首页 > 最新文献

11th IEEE International Conference on Network Protocols, 2003. Proceedings.最新文献

英文 中文
Delay analysis of IEEE 802.11 in single-hop networks IEEE 802.11在单跳网络中的时延分析
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249764
Marcelo M. Carvalho, J. Garcia-Luna-Aceves
This paper presents an analytical model to compute the average service time and jitter experienced by a packet when transmitted in a saturated IEEE 802.11 ad hoc network. In contrast to traditional work in the literature, in which a distribution is usually fitted or assumed, we use a bottom-up approach and build the first two moments of the service time based on the IEEE 802.11 binary exponential backoff algorithm and the events underneath its operation. Our model is general enough to be applied to any type of IEEE 802.11 wireless ad hoc network where the channel state probabilities driving a node's backoff operation are known. We apply our model to saturated single-hop ad hoc networks under ideal channel conditions. We validate our model through extensive simulations and conduct a performance evaluation of a node's average service time and jitter for both direct sequence and frequency-hopping spread spectrum physical layers.
本文提出了一个分析模型来计算一个数据包在饱和IEEE 802.11自组织网络中传输时所经历的平均服务时间和抖动。与文献中通常拟合或假设分布的传统工作相反,我们使用自下而上的方法,并基于IEEE 802.11二进制指数回退算法及其操作下的事件构建服务时间的前两个时刻。我们的模型具有足够的通用性,可以应用于任何类型的IEEE 802.11无线自组织网络,其中驱动节点后退操作的信道状态概率是已知的。我们将模型应用于理想信道条件下的饱和单跳自组织网络。我们通过广泛的仿真验证了我们的模型,并对节点在直接序列和跳频扩频物理层的平均服务时间和抖动进行了性能评估。
{"title":"Delay analysis of IEEE 802.11 in single-hop networks","authors":"Marcelo M. Carvalho, J. Garcia-Luna-Aceves","doi":"10.1109/ICNP.2003.1249764","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249764","url":null,"abstract":"This paper presents an analytical model to compute the average service time and jitter experienced by a packet when transmitted in a saturated IEEE 802.11 ad hoc network. In contrast to traditional work in the literature, in which a distribution is usually fitted or assumed, we use a bottom-up approach and build the first two moments of the service time based on the IEEE 802.11 binary exponential backoff algorithm and the events underneath its operation. Our model is general enough to be applied to any type of IEEE 802.11 wireless ad hoc network where the channel state probabilities driving a node's backoff operation are known. We apply our model to saturated single-hop ad hoc networks under ideal channel conditions. We validate our model through extensive simulations and conduct a performance evaluation of a node's average service time and jitter for both direct sequence and frequency-hopping spread spectrum physical layers.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122525164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 273
Ulysses: a robust, low-diameter, low-latency peer-to-peer network Ulysses:一个健壮、低直径、低延迟的点对点网络
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249776
Abhishek Kumar, S. Merugu, Jun Xu, E. Zegura, Xingxing Yu
A number of distributed hash table (DHT)-based protocols have been proposed to address the issue of scalability in peer-to-peer networks. In this paper, we present Ulysses, a peer-to-peer network based on the butterfly topology that achieves the theoretical lower bound of (log n)/(log log n)on network diameter when the average routing table size at nodes is no more than log n. Compared to existing DHT-based schemes with similar routing table size, Ulysses reduces the network diameter by a factor of log log n. which is 2-4 for typical configurations. This translates into the same amount of reduction on query latency and average traffic per link/node. In addition, Ulysses maintains the same level of robustness in terms of routing in the face of faults and recovering from graceful/ungraceful joins and departures, as provided by existing DHT-based schemes. The performance of the protocol has been evaluated using both analysis and simulation.
