首页 > 最新文献

J. Networks最新文献

英文 中文
Performance of Flow-based Anomaly Detection in Sampled Traffic 基于流的采样流量异常检测性能研究
Pub Date : 2016-06-01 DOI: 10.4304/jnw.10.9.512-520
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, Kalvinder Singh
In recent years, flow-based anomaly detection has attracted considerable attention from many researchers and some methods have been proposed to improve its accuracy. However, only a few studies have considered anomaly detection with sampled flow traffic, which is widely used for the management of high-speed networks. This gap is addressed in this study. First, we optimize an artificial neural network (ANN)-based classifier to detect anomalies in flow traffic. The results show that although it has a high degree of accuracy, the classifier loses significant information in the process of sampling. In this regard, we propose a sampling method to improve the performance of flow-based anomaly detection in sampled traffic. While existing sampling methods for anomaly detection preserve only small malicious flows, the proposed algorithm samples both small and large malicious flows. Therefore, the detection rate of the flow-based anomaly detector is improved by about 5% using our algorithm. To evaluate the proposed sampling method, three flow-based datasets are generated in this study
近年来,基于流量的异常检测受到了许多研究者的关注,并提出了一些提高其准确性的方法。然而,在高速网络管理中广泛应用的基于采样流的异常检测研究很少。本研究解决了这一差距。首先,我们优化了一个基于人工神经网络(ANN)的分类器来检测流量中的异常。结果表明,该分类器虽然具有较高的准确率,但在采样过程中丢失了大量的信息。在这方面,我们提出了一种采样方法来提高采样流量中基于流的异常检测的性能。现有的异常检测采样方法只保留小的恶意流,而本文提出的算法同时对小的和大的恶意流进行采样。因此,采用本文的算法,基于流量的异常检测器的检测率提高了约5%。为了评估所提出的采样方法,本研究生成了三个基于流的数据集
{"title":"Performance of Flow-based Anomaly Detection in Sampled Traffic","authors":"Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, Kalvinder Singh","doi":"10.4304/jnw.10.9.512-520","DOIUrl":"https://doi.org/10.4304/jnw.10.9.512-520","url":null,"abstract":"In recent years, flow-based anomaly detection has attracted considerable attention from many researchers and some methods have been proposed to improve its accuracy. However, only a few studies have considered anomaly detection with sampled flow traffic, which is widely used for the management of high-speed networks. This gap is addressed in this study. First, we optimize an artificial neural network (ANN)-based classifier to detect anomalies in flow traffic. The results show that although it has a high degree of accuracy, the classifier loses significant information in the process of sampling. In this regard, we propose a sampling method to improve the performance of flow-based anomaly detection in sampled traffic. While existing sampling methods for anomaly detection preserve only small malicious flows, the proposed algorithm samples both small and large malicious flows. Therefore, the detection rate of the flow-based anomaly detector is improved by about 5% using our algorithm. To evaluate the proposed sampling method, three flow-based datasets are generated in this study","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"138 1","pages":"512-520"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86273796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Mitigating Nat Holes Vulnerability in Teredo Clients 缓解Teredo客户端的Nat Holes漏洞
Pub Date : 2016-06-01 DOI: 10.4304/jnw.10.9.521-529
S. Slehat, Z. Chaczko
Tunneling is one of the key mechanisms which can help in the transition from the current IPv4 to IPv6 protocol. The function of automatic tunneling process is to encapsulate IPv6 packets into IPv4 packets. The main components involved in the tunelling mechanism are: Teredo, ISATAP, and 6to4. In some cases, however, these components have ceratain issues related to source routing, neighbor discovery and NAT holes problems. This paper aims to demonstrate how a serious problem related to the Teredo mechanism, called “Teredo NAT Holes” can be solved. The problem NAT Holes problem increases the attack surface in Teredo and thus causes the NAT service to become vulnerable to attacks. This research work proposes an approach called the Packet Authentication and Integrity Services (PAIS) that takes advantage of the Certificate Authentication (CA) that is combined with the Diffie-Hellman key exchange and Hash Message Authentication Code (HMAC) algorithms to provide a suitable solution for the problem. Here it is suggested that the proposed method needs to create the PAIS at the Tunnel’s starting point first, and then needs to verify it at the end point of the Tunnel, by recreating the value of md , which is subsequently inserted into the md field and compared against the md’ field in the packet. The proposed methodology adds md field in order to replace the next header in the packet header structure. The Diffie-Hellman algorithm is used for the key exchange. The IPv6 protocol supports loopback virtual network, and is used in the experimental test bed to validate the efficiency of the method. The experimental results show that the method offers good performance and is able to adequately mitigate NAT Holes issues in Teredo clients
