首页 > 最新文献

Found. Trends Netw.最新文献

英文 中文
Contagion Source Detection in Epidemic and Infodemic Outbreaks: Mathematical Analysis and Network Algorithms 流行病和信息疫情的传染源检测:数学分析和网络算法
Pub Date : 2023-07-08 DOI: 10.1561/1300000068
C. Tan, Pei-Duo Yu
This monograph provides an overview of the mathematical theories and computational algorithm design for contagion source detection in large networks. By leveraging network centrality as a tool for statistical inference, we can accurately identify the source of contagions, trace their spread, and predict future trajectories. This approach provides fundamental insights into surveillance capability and asymptotic behavior of contagion spreading in networks. Mathematical theory and computational algorithms are vital to understanding contagion dynamics, improving surveillance capabilities, and developing effective strategies to prevent the spread of infectious diseases and misinformation.
本专著概述了大型网络中传染源检测的数学理论和计算算法设计。通过利用网络中心性作为统计推断的工具,我们可以准确地识别传染的来源,追踪其传播,并预测未来的轨迹。这种方法提供了对网络中传染病传播的监测能力和渐近行为的基本见解。数学理论和计算算法对于理解传染动力学、提高监测能力和制定有效策略以防止传染病和错误信息的传播至关重要。
{"title":"Contagion Source Detection in Epidemic and Infodemic Outbreaks: Mathematical Analysis and Network Algorithms","authors":"C. Tan, Pei-Duo Yu","doi":"10.1561/1300000068","DOIUrl":"https://doi.org/10.1561/1300000068","url":null,"abstract":"This monograph provides an overview of the mathematical theories and computational algorithm design for contagion source detection in large networks. By leveraging network centrality as a tool for statistical inference, we can accurately identify the source of contagions, trace their spread, and predict future trajectories. This approach provides fundamental insights into surveillance capability and asymptotic behavior of contagion spreading in networks. Mathematical theory and computational algorithms are vital to understanding contagion dynamics, improving surveillance capabilities, and developing effective strategies to prevent the spread of infectious diseases and misinformation.","PeriodicalId":188056,"journal":{"name":"Found. Trends Netw.","volume":"480 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114586496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Coding in A Multiple Access Environment 多址环境中的分布式编码
Pub Date : 2018-06-04 DOI: 10.1561/1300000063
Yanru Tang, Faeze Heydaryan, Jie Luo
With the fast expansion of communication networks and the increasing dynamic of wireless communication activities, a significant proportion of messages in wireless networks are being transmitted using distributed protocols that feature opportunistic channel access without full user coordination. This challenges the basic assumption of long message transmissions among coordinated users in classical channel coding theory. In this monograph, we introduce channel coding theorems for the distributed communication model where users choose their channel codes individually. We show that, although reliable message recovery is not always guaranteed in distributed communication systems, the notion of fundamental limit still exists, and can indeed be viewed as an extension to its classical correspondence. Due to historical priority of developing wireline networks, network architectures tend to achieve system modularity by compromising communication and energy efficiency. Such a Yanru Tang, Faeze Heydaryan and Jie Luo (2018), “Distributed Coding in A Multiple Access Environment”, Foundations and Trends R © in Networking: Vol. 12, No. 4, pp 260–412. DOI: 10.1561/1300000063. Full text available at: http://dx.doi.org/10.1561/1300000063
随着通信网络的快速扩展和无线通信活动的日益动态,无线网络中相当大比例的消息正在使用分布式协议传输,这种协议的特点是机会通道访问,而无需充分的用户协调。这挑战了经典信道编码理论中协调用户间长报文传输的基本假设。在这篇专著中,我们介绍了分布式通信模型的信道编码定理,其中用户单独选择他们的信道编码。我们表明,尽管在分布式通信系统中并不总是保证可靠的消息恢复,但基本限制的概念仍然存在,并且确实可以视为其经典对应的扩展。由于发展有线网络的历史优先权,网络架构倾向于通过牺牲通信和能源效率来实现系统模块化。如唐彦茹,Faeze Heydaryan和罗洁(2018),“多址环境下的分布式编码”,foundation and Trends R©in Networking: Vol. 12, No. 4, pp 260-412。DOI: 10.1561 / 1300000063。全文可在:http://dx.doi.org/10.1561/1300000063
{"title":"Distributed Coding in A Multiple Access Environment","authors":"Yanru Tang, Faeze Heydaryan, Jie Luo","doi":"10.1561/1300000063","DOIUrl":"https://doi.org/10.1561/1300000063","url":null,"abstract":"With the fast expansion of communication networks and the increasing dynamic of wireless communication activities, a significant proportion of messages in wireless networks are being transmitted using distributed protocols that feature opportunistic channel access without full user coordination. This challenges the basic assumption of long message transmissions among coordinated users in classical channel coding theory. In this monograph, we introduce channel coding theorems for the distributed communication model where users choose their channel codes individually. We show that, although reliable message recovery is not always guaranteed in distributed communication systems, the notion of fundamental limit still exists, and can indeed be viewed as an extension to its classical correspondence. Due to historical priority of developing wireline networks, network architectures tend to achieve system modularity by compromising communication and energy efficiency. Such a Yanru Tang, Faeze Heydaryan and Jie Luo (2018), “Distributed Coding in A Multiple Access Environment”, Foundations and Trends R © in Networking: Vol. 12, No. 4, pp 260–412. DOI: 10.1561/1300000063. Full text available at: http://dx.doi.org/10.1561/1300000063","PeriodicalId":188056,"journal":{"name":"Found. Trends Netw.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134120689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Age of Information: A New Concept, Metric, and Tool 信息时代:一个新的概念、度量和工具
