首页 > 最新文献

Co-Next Student Workshop '09最新文献

英文 中文
Self-propagating worms in wireless sensor networks 无线传感器网络中的自传播蠕虫
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659015
Thanassis Giannetsos, T. Dimitriou, N. Prasad
Malicious code is defined as software designed to execute attacks on software systems. This work demonstrates the possibility of executing malware on wireless sensor nodes that are based on the von Neumann architecture. This is achieved by exploiting a buffer overflow vulnerability to smash the call stack, intrude a remote node over the radio channel and, eventually, completely take control of it. Then we show how the malware can be crafted to become a self-replicating worm that broadcasts itself and propagates over the network hop-by-hop, infecting all the nodes.
恶意代码被定义为旨在对软件系统执行攻击的软件。这项工作展示了在基于冯·诺伊曼架构的无线传感器节点上执行恶意软件的可能性。这是通过利用缓冲区溢出漏洞来破坏调用堆栈,通过无线电通道侵入远程节点,并最终完全控制它来实现的。然后我们展示了恶意软件如何被精心制作成一种自我复制的蠕虫,它会广播自己,并在网络上逐跳传播,感染所有节点。
{"title":"Self-propagating worms in wireless sensor networks","authors":"Thanassis Giannetsos, T. Dimitriou, N. Prasad","doi":"10.1145/1658997.1659015","DOIUrl":"https://doi.org/10.1145/1658997.1659015","url":null,"abstract":"Malicious code is defined as software designed to execute attacks on software systems. This work demonstrates the possibility of executing malware on wireless sensor nodes that are based on the von Neumann architecture. This is achieved by exploiting a buffer overflow vulnerability to smash the call stack, intrude a remote node over the radio channel and, eventually, completely take control of it. Then we show how the malware can be crafted to become a self-replicating worm that broadcasts itself and propagates over the network hop-by-hop, infecting all the nodes.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"44 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Adding emulation to planetlab nodes 向planetlab节点添加仿真
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659020
M. Carbone, L. Rizzo
Network testbeds have become very popular to support research on network protocols and distributed applications. When it comes to reproduce network behaviour, testbeds range between two extremes: use a fully emulated network, as in EmuLab, which yields very reproducible experiments but might be a poor representation of reality; or communicate through the real Internet, as in PlanetLab, resulting in more realistic but less reproducible scenarios. Having both features available in the same testbed, and being able to choose and mix the two at will, is clearly interesting for researchers. In this paper we present an extension of the PlanetLab testbed to add emulation capabilities to all nodes. The work is centered around the Dummynet emulator, which we ported to Linux as part of this project.
为了支持网络协议和分布式应用的研究,网络测试平台已经变得非常流行。当涉及到再现网络行为时,测试平台介于两个极端之间:使用完全模拟的网络,如在EmuLab中,它产生非常可重复的实验,但可能是对现实的糟糕代表;或者像PlanetLab一样,通过真实的互联网进行交流,从而产生更真实但更难以再现的场景。对于研究人员来说,在同一个测试台上同时使用这两种功能,并且能够随意选择和混合这两种功能显然是很有趣的。在本文中,我们提出了PlanetLab测试平台的扩展,以向所有节点添加仿真功能。工作的中心是Dummynet模拟器,我们将其移植到Linux上,作为这个项目的一部分。
{"title":"Adding emulation to planetlab nodes","authors":"M. Carbone, L. Rizzo","doi":"10.1145/1658997.1659020","DOIUrl":"https://doi.org/10.1145/1658997.1659020","url":null,"abstract":"Network testbeds have become very popular to support research on network protocols and distributed applications. When it comes to reproduce network behaviour, testbeds range between two extremes: use a fully emulated network, as in EmuLab, which yields very reproducible experiments but might be a poor representation of reality; or communicate through the real Internet, as in PlanetLab, resulting in more realistic but less reproducible scenarios. Having both features available in the same testbed, and being able to choose and mix the two at will, is clearly interesting for researchers.\u0000 In this paper we present an extension of the PlanetLab testbed to add emulation capabilities to all nodes. The work is centered around the Dummynet emulator, which we ported to Linux as part of this project.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Netflow based system for NAT detection 基于Netflow的NAT检测系统
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659010
Vojtech Krmicek, Jan Vykopal, Radek Krejcí
Revealing the misuse of network resources is one of the important fields in the network security, especially for the network administrators. One of them is the use of unauthorized NAT (Network Address Translation) devices (e.g. small office routers or wireless access points) inside the network which introduces serious security issues. There are several techniques proposed on how to detect NAT devices in the computer networks, but all these methods suffer from high false positive rate. Also there is no study how to perform NAT detection using NetFlow data, often used for monitoring and forensics analysis in large networks. The contribution of our work consists of the following: i) we have transformed existing NAT detection techniques to work with NetFlow data, ii) we propose three new NAT detection approaches, iii) we have designed a prototype of NAT detection system, which aggregates the results from various NAT detection techniques in order to minimize false positive and false negative rates.
