首页 > 最新文献

2007 2nd International Conference on Communication Systems Software and Middleware最新文献

英文 中文
Wireless Sensor Networks for Organizational Network Analysis 组织网络分析的无线传感器网络
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382478
D. Manjunath, S. Gopalaiah, Vijay Dewangan
Since their emergence, wireless sensor networks (WSNs) have become increasingly popular in the pervasive computing industry. This is particularly true within the past five years, which has seen sensor networks being adapted for wide variety of applications. Most of these applications are restricted to ambience monitoring and military use, however, very few commercial sensor applications have been explored till date. For WSNs to be truly ubiquitous, many more commercial sensor applications are yet to be investigated. As an effort to probe for such an application, we explore the potential of using WSNs in the field of Organizational Network Analysis (ONA). In this short paper, we propose a WSN based framework for analyzing organizational networks. We describe the role of WSNs in learning relationships among the people of an organization and investigate the research challenges involved in realizing the proposed framework.
自出现以来,无线传感器网络(wsn)在普适计算行业中越来越受欢迎。在过去的五年中尤其如此,传感器网络已经适应了各种各样的应用。这些应用大多局限于环境监测和军事用途,然而,迄今为止,很少有商业传感器应用被探索。为了使无线传感器网络真正无处不在,还需要研究更多的商业传感器应用。为了探索这种应用,我们探索了在组织网络分析(ONA)领域使用WSNs的潜力。在这篇短文中,我们提出了一个基于WSN的组织网络分析框架。我们描述了wsn在组织人员之间学习关系中的作用,并调查了实现所提出框架所涉及的研究挑战。
{"title":"Wireless Sensor Networks for Organizational Network Analysis","authors":"D. Manjunath, S. Gopalaiah, Vijay Dewangan","doi":"10.1109/COMSWA.2007.382478","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382478","url":null,"abstract":"Since their emergence, wireless sensor networks (WSNs) have become increasingly popular in the pervasive computing industry. This is particularly true within the past five years, which has seen sensor networks being adapted for wide variety of applications. Most of these applications are restricted to ambience monitoring and military use, however, very few commercial sensor applications have been explored till date. For WSNs to be truly ubiquitous, many more commercial sensor applications are yet to be investigated. As an effort to probe for such an application, we explore the potential of using WSNs in the field of Organizational Network Analysis (ONA). In this short paper, we propose a WSN based framework for analyzing organizational networks. We describe the role of WSNs in learning relationships among the people of an organization and investigate the research challenges involved in realizing the proposed framework.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust and Efficient Software Management in Sensor Networks 传感器网络中的鲁棒和高效软件管理
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382471
Wolfgang Schröder-Preikschat, R. Kapitza, J. Kleinöder, M. Felser, Katja Karmeier, T. H. Labella, F. Dressler
Software deployment and updating of deployed code is a critical topic in the area of wireless sensor networks (WSN). Reasons are unreliable network connectivity, resource limitations of devices, and energy restrictions in general. Consequently, software deployment has to be performed with great care otherwise resources might be wasted or nodes become unavailable due to failed updates. The overall objective for software management in sensor networks is to enable a robust and efficient way to build deployable software images that take into account all the needs from application requirements to node-specific resource restrictions. In this article, we outline the current state-of-the-art for software management in WSN and (network-based) sensor network (re-)programming. We provide insights into three different approaches enabling a more comprehensive management of WSN while challenging the robustness and efficiency of software configurations and reprogramming. Additionally, we outline research challenges in the area of software management and sensor network operation.
软件部署和部署代码的更新是无线传感器网络(WSN)领域的一个关键问题。原因通常是网络连接不可靠、设备资源限制和能源限制。因此,必须非常小心地执行软件部署,否则可能会浪费资源,或者由于更新失败而导致节点不可用。传感器网络中软件管理的总体目标是启用一种健壮而有效的方法来构建可部署的软件映像,该软件映像考虑了从应用程序需求到节点特定资源限制的所有需求。在本文中,我们概述了WSN和(基于网络的)传感器网络(重新)编程中软件管理的最新技术。我们提供了三种不同的方法,能够更全面地管理WSN,同时挑战软件配置和重新编程的鲁棒性和效率。此外,我们概述了软件管理和传感器网络操作领域的研究挑战。
{"title":"Robust and Efficient Software Management in Sensor Networks","authors":"Wolfgang Schröder-Preikschat, R. Kapitza, J. Kleinöder, M. Felser, Katja Karmeier, T. H. Labella, F. Dressler","doi":"10.1109/COMSWA.2007.382471","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382471","url":null,"abstract":"Software deployment and updating of deployed code is a critical topic in the area of wireless sensor networks (WSN). Reasons are unreliable network connectivity, resource limitations of devices, and energy restrictions in general. Consequently, software deployment has to be performed with great care otherwise resources might be wasted or nodes become unavailable due to failed updates. The overall objective for software management in sensor networks is to enable a robust and efficient way to build deployable software images that take into account all the needs from application requirements to node-specific resource restrictions. In this article, we outline the current state-of-the-art for software management in WSN and (network-based) sensor network (re-)programming. We provide insights into three different approaches enabling a more comprehensive management of WSN while challenging the robustness and efficiency of software configurations and reprogramming. Additionally, we outline research challenges in the area of software management and sensor network operation.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of Dynamic Sensor Networks: Power Law Then What? 动态传感器网络分析:幂律然后是什么?