Pub Date : 2018-02-28 DOI: 10.1561/1300000060
Antzela Kosta, N. Pappas, Vangelis Angelakis
In an increasingly networked world in which information is becoming increasingly actual, how can a system know with certainty just how fresh the information on a remote system is? Much work has been done on delay or latency in systems, but only recently has the concept of the freshness of information in or about a system become quantifiable. This is termed the Age of Information. Age of Information provides a whole new set of metrics and tools that can be used to characterize the freshness of information in communications, control and, indeed, information systems. In its early development, this monograph provides the reader with an easy-to-read tutorial-like introduction into this novel approach of dealing with information within systems. A critical summary of the work to date details the concept for the reader. A description of the fundamentals of the performance metrics is then presented before showing how the approach can be used as a tool in improving metrics in other contexts. The survey and tutorial nature of this monograph will save any researcher or student considerable time in understanding the basics of Age of Information, which is destined to become an important research topic in networked systems.
在一个日益网络化的世界中,信息变得越来越真实,系统如何能够确切地知道远程系统上的信息有多新鲜?关于系统中的延迟或延迟已经做了很多工作,但是直到最近,系统中或关于系统的信息的新鲜度的概念才变得可以量化。这就是所谓的信息时代。《信息时代》提供了一套全新的度量标准和工具,可用于描述通信、控制和信息系统中信息的新鲜度。在其早期开发阶段,这本专著为读者提供了一个易于阅读的类似教程的介绍,介绍了这种处理系统内信息的新颖方法。对迄今为止的工作的重要总结为读者详细介绍了这一概念。然后介绍性能指标的基本原理,然后展示如何将该方法用作改进其他环境中的指标的工具。这本专著的概览性和辅导性将为任何研究人员或学生节省大量的时间来理解信息时代的基础知识,这注定会成为网络系统中的一个重要研究课题。
{"title":"Age of Information: A New Concept, Metric, and Tool","authors":"Antzela Kosta, N. Pappas, Vangelis Angelakis","doi":"10.1561/1300000060","DOIUrl":"https://doi.org/10.1561/1300000060","url":null,"abstract":"In an increasingly networked world in which information is becoming increasingly actual, how can a system know with certainty just how fresh the information on a remote system is? Much work has been done on delay or latency in systems, but only recently has the concept of the freshness of information in or about a system become quantifiable. This is termed the Age of Information. Age of Information provides a whole new set of metrics and tools that can be used to characterize the freshness of information in communications, control and, indeed, information systems. In its early development, this monograph provides the reader with an easy-to-read tutorial-like introduction into this novel approach of dealing with information within systems. A critical summary of the work to date details the concept for the reader. A description of the fundamentals of the performance metrics is then presented before showing how the approach can be used as a tool in improving metrics in other contexts. The survey and tutorial nature of this monograph will save any researcher or student considerable time in understanding the basics of Age of Information, which is destined to become an important research topic in networked systems.","PeriodicalId":188056,"journal":{"name":"Found. Trends Netw.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126465000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 470
Network and Protocol Architectures for Future Satellite Systems 未来卫星系统的网络和协议体系结构
Pub Date : 2017-11-30 DOI: 10.1561/1300000046
Tomaso de Cola, A. Ginesi, G. Giambene, George C. Polyzos, V. Siris, N. Fotiou, Y. Thomas
Since their conception satellites have offered the promise of more capacity for terrestrial communication systems or to exploit their inherent multicasting and broadcasting capabilities. Recent advances in satellite technology have resulted in the integration of satellite and terrestrial networks to meet the quality and capacity requirements of modern day communication systems. Network and Protocol Architectures for Future Satellite Systems reviews the emerging technologies being deployed in the networking architectures being proposed in the framework of the Future Internet. Novel protocols such as Multi Path TCP (MPTCP) and networking trends such as Information Centric Networking (ICN) are described in depth and their application in segments deploying both satellite and terrestrial networks are illustrated. This is also the first monograph to review content-based networking extensively. This is becoming increasingly important driven by the ubiquitous nature of the internet. Applications to satellite communications are illustrated and the technical challenges to be further addressed are highlighted.
