首页 > 最新文献

IEEE/ACM Transactions on Networking最新文献

英文 中文
The Freshness Game: Timely Communications in the Presence of an Adversary 新鲜度游戏:在对手面前及时沟通
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-02 DOI: 10.1109/TNET.2024.3410228
Subhankar Banerjee;Sennur Ulukus
We consider a communication system where a base station (BS) transmits update packets to N users, one user at a time, over a wireless channel. We investigate the age of this status updating system with an adversary that jams the update packets in the downlink. We consider two system models: with diversity and without diversity. In the model without diversity, in each time slot, the BS schedules a user from N users according to a user scheduling algorithm. The constrained adversary blocks at most a given fraction, $alpha $ , of the time slots over a horizon of T slots, i.e., it can block at most $alpha T$ slots of its choosing out of the total T time slots. We show that if the BS schedules the users with a stationary randomized policy, then the optimal choice for the adversary is to block the user which has the lowest probability of getting scheduled by the BS, at the middle of the time horizon, consecutively for $alpha T$ time slots. The interesting consecutive property of the blocked time slots is due to the cumulative nature of the age metric. In the model with diversity, in each time slot, the BS schedules a user from N users and chooses a sub-carrier from $N_{sub}$ sub-carriers to transmit update packets to the scheduled user according to a user scheduling algorithm and a sub-carrier choosing algorithm, respectively. The adversary blocks $alpha T$ time slots of its choosing out of T time slots at the sub-carriers of its choosing. We show that for large T, the uniform user scheduling algorithm together with the uniform sub-carrier choosing algorithm is $frac {2 N_{sub}}{N_{sub}-1}$ optimal. Next, we investigate the game theoretic equilibrium points of this status updating system. For the model without diversity, we show that a Nash equilibrium does not exist, however, a Stackelberg equilibrium exists when the scheduling algorithm of the BS acts as the leader and the adversary acts as the follower. For the model with diversity, we show that a Nash equilibrium exists and identify the Nash equilibrium. Finally, we extend the model without diversity to the case where the BS can serve multiple users and the adversary can jam multiple users, at a time.
我们考虑了一个通信系统,其中基站(BS)通过无线信道向 N 个用户发送更新数据包,每次发送一个用户。我们研究了在下行链路中干扰更新数据包的对手的情况下,这种状态更新系统的年龄问题。我们考虑了两种系统模型:有分集和无分集。在无分集模型中,在每个时隙,BS 根据用户调度算法从 N 个用户中调度一个用户。在 T 个时隙的范围内,受限对抗者最多只能阻塞给定分数($alpha $)的时隙,也就是说,在总共 T 个时隙中,它最多只能阻塞自己选择的 $alpha T$ 个时隙。我们的研究表明,如果 BS 采用静态随机策略调度用户,那么对手的最优选择就是在时间跨度的中间,连续阻塞 $alpha T$ 个时隙,阻塞被 BS 调度的概率最低的用户。阻塞时隙的有趣连续特性是由年龄度量的累积性质造成的。在分集模型中,在每个时隙,BS 从 N 个用户中调度一个用户,并根据用户调度算法和子载波选择算法分别从 $N_{sub}$ 子载波中选择一个子载波向调度用户发送更新数据包。对抗者在其选择的子载波的 T 个时隙中阻塞其选择的 $alpha T$ 时隙。我们证明,对于大 T,统一用户调度算法和统一子载波选择算法都是最优的。接下来,我们将研究该状态更新系统的博弈论均衡点。对于没有多样性的模型,我们证明不存在纳什均衡,但是,当 BS 的调度算法扮演领导者,而对手扮演跟随者时,就存在斯塔克尔伯格均衡。对于具有多样性的模型,我们证明了纳什均衡的存在,并确定了纳什均衡。最后,我们将无多样性模型扩展到 BS 可以同时为多个用户提供服务而对手可以干扰多个用户的情况。
{"title":"The Freshness Game: Timely Communications in the Presence of an Adversary","authors":"Subhankar Banerjee;Sennur Ulukus","doi":"10.1109/TNET.2024.3410228","DOIUrl":"10.1109/TNET.2024.3410228","url":null,"abstract":"We consider a communication system where a base station (BS) transmits update packets to N users, one user at a time, over a wireless channel. We investigate the age of this status updating system with an adversary that jams the update packets in the downlink. We consider two system models: with diversity and without diversity. In the model without diversity, in each time slot, the BS schedules a user from N users according to a user scheduling algorithm. The constrained adversary blocks at most a given fraction, \u0000<inline-formula> <tex-math>$alpha $ </tex-math></inline-formula>\u0000, of the time slots over a horizon of T slots, i.e., it can block at most \u0000<inline-formula> <tex-math>$alpha T$ </tex-math></inline-formula>\u0000 slots of its choosing out of the total T time slots. We show that if the BS schedules the users with a stationary randomized policy, then the optimal choice for the adversary is to block the user which has the lowest probability of getting scheduled by the BS, at the middle of the time horizon, consecutively for \u0000<inline-formula> <tex-math>$alpha T$ </tex-math></inline-formula>\u0000 time slots. The interesting consecutive property of the blocked time slots is due to the cumulative nature of the age metric. In the model with diversity, in each time slot, the BS schedules a user from N users and chooses a sub-carrier from \u0000<inline-formula> <tex-math>$N_{sub}$ </tex-math></inline-formula>\u0000 sub-carriers to transmit update packets to the scheduled user according to a user scheduling algorithm and a sub-carrier choosing algorithm, respectively. The adversary blocks \u0000<inline-formula> <tex-math>$alpha T$ </tex-math></inline-formula>\u0000 time slots of its choosing out of T time slots at the sub-carriers of its choosing. We show that for large T, the uniform user scheduling algorithm together with the uniform sub-carrier choosing algorithm is \u0000<inline-formula> <tex-math>$frac {2 N_{sub}}{N_{sub}-1}$ </tex-math></inline-formula>\u0000 optimal. Next, we investigate the game theoretic equilibrium points of this status updating system. For the model without diversity, we show that a Nash equilibrium does not exist, however, a Stackelberg equilibrium exists when the scheduling algorithm of the BS acts as the leader and the adversary acts as the follower. For the model with diversity, we show that a Nash equilibrium exists and identify the Nash equilibrium. Finally, we extend the model without diversity to the case where the BS can serve multiple users and the adversary can jam multiple users, at a time.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 5","pages":"4067-4084"},"PeriodicalIF":3.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy and Time Trade-Off Optimization for Multi-UAV Enabled Data Collection of IoT Devices 多无人机物联网设备数据采集的能源和时间权衡优化