隧道是一种关键的机制,可以帮助从目前的IPv4到IPv6协议的过渡。自动隧道的作用是将IPv6报文封装为IPv4报文。隧道机制涉及的主要组件有:Teredo、ISATAP和6to4。但是,在某些情况下,这些组件存在一些与源路由、邻居发现和NAT漏洞相关的问题。本文旨在演示如何解决与Teredo机制相关的一个严重问题,称为“Teredo NAT漏洞”。NAT漏洞问题增加了Teredo的攻击面,使NAT业务容易受到攻击。本研究提出了一种称为分组认证和完整性服务(PAIS)的方法,该方法利用证书认证(CA)与Diffie-Hellman密钥交换和哈希消息认证码(HMAC)算法相结合,为该问题提供了合适的解决方案。这里建议,所提出的方法需要首先在隧道的起点创建PAIS,然后需要在隧道的终点通过重新创建md的值来验证它,该值随后插入md字段并与数据包中的md '字段进行比较。该方法增加了md字段,以取代包头结构中的下一个头。密钥交换采用Diffie-Hellman算法。IPv6协议支持环回虚拟网络,并在实验测试台上验证了该方法的有效性。实验结果表明,该方法具有良好的性能,能够充分缓解Teredo客户端的NAT漏洞问题
{"title":"Mitigating Nat Holes Vulnerability in Teredo Clients","authors":"S. Slehat, Z. Chaczko","doi":"10.4304/jnw.10.9.521-529","DOIUrl":"https://doi.org/10.4304/jnw.10.9.521-529","url":null,"abstract":"Tunneling is one of the key mechanisms which can help in the transition from the current IPv4 to IPv6 protocol. The function of automatic tunneling process is to encapsulate IPv6 packets into IPv4 packets. The main components involved in the tunelling mechanism are: Teredo, ISATAP, and 6to4. In some cases, however, these components have ceratain issues related to source routing, neighbor discovery and NAT holes problems. This paper aims to demonstrate how a serious problem related to the Teredo mechanism, called “Teredo NAT Holes” can be solved. The problem NAT Holes problem increases the attack surface in Teredo and thus causes the NAT service to become vulnerable to attacks. This research work proposes an approach called the Packet Authentication and Integrity Services (PAIS) that takes advantage of the Certificate Authentication (CA) that is combined with the Diffie-Hellman key exchange and Hash Message Authentication Code (HMAC) algorithms to provide a suitable solution for the problem. Here it is suggested that the proposed method needs to create the PAIS at the Tunnel’s starting point first, and then needs to verify it at the end point of the Tunnel, by recreating the value of md , which is subsequently inserted into the md field and compared against the md’ field in the packet. The proposed methodology adds md field in order to replace the next header in the packet header structure. The Diffie-Hellman algorithm is used for the key exchange. The IPv6 protocol supports loopback virtual network, and is used in the experimental test bed to validate the efficiency of the method. The experimental results show that the method offers good performance and is able to adequately mitigate NAT Holes issues in Teredo clients","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"226 ","pages":"521-529"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91461367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secondary User Aggressiveness Optimization in Sensing-Transmission Scheduling for Cognitive Radio Networks 认知无线网络感知传输调度中的二次用户主动优化
Pub Date : 2016-06-01 DOI: 10.4304/jnw.10.10.543-550
I. K. Aulakh, R. Vig
The constraint of limited frequency spectrum for wireless communication is very daunting. The radio spectrum licensed to permanent users is wasted at times when not used continuously. Cognitive radio technology involves a change in regulation of radio spectrum. In cognitive radio networks a secondary user network is designed for efficiently using gaps in spectrum and not causing at the same time harmful interference to license holding primary users. There is a continuous tradeoff between the opposing goals of Primary User transmission protection and Secondary User throughput maximization. For a Secondary User, both sensing and transmitting is important so as to avoid collisions, packet loss and improve throughput. This paper presents optimization of Secondary User packet length in sensing-transmission scheduling for dynamically accessing the spectrum in cognitive radios. The need to maximize the Secondary User access is achieved by optimizing its packet length with respect to collision cost in a threshold based sensing-transmission structure using Matlab simulations. The results are presented in the form of traces of thresholds for different packet lengths and collision costs. This scheme optimizes Secondary User aggressiveness and throughput while safeguarding Primary User interests