揭示网络资源的滥用是网络安全的重要领域之一,对于网络管理员来说更是如此。其中之一是在网络中使用未经授权的NAT(网络地址转换)设备(例如小型办公室路由器或无线接入点),这会带来严重的安全问题。目前已经提出了几种检测计算机网络中NAT设备的方法,但这些方法都存在高误报率的问题。此外,也没有研究如何使用NetFlow数据执行NAT检测,NetFlow数据通常用于大型网络中的监控和取证分析。我们的工作贡献包括以下内容:i)我们已经将现有的NAT检测技术转换为与NetFlow数据一起工作,ii)我们提出了三种新的NAT检测方法,iii)我们设计了NAT检测系统的原型,该系统汇总了各种NAT检测技术的结果,以最大限度地减少误报和误报率。
{"title":"Netflow based system for NAT detection","authors":"Vojtech Krmicek, Jan Vykopal, Radek Krejcí","doi":"10.1145/1658997.1659010","DOIUrl":"https://doi.org/10.1145/1658997.1659010","url":null,"abstract":"Revealing the misuse of network resources is one of the important fields in the network security, especially for the network administrators. One of them is the use of unauthorized NAT (Network Address Translation) devices (e.g. small office routers or wireless access points) inside the network which introduces serious security issues. There are several techniques proposed on how to detect NAT devices in the computer networks, but all these methods suffer from high false positive rate. Also there is no study how to perform NAT detection using NetFlow data, often used for monitoring and forensics analysis in large networks. The contribution of our work consists of the following: i) we have transformed existing NAT detection techniques to work with NetFlow data, ii) we propose three new NAT detection approaches, iii) we have designed a prototype of NAT detection system, which aggregates the results from various NAT detection techniques in order to minimize false positive and false negative rates.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A robust pair-wise rekeying protocol in hierarchical wireless sensor networks 一种分层无线传感器网络中鲁棒的双密钥交换协议
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659011
An-Ni Shen, Song Guo
To support secure communications for many applications in wireless sensor networks (WSNs), some strategies have been proposed to develop the pair-wise rekeying protocol. However, most existing schemes suffer the node capture attack. In this paper, we present a perturbation-based pair-wise rekeying scheme for a hierarchical WSN. Our security analysis shows that the proposed scheme is robust to the node capture attack.
为了支持无线传感器网络(WSNs)中许多应用的安全通信,提出了一些策略来开发双密钥交换协议。然而,大多数现有方案都遭受节点捕获攻击。在本文中,我们提出了一种基于微扰的分层WSN对密钥更新方案。安全性分析表明,该方案对节点捕获攻击具有较强的鲁棒性。
{"title":"A robust pair-wise rekeying protocol in hierarchical wireless sensor networks","authors":"An-Ni Shen, Song Guo","doi":"10.1145/1658997.1659011","DOIUrl":"https://doi.org/10.1145/1658997.1659011","url":null,"abstract":"To support secure communications for many applications in wireless sensor networks (WSNs), some strategies have been proposed to develop the pair-wise rekeying protocol. However, most existing schemes suffer the node capture attack. In this paper, we present a perturbation-based pair-wise rekeying scheme for a hierarchical WSN. Our security analysis shows that the proposed scheme is robust to the node capture attack.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
What can P2P do for traffic control in P2P networks? P2P对P2P网络中的流量控制有什么作用?