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-02 DOI: 10.1109/TNET.2024.3450489
Riheng Jia;Qiyong Fu;Zhonglong Zheng;Guanglin Zhang;Minglu Li
In this work, we study the problem of dispatching multiple unmanned aerial vehicles (UAVs) for data collection in internet of things (IoT), where each UAV departs from its start point, visits some IoT devices for data collection and returns to its destination point. Considering the UAV’s limited onboard energy and the time required to collect data from all IoT devices, it is essential to appropriately assign the data collection task for each UAV, such that none of the dispatched UAVs consumes excessive energy and the maximum task completion time among all UAVs is minimized. To optimize those two conflicting objectives, we focus on minimizing the maximum task completion time and the maximum energy consumption among all UAVs, by jointly designing the flight trajectory, hovering positions for data collection and flight speed of each UAV. We formulate this problem as a multi-objective optimization problem with the aim of obtaining a set of Pareto-optimal solutions in terms of time or energy dominance. Due to the NP-hardness and complexity of the formulated problem, we propose a multi-strategy multi-objective ant colony optimization algorithm (MSMOACO), which is developed based on a constrained ant colony optimization algorithm with a fitnessguided mutation strategy and an adaptive hovering strategy being delicately incorporated, to solve the problem. To accommodate the practical scenario, we also design a novel geometry-based collision avoidance strategy to reduce the possibility of collisions among UAVs. Extensive evaluations validate the effectiveness and superiority of the proposed MSMOACO, compared with previous approaches.
在本研究中,我们研究了在物联网(IoT)中调度多架无人机(UAV)进行数据采集的问题,每架无人机从其起点出发,访问一些物联网设备进行数据采集,然后返回其目的点。考虑到无人机有限的机载能量和从所有物联网设备收集数据所需的时间,必须合理分配每架无人机的数据收集任务,使每架无人机都不消耗过多的能量,并使所有无人机的最大任务完成时间最小化。为了优化这两个相互冲突的目标,我们通过联合设计每架无人机的飞行轨迹、悬停采集位置和飞行速度,关注所有无人机之间最大完成任务时间和最大能耗的最小化。我们将此问题表述为一个多目标优化问题,其目的是在时间或能量优势方面获得一组帕累托最优解。针对该问题的np -硬度和复杂性,提出了一种多策略多目标蚁群优化算法(MSMOACO),该算法是在约束蚁群优化算法的基础上,巧妙地结合了适应度引导突变策略和自适应悬停策略来求解该问题。为了适应实际场景,我们还设计了一种新的基于几何的避碰策略,以减少无人机之间碰撞的可能性。与以前的方法相比,广泛的评价验证了所提出的MSMOACO的有效性和优越性。
{"title":"Energy and Time Trade-Off Optimization for Multi-UAV Enabled Data Collection of IoT Devices","authors":"Riheng Jia;Qiyong Fu;Zhonglong Zheng;Guanglin Zhang;Minglu Li","doi":"10.1109/TNET.2024.3450489","DOIUrl":"10.1109/TNET.2024.3450489","url":null,"abstract":"In this work, we study the problem of dispatching multiple unmanned aerial vehicles (UAVs) for data collection in internet of things (IoT), where each UAV departs from its start point, visits some IoT devices for data collection and returns to its destination point. Considering the UAV’s limited onboard energy and the time required to collect data from all IoT devices, it is essential to appropriately assign the data collection task for each UAV, such that none of the dispatched UAVs consumes excessive energy and the maximum task completion time among all UAVs is minimized. To optimize those two conflicting objectives, we focus on minimizing the maximum task completion time and the maximum energy consumption among all UAVs, by jointly designing the flight trajectory, hovering positions for data collection and flight speed of each UAV. We formulate this problem as a multi-objective optimization problem with the aim of obtaining a set of Pareto-optimal solutions in terms of time or energy dominance. Due to the NP-hardness and complexity of the formulated problem, we propose a multi-strategy multi-objective ant colony optimization algorithm (MSMOACO), which is developed based on a constrained ant colony optimization algorithm with a fitnessguided mutation strategy and an adaptive hovering strategy being delicately incorporated, to solve the problem. To accommodate the practical scenario, we also design a novel geometry-based collision avoidance strategy to reduce the possibility of collisions among UAVs. Extensive evaluations validate the effectiveness and superiority of the proposed MSMOACO, compared with previous approaches.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5172-5187"},"PeriodicalIF":3.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust App Fingerprinting Over the Air 强大的空中应用程序指纹识别功能
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1109/TNET.2024.3448621
Jianfeng Li;Zheng Lin;Jian Qu;Shuohan Wu;Hao Zhou;Yangyang Liu;Xiaobo Ma;Ting Wang;Xiapu Luo;Xiaohong Guan
Mobile apps have significantly transformed various aspects of modern life, leading to growing concerns about privacy risks. Despite widespread encrypted communication, app fingerprinting (AF) attacks threaten user privacy substantially. However, existing AF attacks, when targeted at wireless traffic, face four fundamental challenges, namely 1) sample inseparability; 2) app multiplexing; 3) signal attenuation; and 4) open-world recognition. In this paper, we advance a novel AF attack, dubbed PacketPrint, to recognize app user activities over the air in an open-world setting. We introduce two novel models, i.e., sequential XGBoost and hierarchical bag-of-words model, to tackle sample inseparability and enhance robustness against noise packets arising from app multiplexing. We also propose the environment-aware model enhancement to bolster PacketPrint’s robustness in handling packet loss at the sniffer caused by signal attenuation. We conduct extensive experiments to evaluate the proposed attack in a series of challenging scenarios, including 1) open-world setting; 2) simultaneous use of different apps; 3) severe packet loss at the sniffer; and 4) cross-dataset recognition. The experimental results show that PacketPrint can accurately recognize app user activities. It achieves the average F1-score 0.947 for open-world app recognition and the average F1-score 0.959 for in-app user action recognition.