为了解决点对点网络中的可伸缩性问题,已经提出了许多基于分布式哈希表(DHT)的协议。在本文中,我们提出了基于蝴蝶拓扑的点对点网络Ulysses,当节点的平均路由表大小不大于log n时,它实现了网络直径的理论下界(log n)/(log log n)。与现有基于dhs的类似路由表大小的方案相比,Ulysses将网络直径减小了log log n的因子,典型配置为2-4。这意味着查询延迟和每个链路/节点的平均流量减少了相同的数量。此外,Ulysses在面对故障的路由和从优雅/不优雅的连接和离开中恢复方面保持了与现有基于dhs的方案相同的鲁棒性水平。通过分析和仿真对协议的性能进行了评价。
{"title":"Ulysses: a robust, low-diameter, low-latency peer-to-peer network","authors":"Abhishek Kumar, S. Merugu, Jun Xu, E. Zegura, Xingxing Yu","doi":"10.1109/ICNP.2003.1249776","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249776","url":null,"abstract":"A number of distributed hash table (DHT)-based protocols have been proposed to address the issue of scalability in peer-to-peer networks. In this paper, we present Ulysses, a peer-to-peer network based on the butterfly topology that achieves the theoretical lower bound of (log n)/(log log n)on network diameter when the average routing table size at nodes is no more than log n. Compared to existing DHT-based schemes with similar routing table size, Ulysses reduces the network diameter by a factor of log log n. which is 2-4 for typical configurations. This translates into the same amount of reduction on query latency and average traffic per link/node. In addition, Ulysses maintains the same level of robustness in terms of routing in the face of faults and recovering from graceful/ungraceful joins and departures, as provided by existing DHT-based schemes. The performance of the protocol has been evaluated using both analysis and simulation.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
Planned object duplication strategies in dynamic PRR meshes 动态PRR网格中的计划对象复制策略
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249756
M. K. Bradshaw, A. Rosenberg, D. Towsley
In recent years there has been considerable research on new distributed hash tables (DHTs), improvements on existing DHTs, and DHT-enabled systems. However, little of it focuses on their differences [M. Castro et al., 2002]. To this purpose we introduce a simple modeling framework that allows us to mathematically model the search costs of most classes of DHTs. To illustrate the usefulness of this framework, we examine a class of DHTs, which includes tapestry and pastry, that we call dynamic PRR meshes (DPMs). In particular we examine how planned object duplication (POD) strategies affect the search costs of DPMs that employ them. We introduce 3 new DPMs that employ different POD strategies and compare them with the POD strategies that tapestry and pastry use. Through our model we discover cyclic behaviors in search costs over the number of nodes present in the DPM, the effects of variability in the underlying network and provide comparisons of the performance of all 5 DPMs.
近年来,人们对新的分布式散列表(dht)、对现有dht的改进以及支持dht的系统进行了大量研究。然而,它很少关注他们的差异[M]。Castro et al., 2002]。为此,我们引入了一个简单的建模框架,它允许我们对大多数dht类的搜索成本进行数学建模。为了说明这个框架的有用性,我们研究一类dht,其中包括挂毯和糕点,我们称之为动态PRR网格(dpm)。我们特别研究了计划对象复制(POD)策略如何影响使用它们的dpm的搜索成本。我们介绍了3种采用不同POD策略的新dpm,并将它们与挂毯和糕点使用的POD策略进行了比较。通过我们的模型,我们发现了DPM中节点数量的搜索成本循环行为,底层网络中可变性的影响,并提供了所有5个DPM的性能比较。
{"title":"Planned object duplication strategies in dynamic PRR meshes","authors":"M. K. Bradshaw, A. Rosenberg, D. Towsley","doi":"10.1109/ICNP.2003.1249756","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249756","url":null,"abstract":"In recent years there has been considerable research on new distributed hash tables (DHTs), improvements on existing DHTs, and DHT-enabled systems. However, little of it focuses on their differences [M. Castro et al., 2002]. To this purpose we introduce a simple modeling framework that allows us to mathematically model the search costs of most classes of DHTs. To illustrate the usefulness of this framework, we examine a class of DHTs, which includes tapestry and pastry, that we call dynamic PRR meshes (DPMs). In particular we examine how planned object duplication (POD) strategies affect the search costs of DPMs that employ them. We introduce 3 new DPMs that employ different POD strategies and compare them with the POD strategies that tapestry and pastry use. Through our model we discover cyclic behaviors in search costs over the number of nodes present in the DPM, the effects of variability in the underlying network and provide comparisons of the performance of all 5 DPMs.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125521242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving TCP startup performance using active measurements: algorithm and evaluation 使用主动测量改进TCP启动性能:算法和评估
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249761