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659005
HyunYong Lee, A. Nakao, JongWon Kim
Recently, an ISP-driven cooperative approach is proposed to empowering ISPs for controlling traffic generated by P2P applications [?]. In this approach, an ISP and peers running a P2P application have a cooperative relationship where the ISP provides a guidance, i.e., network information to peers so that the peers select neighbors according to the guidance. This approach enables each party to gain better control and performance, e.g., ISPs gain a control over the P2P traffic, and peers accelerate the performance of the P2P application. However, we observe that the existing approach defines unilateral interaction where only ISPs strive to tackle traffic control and guide the peers that in turn just follow the guidance given by the ISPs, even though the peers could actively help collect network information and refine the guidance. The incentives for the peers to participate in this scheme is that they will also benefit on their part in reducing the download completion time as shown in the existing work [?]. In the light of this observation, we propose bilateral cooperation between ISPs and peers to bring more benefit to both parties, where not only ISPs but also the peers actively provide information so that ISPs can issue a better guidance for the peers than in the existing unilateral interaction model. In more detail, we divide measurement work into two parts so as to collect the network information efficiently and also introduce the guidance including traffic bound which is missing from the existing work. Through simulations we show our proposal brings more benefit to both ISPs and peers than the existing approach such as P4P [?].
最近,提出了一种由互联网服务提供商驱动的合作方法,使互联网服务提供商能够控制由P2P应用程序产生的流量。在这种方法中,ISP和运行P2P应用程序的对等体之间存在一种合作关系,ISP向对等体提供一个指导,即网络信息,对等体根据指导选择邻居。这种方式可以使每一方获得更好的控制和性能,例如,isp获得了对P2P流量的控制,而对等体加速了P2P应用的性能。然而,我们观察到,现有的方法定义了单边交互,其中只有isp努力解决流量控制并引导对等体,而对等体反过来只遵循isp给出的指导,即使对等体可以积极帮助收集网络信息并完善指导。同行参与这项计划的动机是,他们也将从减少下载完成时间中获益,如现有工作[?]所示。鉴于此,我们建议isp和对等体之间进行双边合作,使双方都能获得更大的利益。在这种合作中,不仅是isp,对等体也会主动提供信息,从而使isp对对等体的引导比现有的单边互动模式更好。我们将测量工作分为两部分,以便有效地收集网络信息,并引入了现有工作中缺少的包括流量约束在内的引导。通过模拟,我们证明了我们的提议比现有的方法(如P4P)给isp和对等方带来了更多的好处。
{"title":"What can P2P do for traffic control in P2P networks?","authors":"HyunYong Lee, A. Nakao, JongWon Kim","doi":"10.1145/1658997.1659005","DOIUrl":"https://doi.org/10.1145/1658997.1659005","url":null,"abstract":"Recently, an ISP-driven cooperative approach is proposed to empowering ISPs for controlling traffic generated by P2P applications [?]. In this approach, an ISP and peers running a P2P application have a cooperative relationship where the ISP provides a guidance, i.e., network information to peers so that the peers select neighbors according to the guidance. This approach enables each party to gain better control and performance, e.g., ISPs gain a control over the P2P traffic, and peers accelerate the performance of the P2P application. However, we observe that the existing approach defines unilateral interaction where only ISPs strive to tackle traffic control and guide the peers that in turn just follow the guidance given by the ISPs, even though the peers could actively help collect network information and refine the guidance. The incentives for the peers to participate in this scheme is that they will also benefit on their part in reducing the download completion time as shown in the existing work [?]. In the light of this observation, we propose bilateral cooperation between ISPs and peers to bring more benefit to both parties, where not only ISPs but also the peers actively provide information so that ISPs can issue a better guidance for the peers than in the existing unilateral interaction model. In more detail, we divide measurement work into two parts so as to collect the network information efficiently and also introduce the guidance including traffic bound which is missing from the existing work. Through simulations we show our proposal brings more benefit to both ISPs and peers than the existing approach such as P4P [?].","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133341003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure interference reporting for dense Wi-Fi deployments 为密集Wi-Fi部署提供安全干扰报告
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659018
P. A. Frangoudis, D. Zografos, George C. Polyzos
We study the problem of interference detection in dense Wi-Fi deployments, which are a reality in most modern metropolitan areas. Interference among neighbor Wi-Fi cells stems from the anarchic deployment of Wi-Fi access points (APs) and the fact that only few APs can operate at the same location on non-overlapping frequencies. Detection of interference conditions is the first step towards its mitigation. We follow a client-centric approach, where wireless clients monitor and report Wi-Fi AP presence. We focus on the security aspects of such a scheme, assuming that clients may attack the reporting mechanism by submitting fake information. Our early evaluation shows that for certain attacker strategies, simple mechanisms can effectively filter invalid reports with minimal loss of information.