移动应用极大地改变了现代生活的各个方面,导致人们对隐私风险的担忧日益增加。尽管加密通信广泛存在,但应用程序指纹(AF)攻击极大地威胁了用户隐私。然而,现有的针对无线流量的AF攻击面临四个基本挑战:1)样本不可分离性;2)应用复用;3)信号衰减;4)开放世界的识别。在本文中,我们提出了一种新的AF攻击,称为PacketPrint,用于在开放世界环境中通过空中识别应用程序用户活动。我们引入了两个新颖的模型,即顺序XGBoost和分层词袋模型,以解决样本不可分性并增强对应用复用产生的噪声包的鲁棒性。我们还提出了环境感知模型的增强,以增强PacketPrint在处理信号衰减引起的嗅探器丢包方面的鲁棒性。我们进行了大量的实验来评估在一系列具有挑战性的场景中提出的攻击,包括1)开放世界设置;2)同时使用不同的app;3)嗅探器丢包严重;4)跨数据集识别。实验结果表明,packketprint能够准确识别应用程序用户的活动。开放世界应用识别平均F1-score 0.947,应用内用户动作识别平均F1-score 0.959。
{"title":"Robust App Fingerprinting Over the Air","authors":"Jianfeng Li;Zheng Lin;Jian Qu;Shuohan Wu;Hao Zhou;Yangyang Liu;Xiaobo Ma;Ting Wang;Xiapu Luo;Xiaohong Guan","doi":"10.1109/TNET.2024.3448621","DOIUrl":"10.1109/TNET.2024.3448621","url":null,"abstract":"Mobile apps have significantly transformed various aspects of modern life, leading to growing concerns about privacy risks. Despite widespread encrypted communication, app fingerprinting (AF) attacks threaten user privacy substantially. However, existing AF attacks, when targeted at wireless traffic, face four fundamental challenges, namely 1) sample inseparability; 2) app multiplexing; 3) signal attenuation; and 4) open-world recognition. In this paper, we advance a novel AF attack, dubbed PacketPrint, to recognize app user activities over the air in an open-world setting. We introduce two novel models, i.e., sequential XGBoost and hierarchical bag-of-words model, to tackle sample inseparability and enhance robustness against noise packets arising from app multiplexing. We also propose the environment-aware model enhancement to bolster PacketPrint’s robustness in handling packet loss at the sniffer caused by signal attenuation. We conduct extensive experiments to evaluate the proposed attack in a series of challenging scenarios, including 1) open-world setting; 2) simultaneous use of different apps; 3) severe packet loss at the sniffer; and 4) cross-dataset recognition. The experimental results show that PacketPrint can accurately recognize app user activities. It achieves the average F1-score 0.947 for open-world app recognition and the average F1-score 0.959 for in-app user action recognition.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5065-5080"},"PeriodicalIF":3.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Is Knowledge: Distributed and Throughput Optimal Power Control in Wireless Networks 权力即知识:无线网络中的分布式和吞吐量优化功率控制
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-29 DOI: 10.1109/TNET.2024.3444602
Ilai Bistritz;Nicholas Bambos
Consider N devices that transmit packets for T time slots, where device n uses transmission power $P_{n}left ({{t}}right)$ at time slot t. Independently at each time slot, a packet arrives at device n with probability $lambda _{n}$ . The probability of successfully transmitting a packet $mu _{n}left ({{boldsymbol {P}}}right)$ is a function of the transmission powers of all devices $boldsymbol {P}$ and the channel gains $left {{{ g_{m,n}}}right } $ between them. This function is unknown to the devices that only observe binary reward $r_{n}left ({{boldsymbol {P}}}right)$ of whether the transmission was successful (ACK/NACK). All packets of device n that were not successfully transmitted yet at time slot t wait in a queue $Q_{n}left ({{t}}right)$ . The centralized max-weight scheduling (MWS) can stabilize the queues for any feasible $boldsymbol {lambda }$ (i.e., throughput optimality). However, MWS for power control is intractable even as a centralized algorithm, let alone in a distributed network. We design a distributed yet asymptotically throughput optimal power control for the wireless interference channel, which has long been recognized as a major challenge. Our main observation is that the interference $I_{n}left ({{t}}right)=sum g_{m,n}^{2}P_{m}left ({{t}}right)$ can be leveraged to evaluate the weighted throughput if we add a short pilot signal with power $P_{m}propto Q_{m}left ({{t}}right)r_{m}left ({{boldsymbol {P}}}right)$ after transmitting the data. Our algorithm requires no explicit communication between the devices and learns to approximate MWS, overcoming its intractable optimization and the unknown throughput functions. We prove that, for large T, our algorithm can achieve any feasible $boldsymbol {lambda }$ . Numerical experiments show that our algorithm outperforms the state-of-the-art distributed power control, exhibiting better performance than our theoretical bounds.