Ningning Hu, P. Steenkiste
TCP slow start exponentially increases the congestion window size to detect the proper congestion window for a network path. This often results in significant packet loss, while breaking off slow start using a limited slow start threshold may lead to an overly conservative congestion window size. This problem is especially severe in high speed networks. In this paper we present a new TCP startup algorithm, called paced start, that incorporates an available bandwidth probing technique into the TCP startup algorithm. Paced start is based on the observation that when we view the TCP startup sequence as a sequence of packet trains, the difference between the data packet spacing and the acknowledgement spacing can yield valuable information about the available bandwidth. Slow start ignores this information, while paced start uses it to quickly estimate the proper congestion window for the path. For most flows. Paced Start transitions into congestion avoidance mode faster than Slow Start, has a significantly lower packet loss rate, and avoids the timeout that is often associated with slow start. This paper describes the paced start algorithm and uses simulation and real system experiments to characterize its properties.
TCP慢启动以指数方式增加拥塞窗口大小,以检测网络路径的适当拥塞窗口。这通常会导致严重的数据包丢失,而使用有限的慢启动阈值来中断慢启动可能会导致过于保守的拥塞窗口大小。这个问题在高速网络中尤为严重。本文提出了一种新的TCP启动算法,该算法将可用带宽探测技术融入到TCP启动算法中。有节奏启动是基于这样的观察:当我们将TCP启动序列视为数据包序列时,数据包间隔和确认间隔之间的差异可以产生有关可用带宽的有价值的信息。慢启动忽略这些信息,而慢启动使用它来快速估计路径的适当拥塞窗口。对于大多数流。与慢速启动相比,慢速启动更快地转换到拥塞避免模式,丢包率明显更低,并且避免了慢速启动导致的超时。本文介绍了节奏启动算法,并通过仿真和实系统实验对其性能进行了表征。
{"title":"Improving TCP startup performance using active measurements: algorithm and evaluation","authors":"Ningning Hu, P. Steenkiste","doi":"10.1109/ICNP.2003.1249761","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249761","url":null,"abstract":"TCP slow start exponentially increases the congestion window size to detect the proper congestion window for a network path. This often results in significant packet loss, while breaking off slow start using a limited slow start threshold may lead to an overly conservative congestion window size. This problem is especially severe in high speed networks. In this paper we present a new TCP startup algorithm, called paced start, that incorporates an available bandwidth probing technique into the TCP startup algorithm. Paced start is based on the observation that when we view the TCP startup sequence as a sequence of packet trains, the difference between the data packet spacing and the acknowledgement spacing can yield valuable information about the available bandwidth. Slow start ignores this information, while paced start uses it to quickly estimate the proper congestion window for the path. For most flows. Paced Start transitions into congestion avoidance mode faster than Slow Start, has a significantly lower packet loss rate, and avoids the timeout that is often associated with slow start. This paper describes the paced start algorithm and uses simulation and real system experiments to characterize its properties.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115975458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Reliability-aware IBGP route reflection topology design 基于可靠性感知的IBGP路由反射拓扑设计
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249769
Li Xiao, Jun Wang, K. Nahrstedt
In the internal border gateway protocol (IBGP), route reflection is widely used as an alternative to full mesh IBGP sessions inside an AS for scalability reason. However, some important issues, such as the impact of route reflection on the reliability of IBGP and the construction of reliable reflection topology with unreliable routers or links, have not been well investigated. This paper addresses the problem of finding reliable route reflection topologies for IBGP networks, which is of great importance to increase the robustness of IBGP operations. We first present a novel reliability model and two new metrics (IBGP expected lifetime and expected session loss) to evaluate the reliability of reflection topologies, and further to investigate the design problem. After studying the solvability conditions under the router capacity constraints, we prove the NP-hardness of the problem, and then design and implement three heuristic solutions using randomization techniques: heuristic selection, greedy search and simulated annealing. Our extensive computational experiments show that the reliability of IBGP reflection network can be significantly improved by our solutions.