我们研究了密集Wi-Fi部署中的干扰检测问题,这是大多数现代都市地区的现实。邻近Wi-Fi单元之间的干扰源于Wi-Fi接入点(ap)的无序部署,以及只有少数ap可以在非重叠频率上在同一位置运行。探测干扰状况是减少干扰的第一步。我们采用以客户为中心的方法,无线客户端监控并报告Wi-Fi AP的存在。我们将重点放在这种方案的安全方面,假设客户可能会通过提交虚假信息来攻击报告机制。我们的早期评估表明,对于某些攻击者策略,简单的机制可以有效地过滤无效报告,同时将信息损失降到最低。
{"title":"Secure interference reporting for dense Wi-Fi deployments","authors":"P. A. Frangoudis, D. Zografos, George C. Polyzos","doi":"10.1145/1658997.1659018","DOIUrl":"https://doi.org/10.1145/1658997.1659018","url":null,"abstract":"We study the problem of interference detection in dense Wi-Fi deployments, which are a reality in most modern metropolitan areas. Interference among neighbor Wi-Fi cells stems from the anarchic deployment of Wi-Fi access points (APs) and the fact that only few APs can operate at the same location on non-overlapping frequencies. Detection of interference conditions is the first step towards its mitigation. We follow a client-centric approach, where wireless clients monitor and report Wi-Fi AP presence. We focus on the security aspects of such a scheme, assuming that clients may attack the reporting mechanism by submitting fake information. Our early evaluation shows that for certain attacker strategies, simple mechanisms can effectively filter invalid reports with minimal loss of information.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Relative delay estimator for multipath transport 多路径传输的相对延迟估计器
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659024
Fei Song, Hongke Zhang, Sidong Zhang, Fernando M. V. Ramos, Jon Crowcroft
Due to the dynamic nature of the Internet, the characteristic parameters of network paths are continually changing. The round trip time (RTT) can be used to estimate retransmission timeouts with reasonable accuracy. However, using RTT to evaluate forward or backward delays is not suitable. By identifying this shortcoming, we propose a relative delay estimator (RDE) to make a distinction between all available paths and build a retransmission policy based on it.
由于互联网的动态性,网络路径的特征参数是不断变化的。往返时间(RTT)可用于估算重传超时,并具有合理的精度。然而,使用RTT来评估向前或向后延迟是不合适的。通过识别这个缺点,我们提出了一个相对延迟估计器(RDE)来区分所有可用路径并基于它构建重传策略。
{"title":"Relative delay estimator for multipath transport","authors":"Fei Song, Hongke Zhang, Sidong Zhang, Fernando M. V. Ramos, Jon Crowcroft","doi":"10.1145/1658997.1659024","DOIUrl":"https://doi.org/10.1145/1658997.1659024","url":null,"abstract":"Due to the dynamic nature of the Internet, the characteristic parameters of network paths are continually changing. The round trip time (RTT) can be used to estimate retransmission timeouts with reasonable accuracy. However, using RTT to evaluate forward or backward delays is not suitable. By identifying this shortcoming, we propose a relative delay estimator (RDE) to make a distinction between all available paths and build a retransmission policy based on it.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116529818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable asymmetric path capacity measurement 可靠的非对称路径容量测量
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659027
Edmond W. W. Chan, Xiapu Luo, R. Chang
Existing non-cooperative methods for network capacity measurement are quite restrictive for capacity-asymmetric paths, and their results could be affected by adverse network conditions (e.g., packet delay, packet loss, and packet reordering). In this paper, we propose to use two types of packet pairs---round-trip packet pair and two-way packet pair---and the minimum-delay-difference method for reliable capacity measurement. Our preliminary results show that the new proposal is correct and achieves accurate results even for highly capacity-asymmetric paths.