假设N台设备在T个时隙中传输数据包,其中设备N在时隙T使用的传输功率为$P_{n}left ({{t}}right)$。在每个时隙中,独立地有一个数据包以$lambda _{n}$的概率到达设备N。成功传输数据包的概率$mu _{n}left ({{boldsymbol {P}}}right)$是所有设备的传输功率$boldsymbol {P}$和它们之间的信道增益$left {{{ g_{m,n}}}right } $的函数。对于只观察传输是否成功(ACK/NACK)的二进制奖励$r_{n}left ({{boldsymbol {P}}}right)$的设备来说,这个函数是未知的。所有设备n在时间槽t未成功传输的数据包都在队列$Q_{n}left ({{t}}right)$中等待。集中式最大权重调度(MWS)可以为任何可行的$boldsymbol {lambda }$(即吞吐量最优性)稳定队列。然而,即使作为集中式算法,MWS用于功率控制也是难以解决的,更不用说在分布式网络中了。我们设计了一种分布式且渐近吞吐量的无线干扰信道最优功率控制,这一直被认为是一个重大挑战。我们的主要观察是,如果我们在传输数据后添加功率为$P_{m}propto Q_{m}left ({{t}}right)r_{m}left ({{boldsymbol {P}}}right)$的短导频信号,则可以利用干扰$I_{n}left ({{t}}right)=sum g_{m,n}^{2}P_{m}left ({{t}}right)$来评估加权吞吐量。我们的算法不需要设备之间的显式通信,并学习近似MWS,克服了其难以优化和未知的吞吐量函数。我们证明,对于大T,我们的算法可以实现任何可行$boldsymbol {lambda }$。数值实验表明,该算法优于目前最先进的分布式功率控制,性能优于我们的理论界限。
{"title":"Power Is Knowledge: Distributed and Throughput Optimal Power Control in Wireless Networks","authors":"Ilai Bistritz;Nicholas Bambos","doi":"10.1109/TNET.2024.3444602","DOIUrl":"10.1109/TNET.2024.3444602","url":null,"abstract":"Consider N devices that transmit packets for T time slots, where device n uses transmission power \u0000<inline-formula> <tex-math>$P_{n}left ({{t}}right)$ </tex-math></inline-formula>\u0000 at time slot t. Independently at each time slot, a packet arrives at device n with probability \u0000<inline-formula> <tex-math>$lambda _{n}$ </tex-math></inline-formula>\u0000. The probability of successfully transmitting a packet \u0000<inline-formula> <tex-math>$mu _{n}left ({{boldsymbol {P}}}right)$ </tex-math></inline-formula>\u0000 is a function of the transmission powers of all devices \u0000<inline-formula> <tex-math>$boldsymbol {P}$ </tex-math></inline-formula>\u0000 and the channel gains \u0000<inline-formula> <tex-math>$left {{{ g_{m,n}}}right } $ </tex-math></inline-formula>\u0000 between them. This function is unknown to the devices that only observe binary reward \u0000<inline-formula> <tex-math>$r_{n}left ({{boldsymbol {P}}}right)$ </tex-math></inline-formula>\u0000 of whether the transmission was successful (ACK/NACK). All packets of device n that were not successfully transmitted yet at time slot t wait in a queue \u0000<inline-formula> <tex-math>$Q_{n}left ({{t}}right)$ </tex-math></inline-formula>\u0000. The centralized max-weight scheduling (MWS) can stabilize the queues for any feasible \u0000<inline-formula> <tex-math>$boldsymbol {lambda }$ </tex-math></inline-formula>\u0000 (i.e., throughput optimality). However, MWS for power control is intractable even as a centralized algorithm, let alone in a distributed network. We design a distributed yet asymptotically throughput optimal power control for the wireless interference channel, which has long been recognized as a major challenge. Our main observation is that the interference \u0000<inline-formula> <tex-math>$I_{n}left ({{t}}right)=sum g_{m,n}^{2}P_{m}left ({{t}}right)$ </tex-math></inline-formula>\u0000 can be leveraged to evaluate the weighted throughput if we add a short pilot signal with power \u0000<inline-formula> <tex-math>$P_{m}propto Q_{m}left ({{t}}right)r_{m}left ({{boldsymbol {P}}}right)$ </tex-math></inline-formula>\u0000 after transmitting the data. Our algorithm requires no explicit communication between the devices and learns to approximate MWS, overcoming its intractable optimization and the unknown throughput functions. We prove that, for large T, our algorithm can achieve any feasible \u0000<inline-formula> <tex-math>$boldsymbol {lambda }$ </tex-math></inline-formula>\u0000. Numerical experiments show that our algorithm outperforms the state-of-the-art distributed power control, exhibiting better performance than our theoretical bounds.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4722-4734"},"PeriodicalIF":3.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information-Sensitive In-Band Network Telemetry in P4-Based Programmable Data Plane 基于 P4 的可编程数据平面中的信息敏感带内网络遥测技术
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-28 DOI: 10.1109/TNET.2024.3448244
Zichen Xu;Ziye Lu;Zuqing Zhu
With the development of programmable data plane (PDP), in-band network telemetry (INT) has become a promising network monitoring technique to visualize network operations in a fine-grained and real-time way. In this work, to better balance the tradeoff between INT overheads and monitoring accuracy, we design and optimize an information-sensitive INT system (namely, P4InfoSen-INT), which makes each PDP switch decide locally whether and what type(s) of telemetry data should be inserted in a packet based on the “information content” of the data, and implement it in P4-based PDP switches. We first realize the basic principle of P4InfoSen-INT with P4 programs. Then, we propose algorithms to estimate the information content of telemetry data accurately in a dynamic network and optimize the tradeoff between INT overheads and monitoring accuracy. Finally, we further optimize the implementation of P4InfoSen-INT by proposing table merging to reduce stage occupation in each switch. Experimental results verify that our proposed P4InfoSen-INT can balance the tradeoff between INT overheads and monitoring accuracy better than existing benchmarks.