在内部边界网关协议IBGP (internal border gateway protocol)中,由于可扩展性的原因,路由反射被广泛应用于as内部的全网状IBGP会话。但是,路由反射对IBGP可靠性的影响以及在不可靠路由器或链路下构建可靠反射拓扑等重要问题的研究还不够深入。本文研究了IBGP网络的可靠路由反射拓扑问题,这对提高IBGP网络的鲁棒性具有重要意义。我们首先提出了一个新的可靠性模型和两个新的指标(IBGP预期寿命和预期会话损失)来评估反射拓扑的可靠性,并进一步研究了设计问题。在研究了路由器容量约束下的可解性条件后,证明了该问题的np -硬度,然后利用随机化技术:启发式选择、贪婪搜索和模拟退火设计并实现了三种启发式解。大量的计算实验表明,我们的解决方案可以显著提高IBGP反射网络的可靠性。
{"title":"Reliability-aware IBGP route reflection topology design","authors":"Li Xiao, Jun Wang, K. Nahrstedt","doi":"10.1109/ICNP.2003.1249769","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249769","url":null,"abstract":"In the internal border gateway protocol (IBGP), route reflection is widely used as an alternative to full mesh IBGP sessions inside an AS for scalability reason. However, some important issues, such as the impact of route reflection on the reliability of IBGP and the construction of reliable reflection topology with unreliable routers or links, have not been well investigated. This paper addresses the problem of finding reliable route reflection topologies for IBGP networks, which is of great importance to increase the robustness of IBGP operations. We first present a novel reliability model and two new metrics (IBGP expected lifetime and expected session loss) to evaluate the reliability of reflection topologies, and further to investigate the design problem. After studying the solvability conditions under the router capacity constraints, we prove the NP-hardness of the problem, and then design and implement three heuristic solutions using randomization techniques: heuristic selection, greedy search and simulated annealing. Our extensive computational experiments show that the reliability of IBGP reflection network can be significantly improved by our solutions.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Exploiting routing redundancy via structured peer-to-peer overlays 通过结构化点对点覆盖利用路由冗余
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249775
Ben Y. Zhao, Ling Huang, J. Stribling, A. Joseph, J. Kubiatowicz
Structured peer-to-peer overlays provide a natural infrastructure for resilient routing via efficient fault detection and precomputation of backup paths. These overlays can respond to faults in a few hundred milliseconds by rapidly shifting between alternate routes. In this paper, we present two adaptive mechanisms for structured overlays and illustrate their operation in the context of Tapestry, a fault-resilient overlay from Berkeley. We also describe a transparent, protocol-independent traffic redirection mechanism that tunnels legacy application traffic through overlays. Our measurements of a Tapestry prototype show it to be a highly responsive routing service, effective at circumventing a range of failures while incurring reasonable cost in maintenance bandwidth and additional routing latency.