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382427
E. Fleury, Jean-Loup Guillaume, C. Robardet, A. Scherrer
Recent studies on wireless sensor networks (WSN) have shown that the duration of contacts and inter-contacts are power law distributed. While this is a strong property of these networks, we will show that this is not sufficient to describe properly the dynamics of sensor networks. We will present some coupled arguments from data mining, random processes and graph theory to describe more accurately the dynamics with the use of a random model to show the limits of an approach limited to power law contact durations.
近年来对无线传感器网络(WSN)的研究表明,接触时间和接触间时间均呈幂律分布。虽然这是这些网络的一个强大特性,但我们将表明,这不足以正确描述传感器网络的动态。我们将提出一些来自数据挖掘、随机过程和图论的耦合论点,以使用随机模型更准确地描述动力学,以显示受幂律接触持续时间限制的方法的局限性。
{"title":"Analysis of Dynamic Sensor Networks: Power Law Then What?","authors":"E. Fleury, Jean-Loup Guillaume, C. Robardet, A. Scherrer","doi":"10.1109/COMSWA.2007.382427","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382427","url":null,"abstract":"Recent studies on wireless sensor networks (WSN) have shown that the duration of contacts and inter-contacts are power law distributed. While this is a strong property of these networks, we will show that this is not sufficient to describe properly the dynamics of sensor networks. We will present some coupled arguments from data mining, random processes and graph theory to describe more accurately the dynamics with the use of a random model to show the limits of an approach limited to power law contact durations.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115934962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Analysis of Epidemic Information Access in the PeopleNet Architecture 基于人民网架构的疫情信息访问分析
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382415
V. Srinivasan, M. Motani
In this paper, we look at the performance of epidemic information access in PeopleNet-like networks. PeopleNet is based on the idea of wireless virtual social networking, which mimics the way people find information via their social contacts. The basic idea is that people want easy access to information. Information, which is in high demand, can be collected and stored in a central repository or database, e.g., libraries, archives, and web sites. However, there are certain kinds of information which can neither be quantified nor categorized nicely. These kinds of information are typically location specific, community specific and even time-specific and are often found by asking your family, friends, colleagues or people you trust. Our architecture for PeopleNet consists of a multi-tiered architecture of mobile devices and access points, which allow users to navigate for information. We study and simulate the performance of an epidemic style of content dissemination and access in the PeopleNet networks. Our initial analysis indicates that PeopleNet can result in several orders of magnitude improvements over other naive proposals for wireless virtual social networking.
在本文中,我们研究了在peoplenet类网络中流行病信息访问的性能。PeopleNet基于无线虚拟社交网络的理念,它模仿了人们通过他们的社交联系来寻找信息的方式。基本的想法是人们想要方便地获取信息。需求量大的信息可以收集并存储在一个中央存储库或数据库中,例如图书馆、档案馆和网站。然而,有某些类型的信息既不能量化也不能很好地分类。这些信息通常是特定于地点、特定于社区甚至特定于时间的,通常是通过询问你的家人、朋友、同事或你信任的人来找到的。我们的PeopleNet体系结构由移动设备和接入点的多层体系结构组成,允许用户导航获取信息。我们研究和模拟了流行风格的内容传播和访问在PeopleNet网络的性能。我们的初步分析表明,PeopleNet可以比其他幼稚的无线虚拟社交网络方案带来几个数量级的改进。
{"title":"An Analysis of Epidemic Information Access in the PeopleNet Architecture","authors":"V. Srinivasan, M. Motani","doi":"10.1109/COMSWA.2007.382415","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382415","url":null,"abstract":"In this paper, we look at the performance of epidemic information access in PeopleNet-like networks. PeopleNet is based on the idea of wireless virtual social networking, which mimics the way people find information via their social contacts. The basic idea is that people want easy access to information. Information, which is in high demand, can be collected and stored in a central repository or database, e.g., libraries, archives, and web sites. However, there are certain kinds of information which can neither be quantified nor categorized nicely. These kinds of information are typically location specific, community specific and even time-specific and are often found by asking your family, friends, colleagues or people you trust. Our architecture for PeopleNet consists of a multi-tiered architecture of mobile devices and access points, which allow users to navigate for information. We study and simulate the performance of an epidemic style of content dissemination and access in the PeopleNet networks. Our initial analysis indicates that PeopleNet can result in several orders of magnitude improvements over other naive proposals for wireless virtual social networking.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Profiling Pseudonet Architecture for Coordinating Mobile Robots 用于协调移动机器人的伪网络体系结构分析
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382570
S. Raghavan, Balaraman Ravindran
Area coverage and Navigation are two fundamental requirements for robot applications. When multiple robots are fielded in a scene, coordination through communication becomes a natural pre-requisite. This paper focuses on the area coverage problem and proposes periodic exchange of state information related to location and coverage as a solution. The solution is based on pseudonet communication architecture that enables exchange of messages between the robots by setting up a Bluetooth piconet or scatternet and maintaining the same throughout the process of covering the area.