随着可编程数据平面(PDP)技术的发展,带内网络遥测技术(INT)已成为一种很有前途的网络监控技术,可实现细粒度、实时的网络运行可视化。在这项工作中,为了更好地平衡INT开销和监测精度之间的权衡,我们设计并优化了一个信息敏感INT系统(即P4InfoSen-INT),该系统使每个PDP交换机根据数据的“信息内容”本地决定是否以及哪种类型的遥测数据应该插入到数据包中,并在基于p4的PDP交换机中实现。我们首先用P4程序实现了P4InfoSen-INT的基本原理。然后,我们提出了在动态网络中准确估计遥测数据信息含量的算法,并优化了INT开销与监测精度之间的权衡。最后,我们通过提出表合并来进一步优化P4InfoSen-INT的实现,以减少每个交换机的阶段占用。实验结果验证了我们提出的P4InfoSen-INT可以比现有基准更好地平衡INT开销和监控精度之间的权衡。
{"title":"Information-Sensitive In-Band Network Telemetry in P4-Based Programmable Data Plane","authors":"Zichen Xu;Ziye Lu;Zuqing Zhu","doi":"10.1109/TNET.2024.3448244","DOIUrl":"10.1109/TNET.2024.3448244","url":null,"abstract":"With the development of programmable data plane (PDP), in-band network telemetry (INT) has become a promising network monitoring technique to visualize network operations in a fine-grained and real-time way. In this work, to better balance the tradeoff between INT overheads and monitoring accuracy, we design and optimize an information-sensitive INT system (namely, P4InfoSen-INT), which makes each PDP switch decide locally whether and what type(s) of telemetry data should be inserted in a packet based on the “information content” of the data, and implement it in P4-based PDP switches. We first realize the basic principle of P4InfoSen-INT with P4 programs. Then, we propose algorithms to estimate the information content of telemetry data accurately in a dynamic network and optimize the tradeoff between INT overheads and monitoring accuracy. Finally, we further optimize the implementation of P4InfoSen-INT by proposing table merging to reduce stage occupation in each switch. Experimental results verify that our proposed P4InfoSen-INT can balance the tradeoff between INT overheads and monitoring accuracy better than existing benchmarks.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5081-5096"},"PeriodicalIF":3.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Multi-Source Multi-Path Congestion Control for Named Data Networking 命名数据网络的自适应多源多路径拥塞控制
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-27 DOI: 10.1109/TNET.2024.3447467
Jiayu Yang;Yuxin Chen;Kaiping Xue;Jiangping Han;Jian Li;Ruidong Li;Qibin Sun;Jun Lu
Named Data Networking (NDN), with a receiver-driven connectionless communication paradigm, naturally supports content delivery from multiple sources via multiple paths. In a dynamic environment, sources and paths may change unexpectedly and are uncontrollable for consumer, which requires flexible rate control and real-time multi-path management, still lacking investigations. To address this issue, we propose an Adaptive Multi-source Multi-path Congestion Control (AMM-CC) scheme based on online learning. AMM-CC explores source/path distribution with continuous micro-experiments and abstracts the empirically experienced performance by meticulously designed two-level utility functions. Specifically, AMM-CC enables each consumer to optimize a local transmission-level utility function that fuses multi-source characteristics, including congestion level and source weights. Then, a sub-gradient descent method is designed to adjust transmission rate adaptively and achieve fine-grained control. Moreover, AMM-CC coordinates consumer with the forwarding module to ensure efficient and on-time multi-path management. It enables consumer to determine congestion gap among multiple paths by a path-level utility that sensitively captures changes and congestion on each path. Then, consumer further notifies the forwarding module in achieving precise traffic transferring. We conducted comprehensive evaluations in dynamic scenario with various content distribution using the NDN simulator, ndnSIM. The evaluation results demonstrate that AMM-CC can adapt to flexible content acquisition from multi-sources and significantly improve bandwidth utilization of multi-path compared with state-of-the-art schemes.