自从卫星的概念出现以来,它就有希望为地面通信系统提供更大的容量,或利用其固有的多播和广播能力。卫星技术的最新进展导致了卫星和地面网络的一体化,以满足现代通信系统的质量和容量要求。未来卫星系统的网络和协议体系结构回顾了在未来互联网框架中提出的网络体系结构中部署的新兴技术。本文对诸如多路径TCP (MPTCP)等新协议和诸如信息中心网络(ICN)等网络趋势进行了深入的描述,并举例说明了它们在部署卫星和地面网络的分段中的应用。这也是第一本广泛回顾基于内容的网络的专著。由于互联网无处不在,这一点变得越来越重要。说明了卫星通信的应用,并强调了有待进一步解决的技术挑战。
{"title":"Network and Protocol Architectures for Future Satellite Systems","authors":"Tomaso de Cola, A. Ginesi, G. Giambene, George C. Polyzos, V. Siris, N. Fotiou, Y. Thomas","doi":"10.1561/1300000046","DOIUrl":"https://doi.org/10.1561/1300000046","url":null,"abstract":"Since their conception satellites have offered the promise of more capacity for terrestrial communication systems or to exploit their inherent multicasting and broadcasting capabilities. Recent advances in satellite technology have resulted in the integration of satellite and terrestrial networks to meet the quality and capacity requirements of modern day communication systems. Network and Protocol Architectures for Future Satellite Systems reviews the emerging technologies being deployed in the networking architectures being proposed in the framework of the Future Internet. Novel protocols such as Multi Path TCP (MPTCP) and networking trends such as Information Centric Networking (ICN) are described in depth and their application in segments deploying both satellite and terrestrial networks are illustrated. This is also the first monograph to review content-based networking extensively. This is becoming increasingly important driven by the ubiquitous nature of the internet. Applications to satellite communications are illustrated and the technical challenges to be further addressed are highlighted.","PeriodicalId":188056,"journal":{"name":"Found. Trends Netw.","volume":"20 S1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132610684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Opportunistic Routing in Wireless Networks 无线网络中的机会路由
Pub Date : 2016-11-23 DOI: 10.1561/1300000021
T. Javidi, Eric Van Buhler
Wireless multi-hop networks have become an important part of many modern communication systems. Opportunistic routing aims to overcome the deficiencies of conventional routing on wireless multi-hop networks, by specifically utilizing wireless broadcast opportunities and receiver diversity. Opportunistic routing algorithms, which are specifically optimized to incorporate into the routing decisions a model of wireless transmission, take advantage of scheduling, multi-user, andreceiver diversity gains and result in significant reduction in the expected cost of routing per packet. The ability of the algorithm to take advantage of the aspects of wireless transmission, however, depends on the scalability and the additional overhead associated with the opportunistic routing as well as the availability of side information regarding wireless channel statistics, topology, etc. This monograph sheds light on the performance gains associated with incorporating into the routing strategy the nature of wireless transmission.This monograph first provides an overview of various opportunistic distance-vector algorithms that have been developed to incorporate wireless transmission and routing opportunities. Furthermore, an optimal opportunistic distance metric is proposed whose performance is examined against the performance of several routing algorithms from the literature. The performance is examined first in analytical examples, then via simulation to identify the strengths of the optimal opportunist routing algorithm. To allow for a scalable and distributed solution, the distributed computation of this optimal distance-metric is provided. The performance of a distributed implementation of the optimal opportunistic routing algorithm is also examined via simulation. In addition to the construction of the opportunistic schemes in centralized and distributed fashions, this monograph also addresses how learning the wireless medium can be efficiently incorporated in the structure of routing algorithm. Finally, this monograph examines the dynamic congestion-based distance metric and its performance against other congestion aware solutions in the literature.