现有的非合作网络容量测量方法对容量不对称路径有很大的限制,其结果可能受到不利网络条件(如数据包延迟、数据包丢失和数据包重新排序)的影响。在本文中,我们建议使用两种类型的分组对——往返分组对和双向分组对——以及最小时延差方法来进行可靠的容量测量。我们的初步结果表明,新的建议是正确的,即使在高度容量不对称的路径上也能得到准确的结果。
{"title":"Reliable asymmetric path capacity measurement","authors":"Edmond W. W. Chan, Xiapu Luo, R. Chang","doi":"10.1145/1658997.1659027","DOIUrl":"https://doi.org/10.1145/1658997.1659027","url":null,"abstract":"Existing non-cooperative methods for network capacity measurement are quite restrictive for capacity-asymmetric paths, and their results could be affected by adverse network conditions (e.g., packet delay, packet loss, and packet reordering). In this paper, we propose to use two types of packet pairs---round-trip packet pair and two-way packet pair---and the minimum-delay-difference method for reliable capacity measurement. Our preliminary results show that the new proposal is correct and achieves accurate results even for highly capacity-asymmetric paths.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129025538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LT network codes: low complexity network codes LT网络代码:低复杂度网络代码
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659019
M. Champel, Kévin Huguenin, Anne-Marie Kermarrec, Nicolas Le Scouarnec
This paper proposes LTNC, a new recoding algorithm to build low complexity network codes. At the core of LTNC is a decentralized version of LT codes that allows the use of fast belief propagation decoding instead of high complexity Gauss reduction used by random linear network coding (RLNC). In the context of a peer-to-peer content dissemination application, we observe that LTNC trades advantageously communication optimality of RLNC with decoding cost as it incurs only 38.5% of bandwidth overhead for a gain of almost 99% in CPU cycles.
本文提出了一种新的编码算法LTNC,用于构建低复杂度的网络编码。LTNC的核心是LT代码的去中心化版本,它允许使用快速信念传播解码,而不是随机线性网络编码(RLNC)使用的高复杂性高斯约简。在点对点内容传播应用程序的背景下,我们观察到LTNC在RLNC的通信最优性与解码成本之间进行了有利的交易,因为它只产生38.5%的带宽开销,而CPU周期的增益接近99%。
{"title":"LT network codes: low complexity network codes","authors":"M. Champel, Kévin Huguenin, Anne-Marie Kermarrec, Nicolas Le Scouarnec","doi":"10.1145/1658997.1659019","DOIUrl":"https://doi.org/10.1145/1658997.1659019","url":null,"abstract":"This paper proposes LTNC, a new recoding algorithm to build low complexity network codes. At the core of LTNC is a decentralized version of LT codes that allows the use of fast belief propagation decoding instead of high complexity Gauss reduction used by random linear network coding (RLNC). In the context of a peer-to-peer content dissemination application, we observe that LTNC trades advantageously communication optimality of RLNC with decoding cost as it incurs only 38.5% of bandwidth overhead for a gain of almost 99% in CPU cycles.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116689835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On the characterization of multi-channel applications 关于多通道应用的表征
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659001
Walter de Donato, A. Pescapé
We are assisting to the evolution of new generation applications and services, progressively providing - through a single interface - more interactions among the users and between the users and the network. This is promoting the development of multi-channel applications (e.g. Skype, Cloud Computing Platforms, Facebook, ...) that are specifically designed to easily manage different services delivered on different channels, providing a single access point for the users. This work proposes an integrated multi-layer methodology for the analysis, characterization, and identification of multi-channel applications. A proof of its applicability is shown considering Skype as a case study.
我们正协助新一代应用程序和服务的发展,逐步通过单一界面提供用户之间以及用户与网络之间更多的交互。这促进了多渠道应用程序(例如Skype、云计算平台、Facebook等)的发展,这些应用程序专门设计用于方便地管理在不同渠道上交付的不同服务,为用户提供单一接入点。这项工作提出了一种集成的多层方法,用于分析、表征和识别多通道应用。考虑到Skype作为案例研究,证明了其适用性。
{"title":"On the characterization of multi-channel applications","authors":"Walter de Donato, A. Pescapé","doi":"10.1145/1658997.1659001","DOIUrl":"https://doi.org/10.1145/1658997.1659001","url":null,"abstract":"We are assisting to the evolution of new generation applications and services, progressively providing - through a single interface - more interactions among the users and between the users and the network. This is promoting the development of multi-channel applications (e.g. Skype, Cloud Computing Platforms, Facebook, ...) that are specifically designed to easily manage different services delivered on different channels, providing a single access point for the users. This work proposes an integrated multi-layer methodology for the analysis, characterization, and identification of multi-channel applications. A proof of its applicability is shown considering Skype as a case study.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122662452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Co-Next Student Workshop '09
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1