适用性,我们进一步提出了一种自适应路由协议(A2ODV: adaptive AODV),并围绕一些性能指标分析了其效率。
{"title":"Wireless Routing Protocol Based on Trust Evaluation","authors":"Ben Arbia Anis, Hédi Hamdi, Youssef Habib","doi":"10.1109/ICSNC.2008.74","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.74","url":null,"abstract":"Wireless networks have specific characteristics that are totally different from conventional networks. In fact, ad hoc networks are closely depending on the distributed cooperation among mobile nodes. Deploying trust evaluation in such environment will be an extra challenge. In this paper, we present a newest model permitting trust evaluation and establishment based on ad hoc routing protocol. Trust evaluation and establishment provide representing, evaluating and maintaining trust within the network, and serve as the basis for higher level routing operations. Our model is an events-based according to the routingpsilas relationships between mobile nodes. Logical and computational trust analysis and evaluation are deployed among network nodes. Each node's evaluation of trust on other nodes should be based on experience statistics computed around two routing events: NRE (new route events) and RFE (route failure events). First ones refer to the new requests or responses in order to establish a new route; however, second ones are consequences of a loss or errors due to existing route problems. To ensure efficiency, the experience statistics are computed by being based on linear temporal logic (LTL) model. Finally and in order to prove the applicability of the proposed solution, we further present an adaptive routing protocol (A2ODV: adaptive AODV) and analyze its efficiency around some performances metrics.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133565647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improvement of TCP Performance in Ad Hoc Networks Using Cross Layer Approach 采用跨层方法改进Ad Hoc网络中TCP性能
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.47
S. M. Mirhosseini, F. Torgheh
Transmission Control Protocol (TCP) is known to suffer from performance degradation in mobile wireless environments. This is because such environments are prone to packet losses due to high bit error rates and mobility induced disconnections. TCP interprets packet losses as an indication of congestion and inappropriately invokes congestion control mechanisms, leading to degraded performance.In this paper, we propose a new mechanism that improves TCP performance in a wireless ad hoc network where we use multi-metric joint identification for congestion detection based on end-to-end measurements. On the other hand, in this paper we utilizes network layer feedback for identification of disconnection state furthermore when packets are lost due to channel error, the TCP sender retransmits packets without invoking congestion control.
众所周知,传输控制协议(TCP)在移动无线环境中存在性能下降的问题。这是因为这样的环境容易由于高误码率和移动导致的断开而导致数据包丢失。TCP将丢包解释为拥塞的指示,并不恰当地调用拥塞控制机制,从而导致性能下降。在本文中,我们提出了一种新的机制,可以提高无线自组织网络中的TCP性能,其中我们使用基于端到端测量的多度量联合识别进行拥塞检测。另一方面,本文利用网络层反馈来识别断开状态,并且当由于通道错误导致数据包丢失时,TCP发送方无需调用拥塞控制即可重传数据包。
{"title":"Improvement of TCP Performance in Ad Hoc Networks Using Cross Layer Approach","authors":"S. M. Mirhosseini, F. Torgheh","doi":"10.1109/ICSNC.2008.47","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.47","url":null,"abstract":"Transmission Control Protocol (TCP) is known to suffer from performance degradation in mobile wireless environments. This is because such environments are prone to packet losses due to high bit error rates and mobility induced disconnections. TCP interprets packet losses as an indication of congestion and inappropriately invokes congestion control mechanisms, leading to degraded performance.In this paper, we propose a new mechanism that improves TCP performance in a wireless ad hoc network where we use multi-metric joint identification for congestion detection based on end-to-end measurements. On the other hand, in this paper we utilizes network layer feedback for identification of disconnection state furthermore when packets are lost due to channel error, the TCP sender retransmits packets without invoking congestion control.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improvement of GPON MAC Protocol for IP TV Service IP电视业务中GPON MAC协议的改进
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.73
SeungKun Lee, Jong-Wook Jang, MoonHan Bae
PON (passive optical network) is the most promising technology applicable to TPS (triple play service). To improve processing the packet, MAC (multiple access control) is the most important technology in the PON. The core of MAC is DBA(dynamic bandwidth assignment), it classifies SR-DBA (status report DBA) and NSR-DBA (non status report DBA). However, it's bad in network efficiency because GPON DBA is using BPONpsilas DBA This study develop BR (borrow-refund)-DBA for improve network efficiency and prompt process. For take the gauge of performance evaluation, estimate about throughput, fairness and queue delay in SR-DBA and NSR-DBA environment.