命名数据网络(NDN)具有接收器驱动的无连接通信范例,自然支持通过多个路径从多个源传递内容。在动态环境中,源和路径可能会发生意外变化,对消费者来说是不可控的,这需要灵活的速率控制和实时的多路径管理,但目前还缺乏研究。为了解决这个问题,我们提出了一种基于在线学习的自适应多源多路径拥塞控制(am - cc)方案。am - cc通过连续的微观实验探索源/路径分布,并通过精心设计的两级效用函数抽象出经验经验的性能。具体来说,am - cc使每个消费者能够优化本地传输级实用函数,该函数融合了多源特性,包括拥塞级别和源权重。然后,设计了一种自适应调整传输速率的亚梯度下降方法,实现了细粒度控制。此外,am - cc还可以协调消费者和转发模块,保证高效、及时的多路径管理。它使消费者能够通过路径级实用程序确定多个路径之间的拥塞差距,该实用程序可以敏感地捕获每个路径上的变化和拥塞。然后,消费者进一步通知转发模块,实现流量的精准传输。我们使用NDN模拟器ndnSIM在各种内容分布的动态场景下进行了综合评估。评估结果表明,与现有方案相比,aam - cc能够适应灵活的多源内容获取,显著提高了多径带宽利用率。
{"title":"Adaptive Multi-Source Multi-Path Congestion Control for Named Data Networking","authors":"Jiayu Yang;Yuxin Chen;Kaiping Xue;Jiangping Han;Jian Li;Ruidong Li;Qibin Sun;Jun Lu","doi":"10.1109/TNET.2024.3447467","DOIUrl":"10.1109/TNET.2024.3447467","url":null,"abstract":"Named Data Networking (NDN), with a receiver-driven connectionless communication paradigm, naturally supports content delivery from multiple sources via multiple paths. In a dynamic environment, sources and paths may change unexpectedly and are uncontrollable for consumer, which requires flexible rate control and real-time multi-path management, still lacking investigations. To address this issue, we propose an Adaptive Multi-source Multi-path Congestion Control (AMM-CC) scheme based on online learning. AMM-CC explores source/path distribution with continuous micro-experiments and abstracts the empirically experienced performance by meticulously designed two-level utility functions. Specifically, AMM-CC enables each consumer to optimize a local transmission-level utility function that fuses multi-source characteristics, including congestion level and source weights. Then, a sub-gradient descent method is designed to adjust transmission rate adaptively and achieve fine-grained control. Moreover, AMM-CC coordinates consumer with the forwarding module to ensure efficient and on-time multi-path management. It enables consumer to determine congestion gap among multiple paths by a path-level utility that sensitively captures changes and congestion on each path. Then, consumer further notifies the forwarding module in achieving precise traffic transferring. We conducted comprehensive evaluations in dynamic scenario with various content distribution using the NDN simulator, ndnSIM. The evaluation results demonstrate that AMM-CC can adapt to flexible content acquisition from multi-sources and significantly improve bandwidth utilization of multi-path compared with state-of-the-art schemes.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5049-5064"},"PeriodicalIF":3.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game-Theoretic Bandits for Network Optimization With High-Probability Swap-Regret Upper Bounds 利用高概率交换-保留上限值进行网络优化的博弈论强盗游戏
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-26 DOI: 10.1109/TNET.2024.3444593
Zhiming Huang;Jianping Pan
In this paper, we study a multi-agent bandit problem in an unknown general-sum game repeated for a number of rounds (i.e., learning in a black-box game with bandit feedback), where a set of agents have no information about the underlying game structure and cannot observe each other’s actions and rewards. In each round, each agent needs to play an arm (i.e., action) from a (possibly different) arm set (i.e., action set), and only receives the reward of the played arm that is affected by other agents’ actions. The objective of each agent is to minimize her own cumulative swap regret, where the swap regret is a generic performance measure for online learning algorithms. Many network optimization problems can be cast with the framework of this multi-agent bandit problem, such as wireless medium access control and end-to-end congestion control. We propose an online-mirror-descent-based algorithm and provide near-optimal high-probability swap-regret upper bounds based on refined martingale analyses, which can further bound the expected swap regret instead of the pseudo-regret studied in the literature. Moreover, the high-probability bounds guarantee that correlated equilibria can be achieved in a polynomial number of rounds if the algorithms are played by all agents. To assess the performance of the studied algorithm, we conducted numerical experiments in the context of wireless medium access control, and we performed emulation experiments by implementing the studied algorithms through the Linux Kernel for the end-to-end congestion control.
