首页 > 最新文献

2009 6th IEEE Consumer Communications and Networking Conference最新文献

英文 中文
Optimal Beaconing for 60 GHz Millimeter Wave 60 GHz毫米波最佳信标
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784698
Joongheon Kim, Beomjin Jeon
This paper addresses optimal beacon fragmentation schemes for high-performance MAC in 60 GHz millimeter wave (mmWave) networks. The proposed optimal beacon scheme can be classified into two methods, i.e., differentiated and fragmentized beaconing. Differentiated and fragmentized beaconing schemes are for directional and omni-directional data transmission. By the result of performance evaluation, the novelty of the proposed schemes is verified.
本文研究了60ghz毫米波(mmWave)网络中高性能MAC的最佳信标分片方案。本文提出的最优信标方案可分为差异化信标和碎片化信标两种方法。差异化和碎片化信标方案分别用于定向和全向数据传输。通过性能评估结果,验证了所提方案的新颖性。
{"title":"Optimal Beaconing for 60 GHz Millimeter Wave","authors":"Joongheon Kim, Beomjin Jeon","doi":"10.1109/CCNC.2009.4784698","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784698","url":null,"abstract":"This paper addresses optimal beacon fragmentation schemes for high-performance MAC in 60 GHz millimeter wave (mmWave) networks. The proposed optimal beacon scheme can be classified into two methods, i.e., differentiated and fragmentized beaconing. Differentiated and fragmentized beaconing schemes are for directional and omni-directional data transmission. By the result of performance evaluation, the novelty of the proposed schemes is verified.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131178154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic QoS Aware Route Optimization for Networks with Mobility Agents 基于移动代理的动态QoS感知路由优化
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784886
A. D. Pragad, P. Pangalos, V. Friderikos, H. Aghvami
To minimize the large handover delays associated with Mobile IPv6 numerous micro-mobility protocols were proposed. In this paper, we consider the Mobility Agent (MA) based family of micro-mobility protocols such as Hierarchical Mobile IPv6 and Proxy Mobile IPv6 and focus on the issue of the bottlenecks that MAs can lead up to under high network load. We propose a Dynamic QoS aware Route Optimization with the aim of reducing the bottlenecks around MAs. We exploit the fact that not all classes of IP traffic require low handover latency support; for example, P2P traffic, web browsing, etc. do not require high QoS and are delay tolerant. Hence, such traffic classes can be forced to establish a direct connection with the CN and the routing policies at edge routers can ensure these traffic classes bypass the MA. The number of traffic classes that are to bypass the MA increases dynamically according to the congestion of the network. Results show that by implementing the dynamic route optimization the network utilization increases and the average packet delay in the network are reduced.
为了最小化与移动IPv6相关的大切换延迟,提出了许多微移动协议。在本文中,我们考虑了基于移动代理(MA)的微移动协议家族,如分层移动IPv6和代理移动IPv6,并重点讨论了移动代理在高网络负载下可能导致的瓶颈问题。我们提出了一种动态QoS感知路由优化,旨在减少MAs周围的瓶颈。我们利用了并非所有类型的IP流量都需要低切换延迟支持的事实;例如P2P流量、网页浏览等,对QoS要求不高,可容忍延迟。因此,可以强制这些流量类与CN建立直接连接,并且可以通过边缘路由器的路由策略确保这些流量类绕过MA。绕过MA的流分类数量会根据网络拥塞情况动态增加。结果表明,通过实现动态路由优化,提高了网络利用率,降低了网络平均数据包延迟。
{"title":"Dynamic QoS Aware Route Optimization for Networks with Mobility Agents","authors":"A. D. Pragad, P. Pangalos, V. Friderikos, H. Aghvami","doi":"10.1109/CCNC.2009.4784886","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784886","url":null,"abstract":"To minimize the large handover delays associated with Mobile IPv6 numerous micro-mobility protocols were proposed. In this paper, we consider the Mobility Agent (MA) based family of micro-mobility protocols such as Hierarchical Mobile IPv6 and Proxy Mobile IPv6 and focus on the issue of the bottlenecks that MAs can lead up to under high network load. We propose a Dynamic QoS aware Route Optimization with the aim of reducing the bottlenecks around MAs. We exploit the fact that not all classes of IP traffic require low handover latency support; for example, P2P traffic, web browsing, etc. do not require high QoS and are delay tolerant. Hence, such traffic classes can be forced to establish a direct connection with the CN and the routing policies at edge routers can ensure these traffic classes bypass the MA. The number of traffic classes that are to bypass the MA increases dynamically according to the congestion of the network. Results show that by implementing the dynamic route optimization the network utilization increases and the average packet delay in the network are reduced.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116974419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Intrusion Detection System in Ad Hoc Networks: A Social Network Analysis Approach 自组织网络中的入侵检测系统:一种社会网络分析方法