无源光网络(PON)是三网融合(TPS)中最具应用前景的技术。为了提高对报文的处理能力,MAC (multiple access control)是PON中最重要的技术。MAC的核心是动态带宽分配(DBA),它分为SR-DBA(状态报告型DBA)和NSR-DBA(非状态报告型DBA)。然而,由于GPON DBA使用的是BPONpsilas DBA,导致网络效率下降。本研究开发了BR (borrow-refund)-DBA,以提高网络效率,加快流程。对SR-DBA和NSR-DBA环境下的吞吐量、公平性和队列延迟进行了性能评估。
{"title":"Improvement of GPON MAC Protocol for IP TV Service","authors":"SeungKun Lee, Jong-Wook Jang, MoonHan Bae","doi":"10.1109/ICSNC.2008.73","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.73","url":null,"abstract":"PON (passive optical network) is the most promising technology applicable to TPS (triple play service). To improve processing the packet, MAC (multiple access control) is the most important technology in the PON. The core of MAC is DBA(dynamic bandwidth assignment), it classifies SR-DBA (status report DBA) and NSR-DBA (non status report DBA). However, it's bad in network efficiency because GPON DBA is using BPONpsilas DBA This study develop BR (borrow-refund)-DBA for improve network efficiency and prompt process. For take the gauge of performance evaluation, estimate about throughput, fairness and queue delay in SR-DBA and NSR-DBA environment.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Evaluation of Reusable Learning Objects via a Decision Support System 基于决策支持系统的可重用学习对象的自动评估
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.11
S. Encheva, S. Tumin
Learning objects have been of great interest to educational organizations all over the globe. Once developed they need to be classified and presented to interested parties in the most effective and operational way. Serious classification problems have to be dealt with when the metadata attached to a learning object contains incomplete and/or in-consistent information. Many-valued logic is suggested for providing meaningful recommendations.
学习对象一直是全球教育机构非常感兴趣的问题。一旦制定出来,就需要对它们进行分类,并以最有效和可操作的方式提交给有关各方。当附加到学习对象的元数据包含不完整和/或不一致的信息时,必须处理严重的分类问题。建议使用多值逻辑来提供有意义的建议。
{"title":"Automated Evaluation of Reusable Learning Objects via a Decision Support System","authors":"S. Encheva, S. Tumin","doi":"10.1109/ICSNC.2008.11","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.11","url":null,"abstract":"Learning objects have been of great interest to educational organizations all over the globe. Once developed they need to be classified and presented to interested parties in the most effective and operational way. Serious classification problems have to be dealt with when the metadata attached to a learning object contains incomplete and/or in-consistent information. Many-valued logic is suggested for providing meaningful recommendations.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Algorithm for Selecting the Cluster Leader in a Partially Connected Sensor Network 部分连接传感器网络中集群Leader的选择算法
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.50
M. Mozumdar, F. Gregoretti, L. Lavagno, Laura Vanzago
Data aggregation is a basic mechanism that is used to reduce the traffic flow in sensor networks. In this mechanism, one node basically the cluster leader collects data from surrounding nodes and then sends the summarized information to upstream nodes. In this paper, we propose an algorithm to select cluster leader that will perform data aggregation in a partially connected sensor network. The algorithm also reduces the traffic flow inside the network by adaptively selecting the shortest route for packet routing to the cluster leader.