无线通信的频谱限制是一个非常棘手的问题。授权给永久用户的无线电频谱在不连续使用的情况下有时会被浪费。认知无线电技术涉及无线电频谱监管的改变。在认知无线网络中,二级用户网络是为了有效地利用频谱间隙而设计的,同时不会对持有许可证的主用户造成有害干扰。在主用户传输保护和辅助用户吞吐量最大化这两个相反的目标之间存在着持续的权衡。对于Secondary User来说,为了避免碰撞、丢包和提高吞吐量,感知和发送都很重要。针对认知无线电中动态访问频谱的问题,提出了感知传输调度中辅助用户数据包长度的优化方法。在基于阈值的传感传输结构中,通过使用Matlab仿真优化其数据包长度,从而实现了对次要用户访问的最大化。结果以不同数据包长度和碰撞代价的阈值轨迹的形式呈现。该方案在保护主用户利益的同时,优化了辅助用户的侵略性和吞吐量
{"title":"Secondary User Aggressiveness Optimization in Sensing-Transmission Scheduling for Cognitive Radio Networks","authors":"I. K. Aulakh, R. Vig","doi":"10.4304/jnw.10.10.543-550","DOIUrl":"https://doi.org/10.4304/jnw.10.10.543-550","url":null,"abstract":"The constraint of limited frequency spectrum for wireless communication is very daunting. The radio spectrum licensed to permanent users is wasted at times when not used continuously. Cognitive radio technology involves a change in regulation of radio spectrum. In cognitive radio networks a secondary user network is designed for efficiently using gaps in spectrum and not causing at the same time harmful interference to license holding primary users. There is a continuous tradeoff between the opposing goals of Primary User transmission protection and Secondary User throughput maximization. For a Secondary User, both sensing and transmitting is important so as to avoid collisions, packet loss and improve throughput. This paper presents optimization of Secondary User packet length in sensing-transmission scheduling for dynamically accessing the spectrum in cognitive radios. The need to maximize the Secondary User access is achieved by optimizing its packet length with respect to collision cost in a threshold based sensing-transmission structure using Matlab simulations. The results are presented in the form of traces of thresholds for different packet lengths and collision costs. This scheme optimizes Secondary User aggressiveness and throughput while safeguarding Primary User interests","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"26 1","pages":"543-550"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84256516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Asynchronous Multi-Channel MAC Protocol 异步多通道MAC协议
Pub Date : 2016-06-01 DOI: 10.4304/jnw.10.9.530-542
Coskun Cetinkaya
Traditional IEEE 802.11-based networks use only a single channel to ensure connectivity; however, multi-channel capability is available to provide higher network throughput by allowing simultaneous multiple transmissions that do not interfere with each other. The use of multiple channels raises several new challenges: mainly finding the receiver, scheduling the next transmission, balancing the load among channels, and dealing with multi-channel hidden terminals. This paper proposes a novel and efficient, asynchronous multi-channel medium-access control (MAC) protocol using a single transceiver. The key technique is that the proposed protocol separates searching and scheduling processes where searching users switch channels faster than regular users. Simulation results indicate that the proposed protocol achieves up to 14.10 Mbps network throughput, whereas the IEEE 802.11 MAC protocol, with a single channel, provides only 4.35 Mbps in the best case when three orthogonal channels with an 11- Mbps data rate are available
传统的基于IEEE 802.11的网络只使用单个通道来确保连通性;然而,通过允许同时进行多个互不干扰的传输,多通道功能可以提供更高的网络吞吐量。多信道的使用提出了几个新的挑战:主要是寻找接收器、调度下一次传输、平衡信道间的负载以及处理多信道隐藏终端。本文提出了一种新颖、高效、异步的单收发器多通道介质访问控制(MAC)协议。该协议的关键技术是将搜索和调度过程分离,其中搜索用户比普通用户更快地切换频道。仿真结果表明,该协议的网络吞吐量最高可达14.10 Mbps,而IEEE 802.11 MAC协议在单通道情况下,在3个正交通道,数据速率为11- Mbps的情况下,网络吞吐量最高可达4.35 Mbps
{"title":"Asynchronous Multi-Channel MAC Protocol","authors":"Coskun Cetinkaya","doi":"10.4304/jnw.10.9.530-542","DOIUrl":"https://doi.org/10.4304/jnw.10.9.530-542","url":null,"abstract":"Traditional IEEE 802.11-based networks use only a single channel to ensure connectivity; however, multi-channel capability is available to provide higher network throughput by allowing simultaneous multiple transmissions that do not interfere with each other. The use of multiple channels raises several new challenges: mainly finding the receiver, scheduling the next transmission, balancing the load among channels, and dealing with multi-channel hidden terminals. This paper proposes a novel and efficient, asynchronous multi-channel medium-access control (MAC) protocol using a single transceiver. The key technique is that the proposed protocol separates searching and scheduling processes where searching users switch channels faster than regular users. Simulation results indicate that the proposed protocol achieves up to 14.10 Mbps network throughput, whereas the IEEE 802.11 MAC protocol, with a single channel, provides only 4.35 Mbps in the best case when three orthogonal channels with an 11- Mbps data rate are available","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"94 1","pages":"530-542"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76795224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wireless Charging Infrastructure for Future Electrical Vehicular Adhoc Networks 未来电动汽车自组织网络的无线充电基础设施