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784728
Wei Wang, H. Man, Yu Liu
We introduce a social network analysis method as a new approach to build an Intrusion Detection System (SNIDS) in ad hoc networks. The SN-IDS utilizes social relations as metrics-of-interest for anomaly detections, which is different from most traditional IDS approaches. To construct proper social networks, we first investigate ad hoc MAC and network layer data attributes and select relevant social feature sets; then we build up a set of socio-matrices based on these features. Social analysis methods are applied to these matrices to detect suspicious behaviors of mobile nodes. NS-2 simulation results show that this SN-IDS system can effectively detect common attacks with high detection rates and low false positive alarm rates. Furthermore, it has clear advantages over the conventional association rule based data mining IDS in terms of computation and system complexity.
本文介绍了一种社会网络分析方法,作为在自组织网络中构建入侵检测系统(SNIDS)的新方法。SN-IDS利用社会关系作为异常检测的兴趣度量,这与大多数传统的IDS方法不同。为了构建合适的社交网络,我们首先研究ad hoc MAC和网络层数据属性,并选择相关的社交特征集;然后我们根据这些特征建立一组社会矩阵。对这些矩阵应用社会分析方法来检测移动节点的可疑行为。NS-2仿真结果表明,该系统能够有效检测常见攻击,检测率高,误报率低。此外,与传统的基于关联规则的数据挖掘IDS相比,它在计算量和系统复杂性方面具有明显的优势。
{"title":"An Intrusion Detection System in Ad Hoc Networks: A Social Network Analysis Approach","authors":"Wei Wang, H. Man, Yu Liu","doi":"10.1109/CCNC.2009.4784728","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784728","url":null,"abstract":"We introduce a social network analysis method as a new approach to build an Intrusion Detection System (SNIDS) in ad hoc networks. The SN-IDS utilizes social relations as metrics-of-interest for anomaly detections, which is different from most traditional IDS approaches. To construct proper social networks, we first investigate ad hoc MAC and network layer data attributes and select relevant social feature sets; then we build up a set of socio-matrices based on these features. Social analysis methods are applied to these matrices to detect suspicious behaviors of mobile nodes. NS-2 simulation results show that this SN-IDS system can effectively detect common attacks with high detection rates and low false positive alarm rates. Furthermore, it has clear advantages over the conventional association rule based data mining IDS in terms of computation and system complexity.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117145604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quantitative Study of an Outdoor Multi-Hop 802.11 Network Performance using a Novel Passive Measurement Approach 基于新型被动测量方法的室外多跳802.11网络性能定量研究
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784750
Ting Zhou, H. Sharif, M. Hempel, P. Mahasukhon, Wei Wang
This paper presents a novel passive measurement approach to accurately evaluate the performance of outdoor multi-hop 802.11 networks from the wireless side directly. Our approach employs five processing steps to evaluate per-hop system performances. Firstly, reference packets are identified from multiple independent packet traces. Secondly, multiple packet traces in one channel are merged together using the identified reference packets. Thirdly, redundant packets are filtered from the merging packet traces. To adjust for propagation differences between access points and monitors, the status of each packet is then corrected according to its context packets. Finally, an inference approach based on finite state machines (FSM) is designed to infer missing packets which are not recorded in any of the monitor traces but known to have existed in the real traffic. The unique features in our approach include propagation delay evaluation and FSM designs for existing packet status correction and missing packet inference. The measurement results collected from our outdoor multi-hop 802.11 testbed are used to validate the accuracy of our approach.