无线多跳网络已成为许多现代通信系统的重要组成部分。机会路由的目的是克服传统路由在无线多跳网络上的不足,具体利用无线广播机会和接收机的多样性。机会路由算法是专门针对无线传输模型的路由决策进行优化的,它利用了调度、多用户和接收器多样性的优势,并显著降低了每个数据包路由的预期成本。然而,该算法利用无线传输方面的能力取决于可伸缩性和与机会路由相关的额外开销,以及与无线信道统计、拓扑等相关的侧信息的可用性。本专著阐明了将无线传输的性质纳入路由策略所带来的性能提升。本专著首先提供了各种机会距离矢量算法的概述,这些算法已被开发用于合并无线传输和路由机会。此外,提出了一个最佳机会距离度量,并将其性能与文献中几种路由算法的性能进行了比较。首先在分析示例中检查性能,然后通过仿真来确定最优机会主义路由算法的优势。为了允许可扩展和分布式解决方案,提供了这种最佳距离度量的分布式计算。通过仿真验证了分布式实现的最优机会路由算法的性能。除了以集中式和分布式方式构建机会方案外,本专著还讨论了如何将无线媒体的学习有效地纳入路由算法的结构中。最后,本专题研究了动态的基于拥塞的距离度量及其与文献中其他拥塞感知解决方案的性能。
{"title":"Opportunistic Routing in Wireless Networks","authors":"T. Javidi, Eric Van Buhler","doi":"10.1561/1300000021","DOIUrl":"https://doi.org/10.1561/1300000021","url":null,"abstract":"Wireless multi-hop networks have become an important part of many modern communication systems. Opportunistic routing aims to overcome the deficiencies of conventional routing on wireless multi-hop networks, by specifically utilizing wireless broadcast opportunities and receiver diversity. Opportunistic routing algorithms, which are specifically optimized to incorporate into the routing decisions a model of wireless transmission, take advantage of scheduling, multi-user, andreceiver diversity gains and result in significant reduction in the expected cost of routing per packet. The ability of the algorithm to take advantage of the aspects of wireless transmission, however, depends on the scalability and the additional overhead associated with the opportunistic routing as well as the availability of side information regarding wireless channel statistics, topology, etc. This monograph sheds light on the performance gains associated with incorporating into the routing strategy the nature of wireless transmission.This monograph first provides an overview of various opportunistic distance-vector algorithms that have been developed to incorporate wireless transmission and routing opportunities. Furthermore, an optimal opportunistic distance metric is proposed whose performance is examined against the performance of several routing algorithms from the literature. The performance is examined first in analytical examples, then via simulation to identify the strengths of the optimal opportunist routing algorithm. To allow for a scalable and distributed solution, the distributed computation of this optimal distance-metric is provided. The performance of a distributed implementation of the optimal opportunistic routing algorithm is also examined via simulation. In addition to the construction of the opportunistic schemes in centralized and distributed fashions, this monograph also addresses how learning the wireless medium can be efficiently incorporated in the structure of routing algorithm. Finally, this monograph examines the dynamic congestion-based distance metric and its performance against other congestion aware solutions in the literature.","PeriodicalId":188056,"journal":{"name":"Found. Trends Netw.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modern Random Access Protocols 现代随机接入协议
Pub Date : 2016-11-17 DOI: 10.1561/1300000047
M. Berioli, G. Cocco, G. Liva, A. Munari
Random access represents possibly the simplest and yet one of the best known approaches for sharing a channel among several users. Since their introduction in the 1970s, random access schemes have been thoroughly studied and small variations of the pioneering Aloha protocol have since then become a key component of many communications standards, ranging from satellite networks to ad hoc and cellular scenarios. A fundamental step forward for this old paradigm has been witnessed in the past few years, with the development of new solutions, mainly based on the principles of successive interference cancellation, which made it possible to embrace constructively collisions among packets rather than enduring them as a waste of resources. These new lines of research have rendered the performance of modern random access protocols competitive with that of their coordinated counterparts, paving the road for a multitude of new applications. This monograph explores the main ideas and design principles that are behind some of such novel schemes, and aims at offering to the reader an introduction to the analytical tools that can be used to model their performance. After reviewing some relevant thoretical results for the random access channel, the volume focuses on slotted solutions that combine the approach of diversity Aloha with successive interference cancellation, and discusses their optimisation based on an analogy with the theory of codes on graphs. The potential of modern random access is then further explored considering two families of schemes: the former based on physical layer network coding to resolve collisions among users, and the latter leaning on the concept of receiver diversity. Finally, the opportunities and the challenges encountered by random access solutions recently devised to operate in asynchronous, i.e., unslotted, scenarios are reviewed and discussed.