Pub Date : 2016-06-01 DOI: 10.4304/jnw.10.9.487-500
M. Watfa, S. Miniaoui, Haitham Al-Hassanieh, Samir Selman
Electric vehicles are approximately doubling each year, and the growth is projected to continue to have 20 million electric vehicles on the roads by 2020. In order to reach this goal, research on charging next-generation electric cars have shown a lot of interest. One major challenge with electric vehicles is range anxiety. The proposed research in this paper combines protocol design, analytical, probabilistic and experimental techniques to conduct comprehensive studies on multihop wireless energy transfer serving an integrated electrical vehicular adhoc network (e-VANETs) infrastructure. Our work is the first that addresses multihop energy transfer in e-VANETs and will have a significant impact on fundamental design principles for the development of future electrical car wireless charging infrastructures
电动汽车每年大约翻一番,预计到2020年将有2000万辆电动汽车上路。为了实现这一目标,对下一代充电电动汽车的研究表现出了极大的兴趣。电动汽车面临的一个主要挑战是里程焦虑。本文将协议设计、分析、概率和实验技术相结合,对服务于综合电动汽车自组网(e-VANETs)基础设施的多跳无线能量传输进行了全面的研究。我们的工作首次解决了e- vanet中的多跳能量传输问题,并将对未来电动汽车无线充电基础设施发展的基本设计原则产生重大影响
{"title":"A Wireless Charging Infrastructure for Future Electrical Vehicular Adhoc Networks","authors":"M. Watfa, S. Miniaoui, Haitham Al-Hassanieh, Samir Selman","doi":"10.4304/jnw.10.9.487-500","DOIUrl":"https://doi.org/10.4304/jnw.10.9.487-500","url":null,"abstract":"Electric vehicles are approximately doubling each year, and the growth is projected to continue to have 20 million electric vehicles on the roads by 2020. In order to reach this goal, research on charging next-generation electric cars have shown a lot of interest. One major challenge with electric vehicles is range anxiety. The proposed research in this paper combines protocol design, analytical, probabilistic and experimental techniques to conduct comprehensive studies on multihop wireless energy transfer serving an integrated electrical vehicular adhoc network (e-VANETs) infrastructure. Our work is the first that addresses multihop energy transfer in e-VANETs and will have a significant impact on fundamental design principles for the development of future electrical car wireless charging infrastructures","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"10 1","pages":"487-500"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78616164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Predictive Analytics in Telecommunications Project Management 预测分析在电信项目管理中的应用
Pub Date : 2016-06-01 DOI: 10.4304/jnw.10.10.551-566
Z. Chaczko, S. Slehat, A. Salmon
This paper addresses a prevalent issue in technologybased industries of underperforming or even totally failing projects. There is strong evidence that a major influencing factor to the situation is the incorrect assumption about availability of effective technology that can assist management in project planning. The aim of the paper is to demonstrate and discuss effective approaches for using Predictive Analytics methods and tools in the Telecommunications industry to mitigate project planning issues and avoid possible project failures. Although, these methods and tools are not new, as the traditional statistical models form the core of the application, however, the novelty stems from the new processes and methods used by these tools for presentation and workflow. This change in the approach allowes to lower the usage barrier by providing an access to a wider community of end-users. Thanks to embeding a formalised approach into the workflow, users are guided through complex analytical processes more easily, thus allowing less technically advanced users to draw valuable conclusions without necessarily requiring a formal training in advanced statistical methods. Discussed case studies demonstrate suitability of Predictive Analytics as a powerful and highly accessible tool for project planning in the telecommunications domain.