本文提出了一种新的无源测量方法,可以直接从无线端准确评估室外多跳802.11网络的性能。我们的方法采用五个处理步骤来评估每跳系统的性能。首先,从多个独立的数据包轨迹中识别参考数据包。其次,使用识别的参考包将一个通道中的多个包迹合并在一起。第三,从合并报文轨迹中过滤冗余报文。为了调整接入点和监视器之间的传播差异,然后根据其上下文数据包纠正每个数据包的状态。最后,设计了一种基于有限状态机(FSM)的推理方法来推断未记录在任何监视器跟踪中但已知存在于实际流量中的丢失数据包。该方法的独特之处包括传播延迟评估和FSM设计,用于现有数据包状态校正和缺失数据包推断。从室外多跳802.11测试台上收集的测量结果用于验证我们的方法的准确性。
{"title":"Quantitative Study of an Outdoor Multi-Hop 802.11 Network Performance using a Novel Passive Measurement Approach","authors":"Ting Zhou, H. Sharif, M. Hempel, P. Mahasukhon, Wei Wang","doi":"10.1109/CCNC.2009.4784750","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784750","url":null,"abstract":"This paper presents a novel passive measurement approach to accurately evaluate the performance of outdoor multi-hop 802.11 networks from the wireless side directly. Our approach employs five processing steps to evaluate per-hop system performances. Firstly, reference packets are identified from multiple independent packet traces. Secondly, multiple packet traces in one channel are merged together using the identified reference packets. Thirdly, redundant packets are filtered from the merging packet traces. To adjust for propagation differences between access points and monitors, the status of each packet is then corrected according to its context packets. Finally, an inference approach based on finite state machines (FSM) is designed to infer missing packets which are not recorded in any of the monitor traces but known to have existed in the real traffic. The unique features in our approach include propagation delay evaluation and FSM designs for existing packet status correction and missing packet inference. The measurement results collected from our outdoor multi-hop 802.11 testbed are used to validate the accuracy of our approach.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124107843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of STBC MB-OFDM UWB STBC MB-OFDM超宽带性能分析
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784743
Qinghai Yang, K. Kwak, Fenglin Fu
This paper addresses the performance analysis for orthogonal space-time block coded (STBC) multiband orthogonal frequency division multiplexing (MB-OFDM) ultra-wideband (UWB) systems. As the channel model considers the log-normal fading, the resultant signal to noise ratio (SNR) will be the product of a log-normal distributed variable and a variable of sum of several Gamma-distributed variants. Based on this, the exact expressions for the bit error probability and the outage probability are derived theoretically. And their approximate expressions can be obtained via the Gauss-Hermite and the Gauss-Laguerre quadratures, respectively. Simulation results verify the theoretical solutions.
本文研究了正交空时分组编码(STBC)多频带正交频分复用(MB-OFDM)超宽带(UWB)系统的性能分析。由于信道模型考虑对数正态衰落,所得到的信噪比(SNR)将是对数正态分布变量和多个伽马分布变量之和的乘积。在此基础上,从理论上推导了误码概率和中断概率的精确表达式。它们的近似表达式可以分别由高斯-埃尔米特和高斯-拉盖尔正交得到。仿真结果验证了理论解的正确性。
{"title":"Performance Analysis of STBC MB-OFDM UWB","authors":"Qinghai Yang, K. Kwak, Fenglin Fu","doi":"10.1109/CCNC.2009.4784743","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784743","url":null,"abstract":"This paper addresses the performance analysis for orthogonal space-time block coded (STBC) multiband orthogonal frequency division multiplexing (MB-OFDM) ultra-wideband (UWB) systems. As the channel model considers the log-normal fading, the resultant signal to noise ratio (SNR) will be the product of a log-normal distributed variable and a variable of sum of several Gamma-distributed variants. Based on this, the exact expressions for the bit error probability and the outage probability are derived theoretically. And their approximate expressions can be obtained via the Gauss-Hermite and the Gauss-Laguerre quadratures, respectively. Simulation results verify the theoretical solutions.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124791513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Media Adaptation for Connected Mobile Devices 连接移动设备的媒体适配
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784822
Michael Chukwu
The significant increase in data transmission rates of mobile networks, improvement in camera/display technologies and the continuous rise in computational power of mobile devices has stimulated and supported the wide deployment of multimedia services to mobile platforms. However the wide diversity of these devices creates a need for efficient and seamless adaptation scheme that provides for the transparent and augmented use of these multimedia services.