数据聚合是传感器网络中减少流量的一种基本机制。在这种机制中,一个节点基本上是集群的领导者,从周围的节点收集数据,然后将汇总的信息发送给上游节点。在本文中,我们提出了一种在部分连接的传感器网络中选择集群领导者进行数据聚合的算法。该算法还通过自适应选择最短路由将数据包路由到集群leader,从而减少网络内部的流量。
{"title":"An Algorithm for Selecting the Cluster Leader in a Partially Connected Sensor Network","authors":"M. Mozumdar, F. Gregoretti, L. Lavagno, Laura Vanzago","doi":"10.1109/ICSNC.2008.50","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.50","url":null,"abstract":"Data aggregation is a basic mechanism that is used to reduce the traffic flow in sensor networks. In this mechanism, one node basically the cluster leader collects data from surrounding nodes and then sends the summarized information to upstream nodes. In this paper, we propose an algorithm to select cluster leader that will perform data aggregation in a partially connected sensor network. The algorithm also reduces the traffic flow inside the network by adaptively selecting the shortest route for packet routing to the cluster leader.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Protecting the DNS Infrastructure of a Top Level Domain: Dynamic Firewalling with Network Sensors 保护顶级域的DNS基础设施:带有网络传感器的动态防火墙
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.68
João Afonso, P. Veiga
The security problems that plague network services today are increasing at a dramatic pace especially with the constant improvement of network transmission rates and the sheer amount of data exchanged. This translates to not only more attacks but also new types of attacks with network incidents becoming more and more frequent. A substantial part of the attacks occur at Top Level Domains (TLD) who have the mission of guaranteeing the correct functioning of Domain Name System (DNS) zones. This paper presents a proposal to simplify the detection of attacks, and reduce the number of false reports (negative and positive). Our goal is to create a group of techniques for real time monitoring of network traffic, based on network sensors that allow, in real time, to detect abnormal network behaviour and produce meaningful data that can be used to trigger alarms and anticipate future problems, adding and removing rules at DNS firewalls. This sensors, are working together with the primary DNS servers of the .PT domain, currently monitor all traffic that crosses this service. The data correlation between the sensor and other sources (such as IDS, other sensors or agents), between two different dates, can then be used for statistical purposes and to prevent future possible attacks.
当今困扰网络服务的安全问题正以惊人的速度增加,特别是随着网络传输速率的不断提高和数据交换的绝对数量。这意味着网络攻击越来越多,攻击类型也越来越多,网络事件也越来越频繁。大部分攻击发生在顶级域名(TLD)上,它们的任务是保证域名系统(DNS)区域的正常运行。本文提出了一种简化攻击检测的方法,减少误报(阴性和阳性)的数量。我们的目标是创建一组实时监控网络流量的技术,基于网络传感器,允许实时检测异常网络行为并产生可用于触发警报和预测未来问题的有意义的数据,在DNS防火墙中添加和删除规则。这些传感器与。pt域的主DNS服务器一起工作,当前监视通过该服务的所有流量。然后,在两个不同日期之间,传感器和其他来源(如IDS、其他传感器或代理)之间的数据相关性可以用于统计目的,并防止未来可能的攻击。
{"title":"Protecting the DNS Infrastructure of a Top Level Domain: Dynamic Firewalling with Network Sensors","authors":"João Afonso, P. Veiga","doi":"10.1109/ICSNC.2008.68","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.68","url":null,"abstract":"The security problems that plague network services today are increasing at a dramatic pace especially with the constant improvement of network transmission rates and the sheer amount of data exchanged. This translates to not only more attacks but also new types of attacks with network incidents becoming more and more frequent. A substantial part of the attacks occur at Top Level Domains (TLD) who have the mission of guaranteeing the correct functioning of Domain Name System (DNS) zones. This paper presents a proposal to simplify the detection of attacks, and reduce the number of false reports (negative and positive). Our goal is to create a group of techniques for real time monitoring of network traffic, based on network sensors that allow, in real time, to detect abnormal network behaviour and produce meaningful data that can be used to trigger alarms and anticipate future problems, adding and removing rules at DNS firewalls. This sensors, are working together with the primary DNS servers of the .PT domain, currently monitor all traffic that crosses this service. The data correlation between the sensor and other sources (such as IDS, other sensors or agents), between two different dates, can then be used for statistical purposes and to prevent future possible attacks.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124076690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2008 Third International Conference on Systems and Networks Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1