本文解决了基于技术的行业中表现不佳甚至完全失败的项目的普遍问题。有强有力的证据表明,造成这种情况的一个主要影响因素是对可获得有效技术以协助管理部门进行项目规划的错误假设。本文的目的是展示和讨论在电信行业中使用预测分析方法和工具的有效方法,以减轻项目规划问题并避免可能的项目失败。虽然这些方法和工具并不新鲜,因为传统的统计模型构成了应用程序的核心,但是,新奇之处源于这些工具用于表示和工作流的新过程和方法。这种方法上的改变允许通过向更广泛的最终用户社区提供访问来降低使用障碍。由于将形式化的方法嵌入到工作流程中,用户可以更容易地通过复杂的分析过程,从而允许技术不太先进的用户得出有价值的结论,而不必接受高级统计方法的正式培训。所讨论的案例研究证明了预测分析作为电信领域项目规划的强大且高度可访问的工具的适用性。
{"title":"Application of Predictive Analytics in Telecommunications Project Management","authors":"Z. Chaczko, S. Slehat, A. Salmon","doi":"10.4304/jnw.10.10.551-566","DOIUrl":"https://doi.org/10.4304/jnw.10.10.551-566","url":null,"abstract":"This paper addresses a prevalent issue in technologybased industries of underperforming or even totally failing projects. There is strong evidence that a major influencing factor to the situation is the incorrect assumption about availability of effective technology that can assist management in project planning. The aim of the paper is to demonstrate and discuss effective approaches for using Predictive Analytics methods and tools in the Telecommunications industry to mitigate project planning issues and avoid possible project failures. Although, these methods and tools are not new, as the traditional statistical models form the core of the application, however, the novelty stems from the new processes and methods used by these tools for presentation and workflow. This change in the approach allowes to lower the usage barrier by providing an access to a wider community of end-users. Thanks to embeding a formalised approach into the workflow, users are guided through complex analytical processes more easily, thus allowing less technically advanced users to draw valuable conclusions without necessarily requiring a formal training in advanced statistical methods. Discussed case studies demonstrate suitability of Predictive Analytics as a powerful and highly accessible tool for project planning in the telecommunications domain.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"10 1","pages":"551-566"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83727645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Chunk Regulation Algorithm for Superior QoS in Heterogeneous P2P Video on Demand 异构P2P视频点播中提高QoS的增强块调节算法
Pub Date : 2016-06-01 DOI: 10.4304/jnw.10.10.567-578
M. Alshayeji, D. N. Dias, M. D. Samrajesh
Traditionally, Video-on-Demand (VoD) systems were based on servers that streamed video contents to the end users. Later, data replication using Content Delivery Networks (CDN) came into existence; this reduced the overall network load by effectively distributing contents to end user. However, replication using CDN is relatively costly. Today, Peer-to-Peer (P2P) based VoD systems have gained wide popularity due to its robustness, scalability and availability. P2P networks consist of a large number of nodes, including mobile devices that join and leave the network frequently. The challenge is to provide better video Quality of Service (QoS) to the end user by making requested copies of video chunks available on demand. In this paper, we propose an Enhanced Chunk Regulation Algorithm (ECRA) for superior video QoS in P2P networks. We propose a chunk selection algorithm called Local Demand based Chunk Download (LDCD) that fulfills the temporal demand of chunks. Our proposed Peer Ranking Factor (PRF) algorithm uses ranking factor to choose the best suitable peers to download video chunks. Additionally, we present Local Demand based Chunk Replication (LDCR) algorithm that considers the demand for particular videos (i.e. movies) in the local cluster. Based on the available bandwidth and cache space the replication of chunks is accomplished such as the QoS of VoD is superior. Our evaluation shows that the proposed algorithm improves the overall end user’s QoS by minimizing missed chunks, stalling delay and startup delay. Moreover, it provides more effective bandwidth utilization and minimizes the load on the source server