结构化点对点覆盖通过有效的故障检测和备份路径的预计算为弹性路由提供了自然的基础设施。这些覆盖层可以在几百毫秒内对故障做出反应,在备用路由之间快速切换。在本文中,我们提出了结构化覆盖的两种自适应机制,并举例说明了它们在Tapestry (Berkeley的一种故障弹性覆盖)上下文中的操作。我们还描述了一种透明的、独立于协议的流量重定向机制,该机制通过覆盖层对遗留应用程序流量进行隧道传输。我们对Tapestry原型的测量表明,它是一个高度响应的路由服务,能够有效地规避一系列故障,同时在维护带宽和额外的路由延迟方面产生合理的成本。
{"title":"Exploiting routing redundancy via structured peer-to-peer overlays","authors":"Ben Y. Zhao, Ling Huang, J. Stribling, A. Joseph, J. Kubiatowicz","doi":"10.1109/ICNP.2003.1249775","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249775","url":null,"abstract":"Structured peer-to-peer overlays provide a natural infrastructure for resilient routing via efficient fault detection and precomputation of backup paths. These overlays can respond to faults in a few hundred milliseconds by rapidly shifting between alternate routes. In this paper, we present two adaptive mechanisms for structured overlays and illustrate their operation in the context of Tapestry, a fault-resilient overlay from Berkeley. We also describe a transparent, protocol-independent traffic redirection mechanism that tunnels legacy application traffic through overlays. Our measurements of a Tapestry prototype show it to be a highly responsive routing service, effective at circumventing a range of failures while incurring reasonable cost in maintenance bandwidth and additional routing latency.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132573512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Power adaptive broadcasting with local information in ad hoc networks 自组织网络中具有本地信息的功率自适应广播
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249766
Xiaohu Chen, M. Faloutsos, S. Krishnamurthy
Network wide broadcasting is an energy intensive function. In this paper we propose a new method that performs transmission power adaptations based on information available locally, to reduce the overall energy consumed per broadcast. In most of the prior work on energy efficient broadcasting it is assumed that the originator of the broadcast has global network information (both topology information as well as the geographical distance between nodes). This can be prohibitive in terms of the consumed overhead. In our protocol, each node attempts to tune its transmit power based on local information (of up to two hops from the transmitting node). We perform extensive simulations to evaluate our protocol. Our simulations take into account the possible loss of packets due to collision effects and the additional re-broadcasts that are necessary due to lower power transmissions. We show that our protocol achieves almost the same coverage as other non power-adaptive broadcast schemes hut with a reduction of approximately 40% in terms of the consumed power as compared to a scheme that does not adapt its power.
广域网广播是一项能源密集型的功能。在本文中,我们提出了一种基于本地可用信息进行传输功率调整的新方法,以降低每次广播的总能耗。在之前大多数关于节能广播的工作中,都假设广播的发起者具有全局网络信息(拓扑信息和节点之间的地理距离)。就消耗的开销而言,这可能是令人望而却步的。在我们的协议中,每个节点尝试根据本地信息(距离发送节点最多两跳)调整其发送功率。我们进行了大量的模拟来评估我们的协议。我们的模拟考虑了由于碰撞效应可能导致的数据包丢失以及由于低功率传输而必需的额外重广播。我们表明,我们的协议实现了与其他非功率自适应广播方案几乎相同的覆盖范围,但与不适应其功率的方案相比,在消耗功率方面减少了大约40%。
{"title":"Power adaptive broadcasting with local information in ad hoc networks","authors":"Xiaohu Chen, M. Faloutsos, S. Krishnamurthy","doi":"10.1109/ICNP.2003.1249766","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249766","url":null,"abstract":"Network wide broadcasting is an energy intensive function. In this paper we propose a new method that performs transmission power adaptations based on information available locally, to reduce the overall energy consumed per broadcast. In most of the prior work on energy efficient broadcasting it is assumed that the originator of the broadcast has global network information (both topology information as well as the geographical distance between nodes). This can be prohibitive in terms of the consumed overhead. In our protocol, each node attempts to tune its transmit power based on local information (of up to two hops from the transmitting node). We perform extensive simulations to evaluate our protocol. Our simulations take into account the possible loss of packets due to collision effects and the additional re-broadcasts that are necessary due to lower power transmissions. We show that our protocol achieves almost the same coverage as other non power-adaptive broadcast schemes hut with a reduction of approximately 40% in terms of the consumed power as compared to a scheme that does not adapt its power.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132717334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Optimal resource allocation in overlay multicast 覆盖组播资源的最优分配
Pub Date : 2003-11-04 DOI: 10.1109/ICNP.2003.1249758
Yi Cui, Yuan Xue, K. Nahrstedt
The paper targets the problem of optimal resource allocation in overlay multicast, which poses both theoretical and practical challenges. Theoretically, resource allocation among overlay flows is not subject to the network capacity constraint but also the data constraint, mainly due to the dual role of end hosts as both receivers and senders. Practically, existing distributed resource allocation schemes assume the network links to be capable of measuring flow rates, calculating and communicating price signals, none of which actually exists in the Internet today. We address these challenges as follows. First, we formalize the problem using nonlinear optimization theory, which incorporates both network constraint and data constraint. Based on our theoretical framework, we propose a distributed algorithm, which is proved to converge to the optimal point, where the aggregate utility of all receivers is maximized. Second, we propose an end-host-based solution, which relies on the coordination of end hosts to accomplish tasks originally assigned to network links. our solution can be directly deployed without any changes to the existing network infrastructure.