在本文中,我们研究了一个重复数轮的未知一般和博弈中的多智能体盗匪问题(即在具有盗匪反馈的黑盒博弈中学习),其中一组智能体没有关于潜在博弈结构的信息,并且无法观察彼此的行为和奖励。在每一轮中,每个智能体都需要从一个(可能不同的)手臂集(即行动集)中使用一只手臂(即行动),并且只接受受其他智能体行动影响的已使用手臂的奖励。每个智能体的目标是最小化其自身的累积交换遗憾,其中交换遗憾是在线学习算法的通用性能度量。许多网络优化问题可以用这个多智能体强盗问题的框架来解决,如无线介质访问控制和端到端拥塞控制。我们提出了一种基于在线镜像下降的算法,并基于精细鞅分析提供了接近最优的高概率交换后悔上界,该算法可以进一步约束期望交换后悔,而不是文献中研究的伪后悔。此外,高概率界保证了当算法由所有主体参与时,相关均衡可以在多项式轮数内实现。为了评估所研究算法的性能,我们在无线介质访问控制的背景下进行了数值实验,并通过Linux内核实现所研究的算法进行了端到端拥塞控制的仿真实验。
{"title":"Game-Theoretic Bandits for Network Optimization With High-Probability Swap-Regret Upper Bounds","authors":"Zhiming Huang;Jianping Pan","doi":"10.1109/TNET.2024.3444593","DOIUrl":"10.1109/TNET.2024.3444593","url":null,"abstract":"In this paper, we study a multi-agent bandit problem in an unknown general-sum game repeated for a number of rounds (i.e., learning in a black-box game with bandit feedback), where a set of agents have no information about the underlying game structure and cannot observe each other’s actions and rewards. In each round, each agent needs to play an arm (i.e., action) from a (possibly different) arm set (i.e., action set), and \u0000<italic>only</i>\u0000 receives the reward of the \u0000<italic>played</i>\u0000 arm that is affected by other agents’ actions. The objective of each agent is to minimize her own cumulative swap regret, where the swap regret is a generic performance measure for online learning algorithms. Many network optimization problems can be cast with the framework of this multi-agent bandit problem, such as wireless medium access control and end-to-end congestion control. We propose an online-mirror-descent-based algorithm and provide near-optimal high-probability swap-regret upper bounds based on refined martingale analyses, which can further bound the expected swap regret instead of the pseudo-regret studied in the literature. Moreover, the high-probability bounds guarantee that correlated equilibria can be achieved in a polynomial number of rounds if the algorithms are played by all agents. To assess the performance of the studied algorithm, we conducted numerical experiments in the context of wireless medium access control, and we performed emulation experiments by implementing the studied algorithms through the Linux Kernel for the end-to-end congestion control.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4855-4870"},"PeriodicalIF":3.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimizing Buffer Utilization for Lossless Inter-DC Links 最大限度降低无损数控系统间链路的缓冲区利用率
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-22 DOI: 10.1109/TNET.2024.3443600
Chengyuan Huang;Feiyang Xue;Peiwen Yu;Xiaoliang Wang;Yanqing Chen;Tao Wu;Lei Han;Zifa Han;Bingquan Wang;Xiangyu Gong;Chen Tian;Wanchun Dou;Guihai Chen;Hao Yin
RDMA over Converged Ethernet (RoCEv2) has been widely deployed to data centers (DCs) for its better compatibility with Ethernet/IP than Infiniband (IB). As cross-DC applications emerge, they also demand high throughput, low latency, and lossless network for cross-DC data transmission. However, RoCEv2’s underlying lossless mechanism Priority-based Flow Control (PFC) cannot fit into the long-haul transmission scenario and degrades the performance of RoCEv2. PFC is myopic and only considers queue length to pause upstream senders, which leads to large queueing delay. This paper proposes Bifrost, a downstream-driven lossless flow control that supports long distance cross-DC data transmission. Bifrost uses virtual incoming packets, which indicates the upper bound of in-flight packets, together with buffered packets to control the flow rate. It minimizes the buffer space requirement to one-hop bandwidth delay product (BDP) and achieves low one-way latency. Moreover, we extend Bifrost and propose BifrostX, to accommodate the multi-priority queue of the current switch implementation. BifrostX enables flow control for each queue separately while maintaining low buffer reservation, no throughput loss, and no packet loss. Real-world experiments are conducted with prototype switches and 80 kilometers cables. Evaluations demonstrate that compared to PFC, Bifrost reduces average/tail flow completion time (FCT) of inter-DC flows by up to 22.5%/42.0%, respectively. Bifrost is compatible with existing infrastructure and can support distance of thousands of kilometers.
RDMA over Converged Ethernet (RoCEv2)因其与以太网/IP的兼容性优于IB (Infiniband)而被广泛部署到数据中心。随着跨数据中心应用的出现,对跨数据中心数据传输的高吞吐量、低延迟和无损网络提出了更高的要求。然而,RoCEv2的底层无损机制基于优先级的流量控制(PFC)不适合长途传输场景,并降低了RoCEv2的性能。PFC是短视的,它只考虑队列长度来暂停上游发送方,这导致了很大的队列延迟。本文提出了Bifrost,一种支持长距离跨直流数据传输的下游驱动的无损流量控制。Bifrost采用虚拟入方向报文(即报文流的上限值)和缓冲报文来控制流量。它最大限度地减少了对一跳带宽延迟积(BDP)的缓冲空间需求,实现了较低的单向延迟。此外,我们扩展了Bifrost并提出了BifrostX,以适应当前交换机实现的多优先级队列。BifrostX支持对每个队列分别进行流控制,同时保持较低的缓冲区保留,没有吞吐量损失和数据包丢失。现实世界的实验是用原型开关和80公里长的电缆进行的。评估表明,与PFC相比,Bifrost可将直流间流的平均/尾流完井时间(FCT)分别减少22.5%和42.0%。Bifrost与现有基础设施兼容,可以支持数千公里的距离。