移动网络数据传输速率的显著提高、摄像/显示技术的改进以及移动设备计算能力的不断提高,刺激并支持了多媒体业务在移动平台上的广泛部署。然而,这些设备的广泛多样性产生了对高效和无缝适应方案的需求,以提供透明和增强使用这些多媒体服务。
{"title":"Media Adaptation for Connected Mobile Devices","authors":"Michael Chukwu","doi":"10.1109/CCNC.2009.4784822","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784822","url":null,"abstract":"The significant increase in data transmission rates of mobile networks, improvement in camera/display technologies and the continuous rise in computational power of mobile devices has stimulated and supported the wide deployment of multimedia services to mobile platforms. However the wide diversity of these devices creates a need for efficient and seamless adaptation scheme that provides for the transparent and augmented use of these multimedia services.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
StreamComplete: An Architecture for Mesh-Based Peer-to-Peer Live Video Streaming StreamComplete:一个基于网格的点对点实时视频流的架构
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784767
Federico Covino, Massimo Mecella
The increasing of bandwidth capacity and the rising of more active and more demanding Internet users motivate the research of the best solution in P2P multimedia streaming. This paper presents STREAM COMPLETE, a new architecture and prototype system for mesh-based P2P live video streaming; it realizes a new concept of overlay network's management as well as merges the best practices of tree- and mesh-based approaches. STREAM COMPLETE creates a dynamic overlay network that optimizes itself basing on local conditions of peers. The two core operations are: (i) FastTop, that reorganizes peers in order to improve the general performance of the network; (ii) LoopCheck, that detects bounded loops of the multimedia streaming in the mesh overlay network. We have extensively evaluated the performance and the behavior of STREAM COMPLETE over the Planet Lab. Our experiments demonstrate the ability of peers in managing the overlay network with autonomic behavior in case of network changes. Furthermore the system is scalable w.r.t. the cardinality of the overlay network, by requiring very few control traffic.
随着网络带宽容量的不断增大,互联网用户的活跃程度和要求的不断提高,P2P多媒体流媒体的最佳解决方案的研究也日益迫切。提出了一种新的基于网格的P2P视频直播体系结构和原型系统STREAM COMPLETE;它实现了覆盖网络管理的新概念,并融合了基于树和基于网格的方法的最佳实践。STREAM COMPLETE创建了一个动态的覆盖网络,它基于对等体的本地条件优化自己。两个核心业务是:(i) FastTop,重组对等点,以改善网络的总体性能;(ii) LoopCheck,检测网格覆盖网络中多媒体流的有界循环。我们在Planet Lab上广泛评估了STREAM COMPLETE的性能和行为。我们的实验证明了对等体在网络变化情况下具有自主行为管理覆盖网络的能力。此外,该系统通过需要很少的控制流量,可以根据覆盖网络的基数进行扩展。
{"title":"StreamComplete: An Architecture for Mesh-Based Peer-to-Peer Live Video Streaming","authors":"Federico Covino, Massimo Mecella","doi":"10.1109/CCNC.2009.4784767","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784767","url":null,"abstract":"The increasing of bandwidth capacity and the rising of more active and more demanding Internet users motivate the research of the best solution in P2P multimedia streaming. This paper presents STREAM COMPLETE, a new architecture and prototype system for mesh-based P2P live video streaming; it realizes a new concept of overlay network's management as well as merges the best practices of tree- and mesh-based approaches. STREAM COMPLETE creates a dynamic overlay network that optimizes itself basing on local conditions of peers. The two core operations are: (i) FastTop, that reorganizes peers in order to improve the general performance of the network; (ii) LoopCheck, that detects bounded loops of the multimedia streaming in the mesh overlay network. We have extensively evaluated the performance and the behavior of STREAM COMPLETE over the Planet Lab. Our experiments demonstrate the ability of peers in managing the overlay network with autonomic behavior in case of network changes. Furthermore the system is scalable w.r.t. the cardinality of the overlay network, by requiring very few control traffic.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Tangible "Virtual Money" - Position Paper 迈向有形的“虚拟货币”-立场文件
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784830
Kenji Saito, E. Morino
Today, money forms its own virtual world that is destructive to real economy; monetary economy formed by circulation of money has grown in an imbalanced way to have unproportionate influences over the real economy that consists solely of production, distribution and consumption. Virtual world technology can potentially lower the cost of alternative forms of economy that existed in the past, and bring tangibility, or agreement with real economy, back to money. But most available economy systems in the virtual worlds today are equally destructive as the monetary system in the real world. This position paper proposes revived forms of commodity money (common merchandise being used as a medium of exchange) and drafts in real terms (exchange tickets with promises of providing equivalent commodities as specified), utilizing virtual world technology to form tangible monetary systems for the benefit of both virtual and real economies.