本文研究了覆盖组播中资源的最优分配问题,该问题在理论和实践上都具有挑战性。理论上,覆盖流之间的资源分配不受网络容量约束,还受数据约束,主要是由于终端主机既是接收方又是发送方的双重角色。实际上,现有的分布式资源分配方案假设网络链路能够测量流量、计算和传递价格信号,而这些在今天的互联网中都不存在。我们以以下方式应对这些挑战。首先,我们利用非线性优化理论,将网络约束和数据约束结合起来,将问题形式化。基于我们的理论框架,我们提出了一种分布式算法,并证明了该算法收敛到最优点,使所有接收者的总效用最大化。其次,我们提出了一种基于终端主机的解决方案,它依赖于终端主机的协调来完成原本分配给网络链路的任务。我们的解决方案可以直接部署,而无需对现有网络基础设施进行任何更改。
{"title":"Optimal resource allocation in overlay multicast","authors":"Yi Cui, Yuan Xue, K. Nahrstedt","doi":"10.1109/ICNP.2003.1249758","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249758","url":null,"abstract":"The paper targets the problem of optimal resource allocation in overlay multicast, which poses both theoretical and practical challenges. Theoretically, resource allocation among overlay flows is not subject to the network capacity constraint but also the data constraint, mainly due to the dual role of end hosts as both receivers and senders. Practically, existing distributed resource allocation schemes assume the network links to be capable of measuring flow rates, calculating and communicating price signals, none of which actually exists in the Internet today. We address these challenges as follows. First, we formalize the problem using nonlinear optimization theory, which incorporates both network constraint and data constraint. Based on our theoretical framework, we propose a distributed algorithm, which is proved to converge to the optimal point, where the aggregate utility of all receivers is maximized. Second, we propose an end-host-based solution, which relies on the coordination of end hosts to accomplish tasks originally assigned to network links. our solution can be directly deployed without any changes to the existing network infrastructure.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129183533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Proceedings. 11th IEEE International Conference on Network Protocols 第11届IEEE网络协议国际会议论文集
Pub Date : 1900-01-01 DOI: 10.1109/ICNP.2003.1249751
The following topics are dealt with: protocol design; peer to peer services; overlay networks; transport protocols; scheduling and classification; wireless networks; network routing; and sensor networks.
涉及以下主题:协议设计;点对点服务;覆盖网络;传输协议;调度和分类;无线网络;网络路由;还有传感器网络。
{"title":"Proceedings. 11th IEEE International Conference on Network Protocols","authors":"","doi":"10.1109/ICNP.2003.1249751","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249751","url":null,"abstract":"The following topics are dealt with: protocol design; peer to peer services; overlay networks; transport protocols; scheduling and classification; wireless networks; network routing; and sensor networks.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121936333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Dynamic clustering for acoustic target tracking in wireless sensor networks 基于动态聚类的无线传感器网络声目标跟踪
Pub Date : 1900-01-01 DOI: 10.1109/ICNP.2003.1249778
Wei-Peng Chen, J. Hou, L. Sha
In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the sensors, we envision a hierarchical sensor network that is composed of (a) a static backbone of sparsely placed high-capability sensors which assume the role of a cluster head (CH) upon triggered by certain signal events; and (b) moderately to densely populated low-end sensors whose function is to provide sensor information to CHs upon request. A cluster is formed and a CH becomes active, when the acoustic signal strength detected by the CH exceeds a pre-determined threshold. The active CH then broadcasts an information solicitation packet, asking sensors in its vicinity to join the cluster and provide their sensing information. We address and devise solution approaches (with the use of Voronoi diagram) to realize dynamic clustering: (I1) how CHs cooperate with one another to ensure that for the most of time only one CH (preferably the CH that is closest to the target) is active; (I2) when the active CH solicits for sensor information, instead of having all the sensors in its vicinity reply, only a sufficient number of sensors respond with non-redundant, essential information to determine the target location; and (I3) both packets with which sensors respond to their CHs and packets that CHs report to subscribers do not incur significant collision. Through both probabilistic analysis and ns-2 simulation, we show with the use of Voronoi diagram, the CH that is usually closest to the target is (implicitly) selected as the leader and that the proposed dynamic clustering algorithm effectively eliminates contention among sensors and renders more accurate estimates of target locations as a result of better quality data collected and less collision incurred.