传统上,视频点播(VoD)系统是基于将视频内容流式传输给最终用户的服务器。后来,使用内容分发网络(CDN)的数据复制出现了;通过有效地将内容分发给最终用户,这减少了总体网络负载。然而,使用CDN进行复制的成本相对较高。目前,基于点对点(P2P)的视频点播系统因其鲁棒性、可扩展性和可用性而获得了广泛的应用。P2P网络由大量节点组成,包括频繁加入和离开网络的移动设备。挑战在于通过按需提供视频块的请求副本,为最终用户提供更好的视频服务质量(QoS)。在本文中,我们提出了一种增强的块调节算法(ECRA),用于在P2P网络中实现更好的视频QoS。我们提出了一种基于本地需求的数据块下载(LDCD)算法来满足数据块的临时需求。我们提出的对等点排名因子(PRF)算法利用排名因子来选择最合适的对等点来下载视频块。此外,我们提出了基于本地需求的块复制(LDCR)算法,该算法考虑了本地集群中对特定视频(即电影)的需求。基于可用的带宽和缓存空间来完成块的复制,如VoD的QoS优越。我们的评估表明,所提出的算法通过最小化遗漏的块、延迟和启动延迟来提高最终用户的整体QoS。此外,它提供了更有效的带宽利用,并最大限度地减少了源服务器的负载
{"title":"Enhanced Chunk Regulation Algorithm for Superior QoS in Heterogeneous P2P Video on Demand","authors":"M. Alshayeji, D. N. Dias, M. D. Samrajesh","doi":"10.4304/jnw.10.10.567-578","DOIUrl":"https://doi.org/10.4304/jnw.10.10.567-578","url":null,"abstract":"Traditionally, Video-on-Demand (VoD) systems were based on servers that streamed video contents to the end users. Later, data replication using Content Delivery Networks (CDN) came into existence; this reduced the overall network load by effectively distributing contents to end user. However, replication using CDN is relatively costly. Today, Peer-to-Peer (P2P) based VoD systems have gained wide popularity due to its robustness, scalability and availability. P2P networks consist of a large number of nodes, including mobile devices that join and leave the network frequently. The challenge is to provide better video Quality of Service (QoS) to the end user by making requested copies of video chunks available on demand. In this paper, we propose an Enhanced Chunk Regulation Algorithm (ECRA) for superior video QoS in P2P networks. We propose a chunk selection algorithm called Local Demand based Chunk Download (LDCD) that fulfills the temporal demand of chunks. Our proposed Peer Ranking Factor (PRF) algorithm uses ranking factor to choose the best suitable peers to download video chunks. Additionally, we present Local Demand based Chunk Replication (LDCR) algorithm that considers the demand for particular videos (i.e. movies) in the local cluster. Based on the available bandwidth and cache space the replication of chunks is accomplished such as the QoS of VoD is superior. Our evaluation shows that the proposed algorithm improves the overall end user’s QoS by minimizing missed chunks, stalling delay and startup delay. Moreover, it provides more effective bandwidth utilization and minimizes the load on the source server","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"567-578"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85860095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analytical Coverage Probability of a Typical User In Heterogeneous Cellular Networks 异构蜂窝网络中典型用户的分析覆盖概率
Pub Date : 2016-02-28 DOI: 10.4304/jnw.11.2.56-61
S. Lam, K. Sandrasegaran
In a Poisson Point Process (PPP) network model, in which the locations of Base Stations (BSs) are randomly distributed according to a Spatial Poisson Process, has been recently used as a tractable stochastic model to analyse the performance of downlink Heterogeneous Cellular Networks (HCNs). The HCN is modelled as a multi-tier cellular network where each tier is characterised by the transmission power level, propagation path loss exponent and density of BSs. The current works on HCN enabling Intercell Interference Coordination (ICIC) technique usually deal with Strict Frequency Reuse (FR) or Soft FR with a reuse factor of D = 1 in a Rayleigh fading channel. It has been assumed that all Base Stations (BSs) transmit continuously which leads to a reduction on the impact of number of users and RBs on network performance. In this paper, the performance of Soft FR with a reuse factor of D > 1 in Rayleigh-Lognormal fading channel is evaluated. The impact of the number of users and Resource Blocks (RBs) on Intercell Interference (ICI) are presented for Round Robin scheduling and indicator functions. The results show that there are opposite trends between coverage probability of Cell-Center User (CCU) and Cell-Edge User (CEU).