今天,货币形成了自己的虚拟世界,对实体经济具有破坏性;货币流通形成的货币经济发展不平衡,对单纯由生产、分配和消费组成的实体经济产生了不成比例的影响。虚拟世界技术可以潜在地降低过去存在的替代经济形式的成本,并将有形经济或与实体经济的一致性带回金钱。但是,当今虚拟世界中大多数可用的经济系统与现实世界中的货币系统一样具有破坏性。这一立场文件提出了商品货币的复兴形式(普通商品被用作交换媒介)和实物货币的草案(交换票据,承诺提供指定的等价物),利用虚拟世界技术形成有形货币体系,使虚拟经济和实体经济都受益。
{"title":"Towards Tangible \"Virtual Money\" - Position Paper","authors":"Kenji Saito, E. Morino","doi":"10.1109/CCNC.2009.4784830","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784830","url":null,"abstract":"Today, money forms its own virtual world that is destructive to real economy; monetary economy formed by circulation of money has grown in an imbalanced way to have unproportionate influences over the real economy that consists solely of production, distribution and consumption. \u0000 \u0000Virtual world technology can potentially lower the cost of alternative forms of economy that existed in the past, and bring tangibility, or agreement with real economy, back to money. But most available economy systems in the virtual worlds today are equally destructive as the monetary system in the real world. \u0000 \u0000This position paper proposes revived forms of commodity money (common merchandise being used as a medium of exchange) and drafts in real terms (exchange tickets with promises of providing equivalent commodities as specified), utilizing virtual world technology to form tangible monetary systems for the benefit of both virtual and real economies.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128611501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Energy Efficient Communication Scheme with Potential Application to Consumer and Personal Wireless Networks 一种具有潜在应用于消费者和个人无线网络的节能通信方案
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784888
K. Sinha
Applications requiring low power and quick turn on time (e.g., sensor networks) usually employ radios with only simple modulation techniques such as ASK, OOK and FSK [12]. We present in this paper a non-coherent detection based transceiver implementation for the RBNSiZeComm protocol proposed in [1], [2]. For a hybrid modulation scheme using FSK and ASK and assuming equal likelihood of all possible binary strings of a given length, we show that relative to binary FSK, there is a 41% savings in energy on an average at the transmitter, over additive white gaussian noise (AWGN) channels. Furthermore, our simulation results demonstrate that compared to binary FSK, for wireless application scenarios where longevity of power supply is a major concern (e.g., remote healthcare, streaming multimedia and agriculture wireless sensor networks) our proposed implementation can extend the battery life of devices from about 33% to 61% on an average, for the different communication data types used in these applications. Coupled with the low cost and low complexity of the transceiver, these savings demonstrate the usefulness of RBNSiZeComm for applications involving low power wireless networks.