{"title":"Minimizing Buffer Utilization for Lossless Inter-DC Links","authors":"Chengyuan Huang;Feiyang Xue;Peiwen Yu;Xiaoliang Wang;Yanqing Chen;Tao Wu;Lei Han;Zifa Han;Bingquan Wang;Xiangyu Gong;Chen Tian;Wanchun Dou;Guihai Chen;Hao Yin","doi":"10.1109/TNET.2024.3443600","DOIUrl":"10.1109/TNET.2024.3443600","url":null,"abstract":"RDMA over Converged Ethernet (RoCEv2) has been widely deployed to data centers (DCs) for its better compatibility with Ethernet/IP than Infiniband (IB). As cross-DC applications emerge, they also demand high throughput, low latency, and lossless network for cross-DC data transmission. However, RoCEv2’s underlying lossless mechanism Priority-based Flow Control (PFC) cannot fit into the long-haul transmission scenario and degrades the performance of RoCEv2. PFC is myopic and only considers queue length to pause upstream senders, which leads to large queueing delay. This paper proposes Bifrost, a downstream-driven lossless flow control that supports long distance cross-DC data transmission. Bifrost uses virtual incoming packets, which indicates the upper bound of in-flight packets, together with buffered packets to control the flow rate. It minimizes the buffer space requirement to one-hop bandwidth delay product (BDP) and achieves low one-way latency. Moreover, we extend Bifrost and propose BifrostX, to accommodate the multi-priority queue of the current switch implementation. BifrostX enables flow control for each queue separately while maintaining low buffer reservation, no throughput loss, and no packet loss. Real-world experiments are conducted with prototype switches and 80 kilometers cables. Evaluations demonstrate that compared to PFC, Bifrost reduces average/tail flow completion time (FCT) of inter-DC flows by up to 22.5%/42.0%, respectively. Bifrost is compatible with existing infrastructure and can support distance of thousands of kilometers.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4960-4975"},"PeriodicalIF":3.0,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SteadySketch: A High-Performance Algorithm for Finding Steady Flows in Data Streams SteadySketch:在数据流中寻找稳定流的高性能算法
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-22 DOI: 10.1109/TNET.2024.3444488
Zhuochen Fan;Xiangyuan Wang;Xiaodong Li;Jiarui Guo;Wenrui Liu;Haoyu Li;Sheng Long;Zheng Zhong;Tong Yang;Xuebin Chen;Bin Cui
In this paper, we study steady flows in data streams, which refers to the flows whose arrival rate is always non-zero and around a fixed value for several consecutive time windows. To find steady flows in real time, we propose a novel sketch-based algorithm, SteadySketch, aiming to accurately report steady flows with limited memory. To the best of our knowledge, this is the first work to define and find steady flows in data streams. The key novelty of SteadySketch is our proposed reborn technique, which reduces the memory requirement by 75%. Our theoretical proofs show that the negative impact of the reborn technique is small. Experimental results show that, compared with the two comparison schemes, SteadySketch improves the Precision Rate (PR) by around 79.5% and 82.8%, and reduces the Average Relative Error (ARE) by around $905.9times $ and $657.9times $ , respectively. Finally, we provide three concrete cases: cache prefetch, Redis and P4 implementation. As we will demonstrate, SteadySketch can effectively improve the cache hit ratio while achieving satisfying performance on both Redis and Tofino switches. All related codes of SteadySketch are available at GitHub.
本文研究了数据流中的稳态流,稳态流是指在几个连续的时间窗内到达率始终不为零且在固定值附近的流。为了实时发现稳定流,我们提出了一种新的基于草图的算法,steadyssketch,旨在在有限的内存下准确报告稳定流。据我们所知,这是第一个定义和发现数据流中稳定流的工作。steadyssketch的关键新颖之处在于我们提出的重生技术,它将内存需求降低了75%。我们的理论证明表明,再生技术的负面影响很小。实验结果表明,与两种比较方案相比,steadyssketch的精度率(PR)分别提高了79.5%和82.8%,平均相对误差(ARE)分别降低了905.9times $和657.9times $。最后给出了cache预取、Redis和P4实现三个具体案例。正如我们将演示的那样,steadyssketch可以有效地提高缓存命中率,同时在Redis和Tofino交换机上实现令人满意的性能。steadyssketch的所有相关代码都可以在GitHub上获得。
{"title":"SteadySketch: A High-Performance Algorithm for Finding Steady Flows in Data Streams","authors":"Zhuochen Fan;Xiangyuan Wang;Xiaodong Li;Jiarui Guo;Wenrui Liu;Haoyu Li;Sheng Long;Zheng Zhong;Tong Yang;Xuebin Chen;Bin Cui","doi":"10.1109/TNET.2024.3444488","DOIUrl":"10.1109/TNET.2024.3444488","url":null,"abstract":"In this paper, we study steady flows in data streams, which refers to the flows whose arrival rate is always non-zero and around a fixed value for several consecutive time windows. To find steady flows in real time, we propose a novel sketch-based algorithm, SteadySketch, aiming to accurately report steady flows with limited memory. To the best of our knowledge, this is the first work to define and find steady flows in data streams. The key novelty of SteadySketch is our proposed reborn technique, which reduces the memory requirement by 75%. Our theoretical proofs show that the negative impact of the reborn technique is small. Experimental results show that, compared with the two comparison schemes, SteadySketch improves the Precision Rate (PR) by around 79.5% and 82.8%, and reduces the Average Relative Error (ARE) by around \u0000<inline-formula> <tex-math>$905.9times $ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$657.9times $ </tex-math></inline-formula>\u0000, respectively. Finally, we provide three concrete cases: cache prefetch, Redis and P4 implementation. As we will demonstrate, SteadySketch can effectively improve the cache hit ratio while achieving satisfying performance on both Redis and Tofino switches. All related codes of SteadySketch are available at GitHub.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5004-5019"},"PeriodicalIF":3.0,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE/ACM Transactions on Networking Information for Authors IEEE/ACM Transactions on Networking 给作者的信息
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-20 DOI: 10.1109/TNET.2024.3429993
{"title":"IEEE/ACM Transactions on Networking Information for Authors","authors":"","doi":"10.1109/TNET.2024.3429993","DOIUrl":"https://doi.org/10.1109/TNET.2024.3429993","url":null,"abstract":"","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 4","pages":"3651-3651"},"PeriodicalIF":3.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10640178","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE/ACM Transactions on Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1