随机访问可能是在多个用户之间共享通道的最简单的方法,也是最著名的方法之一。自20世纪70年代引入随机接入方案以来,人们对其进行了深入的研究,从那时起,开创性的Aloha协议的小变化已成为许多通信标准的关键组成部分,范围从卫星网络到特设和蜂窝场景。在过去几年中,随着主要基于连续干扰消除原则的新解决方案的发展,这一旧范式向前迈出了根本性的一步,这使得有可能接受包之间的建设性冲突,而不是将其视为浪费资源。这些新的研究路线使得现代随机访问协议的性能与它们的协调对应物具有竞争力,为大量新的应用铺平了道路。这本专著探讨了一些这样的新颖方案背后的主要思想和设计原则,旨在向读者介绍可用于模拟其性能的分析工具。在回顾了随机接入信道的一些相关理论结果之后,该卷侧重于将分集Aloha方法与连续干扰消除相结合的槽解,并基于与图上编码理论的类比讨论了它们的优化。然后进一步探讨了现代随机接入的潜力,考虑了两类方案:前者基于物理层网络编码来解决用户之间的冲突,后者依赖于接收器分集的概念。最后,回顾和讨论了最近设计的异步(即无槽)随机访问解决方案所面临的机遇和挑战。
{"title":"Modern Random Access Protocols","authors":"M. Berioli, G. Cocco, G. Liva, A. Munari","doi":"10.1561/1300000047","DOIUrl":"https://doi.org/10.1561/1300000047","url":null,"abstract":"Random access represents possibly the simplest and yet one of the best \u0000known approaches for sharing a channel among several users. Since \u0000their introduction in the 1970s, random access schemes have been thoroughly \u0000studied and small variations of the pioneering Aloha protocol \u0000have since then become a key component of many communications standards, \u0000ranging from satellite networks to ad hoc and cellular scenarios. \u0000A fundamental step forward for this old paradigm has been witnessed in \u0000the past few years, with the development of new solutions, mainly based \u0000on the principles of successive interference cancellation, which made it \u0000possible to embrace constructively collisions among packets rather than enduring \u0000them as a waste of resources. These new lines of research have \u0000rendered the performance of modern random access protocols competitive \u0000with that of their coordinated counterparts, paving the road for a \u0000multitude of new applications. \u0000This monograph explores the main ideas and design principles that \u0000are behind some of such novel schemes, and aims at offering to the \u0000reader an introduction to the analytical tools that can be used to model \u0000their performance. After reviewing some relevant thoretical results for the random \u0000access channel, the volume focuses on slotted solutions that combine the \u0000approach of diversity Aloha with successive interference cancellation, \u0000and discusses their optimisation based on an analogy with the theory \u0000of codes on graphs. The potential of modern random access is then \u0000further explored considering two families of schemes: the former based \u0000on physical layer network coding to resolve collisions among users, and \u0000the latter leaning on the concept of receiver diversity. Finally, the opportunities \u0000and the challenges encountered by random access solutions \u0000recently devised to operate in asynchronous, i.e., unslotted, scenarios \u0000are reviewed and discussed.","PeriodicalId":188056,"journal":{"name":"Found. Trends Netw.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Millimeter Wave Vehicular Communications: A Survey 毫米波车载通信:综述
Pub Date : 2016-06-14 DOI: 10.1561/1300000054
Vutha Va, Takayuki Shimizu, G. Bansal, R. Heath
Future vehicles will require massive sensing capability. Leveraging only onboard sensors, though, is challenging in crowded environments where the sensing field-of-view is obstructed. One potential solution is to share sensor data among the vehicles and infrastructure. This has the benefits of providing vehicles with an enhanced field-of-view and also additional redundancy to provide more reliability in the sensor data. A main challenge in sharing sensor data is providing the high data rates required to exchange raw sensor data. The large spectral channels at millimeter wave mmWave frequencies provide a means of achieving much higher data rates. This monograph provides an overview of mmWave vehicular communication with an emphasis on results on channel measurements, the physical PHY layer, and the medium access control MAC layer. The main objective is to summarize key findings in each area, with special attention paid to identifying important topics of future research. In addition to surveying existing work, some new simulation results are also presented to give insights on the effect of directionality and blockage, which are the two distinguishing features of mmWave vehicular channels. A main conclusion of this monograph is that given the renewed interest in high rate vehicle connectivity, many challenges remain in the design of a mmWave vehicular network.