在泊松点过程(PPP)网络模型中,基站(BSs)的位置根据空间泊松过程随机分布,最近被用作一种易于处理的随机模型来分析下行异构蜂窝网络(HCNs)的性能。HCN被建模为多层蜂窝网络,其中每层由传输功率水平、传播路径损耗指数和BSs密度表征。目前在实现HCN的小区间干扰协调(ICIC)技术上的研究通常是针对瑞利衰落信道中复用系数D = 1的严格频率复用(FR)或软频率复用(Soft FR)技术。假设所有基站(BSs)都是连续传输的,这样可以减少用户数量和RBs对网络性能的影响。本文评价了复用系数D > 1的Soft FR在瑞利-对数正态衰落信道中的性能。介绍了用户数量和资源块(Resource Blocks, RBs)对轮循调度和指标函数的小区间干扰(Intercell Interference, ICI)的影响。结果表明,蜂窝中心用户(CCU)和蜂窝边缘用户(CEU)的覆盖概率呈相反的趋势。
{"title":"Analytical Coverage Probability of a Typical User In Heterogeneous Cellular Networks","authors":"S. Lam, K. Sandrasegaran","doi":"10.4304/jnw.11.2.56-61","DOIUrl":"https://doi.org/10.4304/jnw.11.2.56-61","url":null,"abstract":"In a Poisson Point Process (PPP) network model, in which the locations of Base Stations (BSs) are randomly distributed according to a Spatial Poisson Process, has been recently used as a tractable stochastic model to analyse the performance of downlink Heterogeneous Cellular Networks (HCNs). The HCN is modelled as a multi-tier cellular network where each tier is characterised by the transmission power level, propagation path loss exponent and density of BSs. The current works on HCN enabling Intercell Interference Coordination (ICIC) technique usually deal with Strict Frequency Reuse (FR) or Soft FR with a reuse factor of D = 1 in a Rayleigh fading channel. It has been assumed that all Base Stations (BSs) transmit continuously which leads to a reduction on the impact of number of users and RBs on network performance. In this paper, the performance of Soft FR with a reuse factor of D > 1 in Rayleigh-Lognormal fading channel is evaluated. The impact of the number of users and Resource Blocks (RBs) on Intercell Interference (ICI) are presented for Round Robin scheduling and indicator functions. The results show that there are opposite trends between coverage probability of Cell-Center User (CCU) and Cell-Edge User (CEU).","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"41 1","pages":"56-61"},"PeriodicalIF":0.0,"publicationDate":"2016-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81658012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adaptive Control Channel Interval in VANET Based on Mobility Model and Queuing Network Analysis 基于移动性模型和排队网络分析的VANET自适应控制通道间隔
Pub Date : 2016-02-28 DOI: 10.4304/jnw.11.2.62-68
R. Munadi, D. Perdana, Asep Mulyana
The dynamic of changing network topology and vehicle density in VANET are causing the dynamic of message traffic intensity. This situation requires adaptability of channel management to provide the channel capacity dynamically and proportionally. The length of CCH interval in VANET represents the capacity of channel or service rate of vehicles. The fixed pattern of CCH/SCH interval as published by IEEE 802.11p/1609.4 would become the constraint of adaptability of vehicles in VANETs. Moreover it would affect to VANET performance inefficient. This research proposes an adaptive scheme of CCH/SCH interval which proportional with density of vehicles based on the number of vehicle connected each other’s. To show how effective the proposed adaptive scheme of CCH/SCH interval can afford to improve of VANET performance (compared to fixed interval scheme of current IEEE standard), we analyze by combining mobility model and queuing network model. We assume that statistically there is a steady state of VANET topology which can be analyzed by using queuing network model. We specified the real map of highway in Bandung city along 10 Km length to achieve the representative experimental result. The various specified of speeds are: 70-90 Km/h, 90-110 Km/h, and 110-130Km/h, while the various of density of vehicle are 15, 30, 45, 60, 75, and 90 vehicles along 10Km length of highway. All of experiments performed in two main scenarios, i.e. the fixed CCH/SCH interval, and adaptive CCH/SCH interval which compared each other to see the improvement. The analytical result examined by simulation method. The experimental results show the improvement of adaptive CCH/SCH interval. The improvement of average delay is 10ms, and the improvement of system throughput is 450 kbps.
网络拓扑结构和车辆密度的动态变化导致了信息流量强度的动态变化。这种情况要求信道管理具有一定的适应性,以动态地、按比例地提供信道容量。VANET中CCH间隔的长度表示通道容量或车辆的服务率。IEEE 802.11p/1609.4公布的固定模式的CCH/SCH间隔将成为vanet中车辆适应性的约束。而且还会影响VANET的性能。本研究提出了一种基于车辆互联数量的CCH/SCH区间与车辆密度成正比的自适应方案。为了证明所提出的CCH/SCH区间自适应方案(与现行IEEE标准的固定区间方案相比)对VANET性能的改善效果,我们结合移动性模型和排队网络模型进行了分析。我们假设VANET拓扑在统计上有一个稳定的状态,可以用排队网络模型对其进行分析。以万隆市10公里长的公路实景图为例,取得了具有代表性的实验结果。不同的速度规定为:70- 90km /h、90- 110km /h和110-130Km/h,车辆密度规定为10Km长度的15、30、45、60、75和90辆。所有的实验主要在两种情况下进行,即固定的CCH/SCH间隔和自适应的CCH/SCH间隔,并比较彼此的改进。用仿真方法对分析结果进行了验证。实验结果表明,该方法改进了自适应CCH/SCH区间。平均时延提高10ms,系统吞吐量提高450kbps。