需要低功耗和快速开启时间的应用(例如,传感器网络)通常使用仅具有简单调制技术的无线电,如ASK, OOK和FSK[12]。我们在本文中提出了一种基于非相干检测的收发器实现RBNSiZeComm协议[1],[2]。对于使用FSK和ASK的混合调制方案,并假设给定长度的所有可能的二进制字符串的可能性相等,我们表明,相对于二进制FSK,在发送端,在加性高斯白噪声(AWGN)信道上,平均节省41%的能量。此外,我们的仿真结果表明,与二进制FSK相比,对于主要关注电源寿命的无线应用场景(例如,远程医疗、流媒体和农业无线传感器网络),我们提出的实现可以将设备的电池寿命平均从33%延长到61%,用于这些应用中使用的不同通信数据类型。再加上收发器的低成本和低复杂性,这些节省证明了RBNSiZeComm对于涉及低功耗无线网络的应用的有用性。
{"title":"An Energy Efficient Communication Scheme with Potential Application to Consumer and Personal Wireless Networks","authors":"K. Sinha","doi":"10.1109/CCNC.2009.4784888","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784888","url":null,"abstract":"Applications requiring low power and quick turn on time (e.g., sensor networks) usually employ radios with only simple modulation techniques such as ASK, OOK and FSK [12]. We present in this paper a non-coherent detection based transceiver implementation for the RBNSiZeComm protocol proposed in [1], [2]. For a hybrid modulation scheme using FSK and ASK and assuming equal likelihood of all possible binary strings of a given length, we show that relative to binary FSK, there is a 41% savings in energy on an average at the transmitter, over additive white gaussian noise (AWGN) channels. Furthermore, our simulation results demonstrate that compared to binary FSK, for wireless application scenarios where longevity of power supply is a major concern (e.g., remote healthcare, streaming multimedia and agriculture wireless sensor networks) our proposed implementation can extend the battery life of devices from about 33% to 61% on an average, for the different communication data types used in these applications. Coupled with the low cost and low complexity of the transceiver, these savings demonstrate the usefulness of RBNSiZeComm for applications involving low power wireless networks.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128629984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient Data Management using the Session Log in DHT and its Evaluation DHT会话日志的高效数据管理及其评价
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784963
Satoru Noguchi, A. Inomata, K. Fujikawa, H. Sunahara
Distributed Hash Table (DHT) is a specialized distributed system that aims to lookup hashed identifiers efficiently in order to route messages to and from the corresponding nodes and objects. However DHTs are mechanisms sensitive to churn (the continuous and interleaved process of arrival / departure of nodes). As a result, they often cause loss of stored objects and failures in the lookup, a serious issue for all overlay networks. In this paper, we propose a dynamic replica location method using the session log in DHT. Our method can determine dynamically the effective number of replicas on session running periods among anticipate nodes. We also implemented a prototype based on an existing DHT routing algorithm, and we evaluated the performance of the prototype. Our proposed method was shown to reduce data loss and the cost for locating replication.
分布式哈希表(DHT)是一种专门的分布式系统,旨在有效地查找哈希标识符,以便将消息路由到相应的节点和对象。然而,dht是对搅动(节点到达/离开的连续和交错的过程)敏感的机制。因此,它们经常导致存储对象的丢失和查找失败,这是所有覆盖网络的一个严重问题。本文提出了一种基于DHT会话日志的动态副本定位方法。该方法可以动态确定预期节点在会话运行周期内的有效副本数量。我们还基于现有的DHT路由算法实现了一个原型,并对原型的性能进行了评估。结果表明,该方法可以减少数据丢失和定位复制的成本。
{"title":"Efficient Data Management using the Session Log in DHT and its Evaluation","authors":"Satoru Noguchi, A. Inomata, K. Fujikawa, H. Sunahara","doi":"10.1109/CCNC.2009.4784963","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784963","url":null,"abstract":"Distributed Hash Table (DHT) is a specialized distributed system that aims to lookup hashed identifiers efficiently in order to route messages to and from the corresponding nodes and objects. However DHTs are mechanisms sensitive to churn (the continuous and interleaved process of arrival / departure of nodes). As a result, they often cause loss of stored objects and failures in the lookup, a serious issue for all overlay networks. In this paper, we propose a dynamic replica location method using the session log in DHT. Our method can determine dynamically the effective number of replicas on session running periods among anticipate nodes. We also implemented a prototype based on an existing DHT routing algorithm, and we evaluated the performance of the prototype. Our proposed method was shown to reduce data loss and the cost for locating replication.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127292526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 6th IEEE Consumer Communications and Networking Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1