未来的车辆将需要大规模的传感能力。然而,在拥挤的环境中,仅利用车载传感器是具有挑战性的,因为传感器的视野受到阻碍。一个潜在的解决方案是在车辆和基础设施之间共享传感器数据。这样做的好处是为车辆提供了更大的视野,并提供了额外的冗余,以提高传感器数据的可靠性。共享传感器数据的一个主要挑战是提供交换原始传感器数据所需的高数据速率。毫米波频率的大频谱通道提供了实现更高数据速率的手段。本专著概述了毫米波车载通信,重点介绍了信道测量、物理层和介质访问控制MAC层的结果。主要目标是总结每个领域的主要发现,特别注意确定未来研究的重要主题。除了对现有工作进行调查外,还提供了一些新的仿真结果,以深入了解方向性和阻塞的影响,这是毫米波车载信道的两个显着特征。本专著的一个主要结论是,鉴于对高速车辆连接的重新关注,毫米波车辆网络的设计仍然存在许多挑战。
{"title":"Millimeter Wave Vehicular Communications: A Survey","authors":"Vutha Va, Takayuki Shimizu, G. Bansal, R. Heath","doi":"10.1561/1300000054","DOIUrl":"https://doi.org/10.1561/1300000054","url":null,"abstract":"Future vehicles will require massive sensing capability. Leveraging only onboard sensors, though, is challenging in crowded environments where the sensing field-of-view is obstructed. One potential solution is to share sensor data among the vehicles and infrastructure. This has the benefits of providing vehicles with an enhanced field-of-view and also additional redundancy to provide more reliability in the sensor data. A main challenge in sharing sensor data is providing the high data rates required to exchange raw sensor data. The large spectral channels at millimeter wave mmWave frequencies provide a means of achieving much higher data rates. This monograph provides an overview of mmWave vehicular communication with an emphasis on results on channel measurements, the physical PHY layer, and the medium access control MAC layer. The main objective is to summarize key findings in each area, with special attention paid to identifying important topics of future research. In addition to surveying existing work, some new simulation results are also presented to give insights on the effect of directionality and blockage, which are the two distinguishing features of mmWave vehicular channels. A main conclusion of this monograph is that given the renewed interest in high rate vehicle connectivity, many challenges remain in the design of a mmWave vehicular network.","PeriodicalId":188056,"journal":{"name":"Found. Trends Netw.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132565105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 191
Modeling and Optimization of the Smart Grid Ecosystem 智能电网生态系统建模与优化
Pub Date : 2016-06-08 DOI: 10.1561/1300000042
I. Koutsopoulos, Thanasis G. Papaioannou, Vassiliki Hatzi
The aim of the smart electric energy grid is to improve efficiency, flexibility, and stability of the electric energy generation and distribution system, with the ultimate goal being the added value of energy-related services to the end-consumer and to facilitate energy generation and prudent consumption toward energy efficiency. New technologies, such as networks and sensors, are combined with consumer behaviour to create a complex eco-system in which many factors interact. Modeling and Optimization of the Smart Grid Ecosystem gives some structure to the complex ecosystem and surveys key research problems that have shaped the area. The emphasis is on the presentation of the control and optimization methodology used in approaching each of these problems. This methodology spans convex and linear optimization theory, game theory, and stochastic optimization. Modeling and Optimization of the Smart Grid Ecosystem serves as a reference for researchers wishing to understand the fundamental principles and research problems underpinning the smart grid ecosystem, and the main mathematical tools used to model and analyze such systems.