{"title":"Adaptive Control Channel Interval in VANET Based on Mobility Model and Queuing Network Analysis","authors":"R. Munadi, D. Perdana, Asep Mulyana","doi":"10.4304/jnw.11.2.62-68","DOIUrl":"https://doi.org/10.4304/jnw.11.2.62-68","url":null,"abstract":"The dynamic of changing network topology and vehicle density in VANET are causing the dynamic of message traffic intensity. This situation requires adaptability of channel management to provide the channel capacity dynamically and proportionally. The length of CCH interval in VANET represents the capacity of channel or service rate of vehicles. The fixed pattern of CCH/SCH interval as published by IEEE 802.11p/1609.4 would become the constraint of adaptability of vehicles in VANETs. Moreover it would affect to VANET performance inefficient. This research proposes an adaptive scheme of CCH/SCH interval which proportional with density of vehicles based on the number of vehicle connected each other’s. To show how effective the proposed adaptive scheme of CCH/SCH interval can afford to improve of VANET performance (compared to fixed interval scheme of current IEEE standard), we analyze by combining mobility model and queuing network model. We assume that statistically there is a steady state of VANET topology which can be analyzed by using queuing network model. We specified the real map of highway in Bandung city along 10 Km length to achieve the representative experimental result. The various specified of speeds are: 70-90 Km/h, 90-110 Km/h, and 110-130Km/h, while the various of density of vehicle are 15, 30, 45, 60, 75, and 90 vehicles along 10Km length of highway. All of experiments performed in two main scenarios, i.e. the fixed CCH/SCH interval, and adaptive CCH/SCH interval which compared each other to see the improvement. The analytical result examined by simulation method. The experimental results show the improvement of adaptive CCH/SCH interval. The improvement of average delay is 10ms, and the improvement of system throughput is 450 kbps.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"58 1","pages":"62-68"},"PeriodicalIF":0.0,"publicationDate":"2016-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90651268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Overhead caused by WiFi on ZigBee Networks using Slotted CSMA/CA WiFi在使用开槽CSMA/CA的ZigBee网络上造成的开销
Pub Date : 2016-02-28 DOI: 10.4304/jnw.11.2.39-45
G. Chalhoub, Eric Perrier de La Bathie, M. Misson
This paper presents an in-depth analysis on the effect of the coexistence in the 2.4 GHz band between IEEE 802.15.4 and IEEE 802.11 on the medium access control. We focus on the slotted CSMA/CA medium access algorithm that is used by IEEE 802.15.4 and analyse the delay that frames undergo when suffering from interference from a WiFi activity. We measure the overhead caused by the additional delay spent in the MAC sublayer frame queue before accessing the medium due to the presence of WiFi interference. We experimented different scenarios with overlapping channels and non-overlapping channels. We show that the two wireless protocols can coexist if we take into considerations the relative positions of the nodes to avoid very high interference and if we avoid monopolizing the channel with a very high rate WiFi traffic even under overlapping channels.
本文深入分析了2.4 GHz频段IEEE 802.15.4和IEEE 802.11共存对介质访问控制的影响。我们专注于IEEE 802.15.4使用的有槽CSMA/CA介质访问算法,并分析帧在受到WiFi活动干扰时所经历的延迟。我们测量了由于WiFi干扰而在访问介质之前在MAC子层帧队列中花费的额外延迟所造成的开销。我们用重叠通道和不重叠通道实验了不同的场景。我们表明,如果我们考虑节点的相对位置以避免非常高的干扰,并且如果我们避免在重叠信道下使用非常高速率的WiFi流量垄断信道,则两种无线协议可以共存。
{"title":"Overhead caused by WiFi on ZigBee Networks using Slotted CSMA/CA","authors":"G. Chalhoub, Eric Perrier de La Bathie, M. Misson","doi":"10.4304/jnw.11.2.39-45","DOIUrl":"https://doi.org/10.4304/jnw.11.2.39-45","url":null,"abstract":"This paper presents an in-depth analysis on the effect of the coexistence in the 2.4 GHz band between IEEE 802.15.4 and IEEE 802.11 on the medium access control. We focus on the slotted CSMA/CA medium access algorithm that is used by IEEE 802.15.4 and analyse the delay that frames undergo when suffering from interference from a WiFi activity. We measure the overhead caused by the additional delay spent in the MAC sublayer frame queue before accessing the medium due to the presence of WiFi interference. We experimented different scenarios with overlapping channels and non-overlapping channels. We show that the two wireless protocols can coexist if we take into considerations the relative positions of the nodes to avoid very high interference and if we avoid monopolizing the channel with a very high rate WiFi traffic even under overlapping channels.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"17 1","pages":"39-45"},"PeriodicalIF":0.0,"publicationDate":"2016-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79071507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
J. Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1