在本文中,我们设计并评估了一种完全分散的、轻量级的、动态的目标跟踪聚类算法。我们设想的分层传感器网络不是为所有传感器承担相同的角色,而是由以下组成:(a)由稀疏放置的高性能传感器组成的静态骨干,在某些信号事件触发时承担簇头(CH)的角色;(b)中等至密集的低端传感器,其功能是应要求向CHs提供传感器信息。当CH检测到的声信号强度超过预先确定的阈值时,就会形成一个簇,并且CH变得活跃。然后活动CH广播一个信息请求包,要求其附近的传感器加入集群并提供它们的感知信息。我们提出并设计了解决方案(使用Voronoi图)来实现动态聚类:(1)CHs如何相互合作以确保在大多数时间内只有一个CH(最好是最接近目标的CH)是活动的;(I2)当主动CH请求传感器信息时,不是让其附近的所有传感器响应,而是只有足够数量的传感器响应,提供非冗余的基本信息,以确定目标位置;以及(I3)传感器响应其CHs的两个数据包和CHs向订阅者报告的数据包不会引起重大碰撞。通过概率分析和ns-2仿真,我们使用Voronoi图表明,通常最接近目标的CH被(隐式)选择为领导者,并且所提出的动态聚类算法有效地消除了传感器之间的争用,并且由于收集到的数据质量更好,发生的碰撞更少,因此可以更准确地估计目标位置。
{"title":"Dynamic clustering for acoustic target tracking in wireless sensor networks","authors":"Wei-Peng Chen, J. Hou, L. Sha","doi":"10.1109/ICNP.2003.1249778","DOIUrl":"https://doi.org/10.1109/ICNP.2003.1249778","url":null,"abstract":"In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the sensors, we envision a hierarchical sensor network that is composed of (a) a static backbone of sparsely placed high-capability sensors which assume the role of a cluster head (CH) upon triggered by certain signal events; and (b) moderately to densely populated low-end sensors whose function is to provide sensor information to CHs upon request. A cluster is formed and a CH becomes active, when the acoustic signal strength detected by the CH exceeds a pre-determined threshold. The active CH then broadcasts an information solicitation packet, asking sensors in its vicinity to join the cluster and provide their sensing information. We address and devise solution approaches (with the use of Voronoi diagram) to realize dynamic clustering: (I1) how CHs cooperate with one another to ensure that for the most of time only one CH (preferably the CH that is closest to the target) is active; (I2) when the active CH solicits for sensor information, instead of having all the sensors in its vicinity reply, only a sufficient number of sensors respond with non-redundant, essential information to determine the target location; and (I3) both packets with which sensors respond to their CHs and packets that CHs report to subscribers do not incur significant collision. Through both probabilistic analysis and ns-2 simulation, we show with the use of Voronoi diagram, the CH that is usually closest to the target is (implicitly) selected as the leader and that the proposed dynamic clustering algorithm effectively eliminates contention among sensors and renders more accurate estimates of target locations as a result of better quality data collected and less collision incurred.","PeriodicalId":179873,"journal":{"name":"11th IEEE International Conference on Network Protocols, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130448622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
11th IEEE International Conference on Network Protocols, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1