智能电网的目标是提高电力生产和配电系统的效率、灵活性和稳定性,最终目标是为终端消费者提供与能源相关的服务增值,并促进能源生产和能源效率的谨慎消费。网络和传感器等新技术与消费者行为相结合,创造了一个复杂的生态系统,其中许多因素相互作用。智能电网生态系统的建模和优化为复杂的生态系统提供了一些结构,并调查了影响该领域的关键研究问题。重点是介绍在处理这些问题时所使用的控制和优化方法。这种方法涵盖了凸和线性优化理论、博弈论和随机优化。《智能电网生态系统的建模与优化》是希望了解智能电网生态系统的基本原理和研究问题以及用于建模和分析智能电网系统的主要数学工具的研究人员的参考。
{"title":"Modeling and Optimization of the Smart Grid Ecosystem","authors":"I. Koutsopoulos, Thanasis G. Papaioannou, Vassiliki Hatzi","doi":"10.1561/1300000042","DOIUrl":"https://doi.org/10.1561/1300000042","url":null,"abstract":"The aim of the smart electric energy grid is to improve efficiency, flexibility, and stability of the electric energy generation and distribution system, with the ultimate goal being the added value of energy-related services to the end-consumer and to facilitate energy generation and prudent consumption toward energy efficiency. New technologies, such as networks and sensors, are combined with consumer behaviour to create a complex eco-system in which many factors interact. Modeling and Optimization of the Smart Grid Ecosystem gives some structure to the complex ecosystem and surveys key research problems that have shaped the area. The emphasis is on the presentation of the control and optimization methodology used in approaching each of these problems. This methodology spans convex and linear optimization theory, game theory, and stochastic optimization. Modeling and Optimization of the Smart Grid Ecosystem serves as a reference for researchers wishing to understand the fundamental principles and research problems underpinning the smart grid ecosystem, and the main mathematical tools used to model and analyze such systems.","PeriodicalId":188056,"journal":{"name":"Found. Trends Netw.","volume":"19 811 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130849951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Building Reliable Storage Clouds: Models, Fundamental Tradeoffs, and Solutions 构建可靠的存储云:模型、基本权衡和解决方案
Pub Date : 2015-10-31 DOI: 10.1561/1300000051
U. Kozat, Guanfeng Liang
Distributed storage has been an active research area for decades. With the proliferation of cloud computing, there has been a rejuvenated interest in two perspectives. The first perspective is seen through the lenses of the cloud providers: how should we build global storage services for cloud hosted services and applications at scale with high reliability and availability guarantees, but also in a cost effective way? The second perspective is seen through the lenses of the service providers that utilize public clouds: how can we achieve high I/O performance over cloud storage within a cost budget? In this manuscript, we first present various kinds of distributed storage systems, their operational characteristics and the key techniques to improve their performance. We then focus on cloud storage, exclusively. Cloud storage has massive scales with the promise to provide as much storage capacity as their tenants demand. Cloud providers also promise very high durability, availability, and I/O performance. In this context, we cover the fundamental tradeoffs between storage efficiency and network bandwidth as well as I/O throughput and latency. Erasure codes play an essential role in these tradeoffs and, thus, we also present their design and usage in the context of cloud storage broadly. We pay particular attention on various queuing models and the corresponding performance analysis in the presence of coded storage. We provide exact and approximate solutions under various settings and assumptions. We describe optimal or near-optimal scheduling and coding strategies that are established based on these analyses.
几十年来,分布式存储一直是一个活跃的研究领域。随着云计算的普及,有两个方面重新引起了人们的兴趣。第一个视角是从云提供商的角度来看的:我们应该如何为大规模的云托管服务和应用程序构建具有高可靠性和可用性保证的全球存储服务,同时还要以一种经济有效的方式?第二个视角是通过使用公共云的服务提供商的视角来看的:我们如何在成本预算内实现云存储上的高I/O性能?在本文中,我们首先介绍了各种分布式存储系统,它们的运行特点和提高其性能的关键技术。然后我们专注于云存储。云存储具有巨大的规模,并承诺提供尽可能多的存储容量,以满足其租户的需求。云提供商还承诺非常高的持久性、可用性和I/O性能。在本文中,我们将讨论存储效率和网络带宽以及I/O吞吐量和延迟之间的基本权衡。Erasure code在这些权衡中起着至关重要的作用,因此,我们也将在云存储的背景下广泛地介绍它们的设计和使用。我们特别关注在编码存储存在下的各种排队模型和相应的性能分析。我们在各种设置和假设下提供精确和近似的解。我们描述了基于这些分析建立的最优或接近最优调度和编码策略。
{"title":"Building Reliable Storage Clouds: Models, Fundamental Tradeoffs, and Solutions","authors":"U. Kozat, Guanfeng Liang","doi":"10.1561/1300000051","DOIUrl":"https://doi.org/10.1561/1300000051","url":null,"abstract":"Distributed storage has been an active research area for decades. With the proliferation of cloud computing, there has been a rejuvenated interest in two perspectives. The first perspective is seen through the lenses of the cloud providers: how should we build global storage services for cloud hosted services and applications at scale with high reliability and availability guarantees, but also in a cost effective way? The second perspective is seen through the lenses of the service providers that utilize public clouds: how can we achieve high I/O performance over cloud storage within a cost budget? In this manuscript, we first present various kinds of distributed storage systems, their operational characteristics and the key techniques to improve their performance. We then focus on cloud storage, exclusively. Cloud storage has massive scales with the promise to provide as much storage capacity as their tenants demand. Cloud providers also promise very high durability, availability, and I/O performance. In this context, we cover the fundamental tradeoffs between storage efficiency and network bandwidth as well as I/O throughput and latency. Erasure codes play an essential role in these tradeoffs and, thus, we also present their design and usage in the context of cloud storage broadly. We pay particular attention on various queuing models and the corresponding performance analysis in the presence of coded storage. We provide exact and approximate solutions under various settings and assumptions. We describe optimal or near-optimal scheduling and coding strategies that are established based on these analyses.","PeriodicalId":188056,"journal":{"name":"Found. Trends Netw.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122126438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Clean Slate Approach to Secure Wireless Networking 安全无线网络的全新方法
Pub Date : 2015-08-21 DOI: 10.1561/1300000037
Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar
The current state-of-art in securing computers and data is tantamount to an arms race between the attackers on one hand and the software developers who have to provide the updates to counteract the attacks on the other. This monograph introduces a novel technique for designing secure protocols with provable security guarantees for wireless ad-hoc networks infiltrated with adversarial nodes. It does this by developing a system-theoretical approach to secure protocol design that provides provable and comprehensive security guarantees, where any features of a protocol that reduce complexity or maximize the network throughput do not come at the expense of security. The desired approach is one of security first and performance second, which is the reverse of the current approach. This novel approach uses a game-theoretic framework that addresses the deficiencies in the defense-in-depth approach to securing complex systems. A Clean Slate Approach to Secure Wireless Networking describes in detail the theory of using this approach in both closed synchronized and unsynchronized networks. It will be of interest to all researchers and designers working on securing wireless networks.
当前保护计算机和数据安全的技术水平相当于攻击者和软件开发人员之间的军备竞赛,后者必须提供更新以对抗攻击。本专著介绍了一种设计安全协议的新技术,该协议具有可证明的安全保证,适用于被敌对节点渗透的无线自组织网络。它通过开发一种系统理论方法来保护协议设计,提供可证明的和全面的安全保证,其中协议的任何特性都可以降低复杂性或最大化网络吞吐量,而不会以牺牲安全性为代价。理想的方法是安全第一,性能第二,这与当前的方法相反。这种新颖的方法使用博弈论框架,解决了在保护复杂系统的纵深防御方法中的缺陷。一种安全无线网络的全新方法详细描述了在封闭同步和非同步网络中使用这种方法的理论。所有致力于无线网络安全的研究人员和设计人员都会对此感兴趣。
{"title":"A Clean Slate Approach to Secure Wireless Networking","authors":"Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar","doi":"10.1561/1300000037","DOIUrl":"https://doi.org/10.1561/1300000037","url":null,"abstract":"The current state-of-art in securing computers and data is tantamount to an arms race between the attackers on one hand and the software developers who have to provide the updates to counteract the attacks on the other. This monograph introduces a novel technique for designing secure protocols with provable security guarantees for wireless ad-hoc networks infiltrated with adversarial nodes. It does this by developing a system-theoretical approach to secure protocol design that provides provable and comprehensive security guarantees, where any features of a protocol that reduce complexity or maximize the network throughput do not come at the expense of security. The desired approach is one of security first and performance second, which is the reverse of the current approach. This novel approach uses a game-theoretic framework that addresses the deficiencies in the defense-in-depth approach to securing complex systems. A Clean Slate Approach to Secure Wireless Networking describes in detail the theory of using this approach in both closed synchronized and unsynchronized networks. It will be of interest to all researchers and designers working on securing wireless networks.","PeriodicalId":188056,"journal":{"name":"Found. Trends Netw.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127547862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Found. Trends Netw.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1