区域覆盖和导航是机器人应用的两个基本要求。当多个机器人在一个场景中部署时,通过通信进行协调就成为一个自然的先决条件。本文重点研究了区域覆盖问题,并提出了与位置和覆盖相关的状态信息的周期性交换作为解决方案。该解决方案基于伪网络通信架构,通过设置蓝牙微网或分散网,并在覆盖该区域的整个过程中保持相同,从而实现机器人之间的信息交换。
{"title":"Profiling Pseudonet Architecture for Coordinating Mobile Robots","authors":"S. Raghavan, Balaraman Ravindran","doi":"10.1109/COMSWA.2007.382570","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382570","url":null,"abstract":"Area coverage and Navigation are two fundamental requirements for robot applications. When multiple robots are fielded in a scene, coordination through communication becomes a natural pre-requisite. This paper focuses on the area coverage problem and proposes periodic exchange of state information related to location and coverage as a solution. The solution is based on pseudonet communication architecture that enables exchange of messages between the robots by setting up a Bluetooth piconet or scatternet and maintaining the same throughout the process of covering the area.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132749923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of an Instant Messaging System with Focus on Protection of User Presence 一个关注用户存在保护的即时通讯系统的实现
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382413
Karsten Loesing, Maximilian Röglinger, Christian Wilms, G. Wirtz
Instant messaging (IM) systems provide its users with the information of which of their contacts are currently online. This presence information supplements text communication of IM systems and is an additional value compared to other synchronous communication media. Unauthorized users could illegally generate online logs of users by exploiting their presence information. Public IM systems lack the reliable means to protect user presence and force the user to trust in the central registry server. In this paper, we propose an IM system, which is explicitly designed to protect user presence without the need of a trusted central registry. We present a Java implementation based on the anonymous communication network Tor [1], the cryptographic suite Bouncy Castle [2], and the distributed hash table OpenDHT [3].
即时通讯(IM)系统向用户提供其联系人当前在线的信息。这种存在信息补充了IM系统的文本通信,并且与其他同步通信媒体相比具有附加价值。未经授权的用户可以利用用户的在线状态信息非法生成用户的在线日志。公共IM系统缺乏可靠的手段来保护用户的存在,并迫使用户信任中央注册中心服务器。在本文中,我们提出了一个IM系统,它被明确地设计为保护用户的存在,而不需要一个可信的中央注册中心。我们提出了一个基于匿名通信网络Tor[1]、加密套件Bouncy Castle[2]和分布式哈希表OpenDHT[3]的Java实现。
{"title":"Implementation of an Instant Messaging System with Focus on Protection of User Presence","authors":"Karsten Loesing, Maximilian Röglinger, Christian Wilms, G. Wirtz","doi":"10.1109/COMSWA.2007.382413","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382413","url":null,"abstract":"Instant messaging (IM) systems provide its users with the information of which of their contacts are currently online. This presence information supplements text communication of IM systems and is an additional value compared to other synchronous communication media. Unauthorized users could illegally generate online logs of users by exploiting their presence information. Public IM systems lack the reliable means to protect user presence and force the user to trust in the central registry server. In this paper, we propose an IM system, which is explicitly designed to protect user presence without the need of a trusted central registry. We present a Java implementation based on the anonymous communication network Tor [1], the cryptographic suite Bouncy Castle [2], and the distributed hash table OpenDHT [3].","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121050960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance Enhancement in Hierarchical Peer-to-Peer Systems 分层点对点系统的性能增强
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382555
B. K. Shrivastava, G. Khataniar, D. Goswami
Increased popularity of decentralized peer-to-peer (P2P) architecture comes with several challenges, like how to handle efficient lookup and query routing, frequent joining and leaving of nodes and scalability problem. Several key based deterministic routing approaches in a structured P2P networks have been proposed to overcome with these problems. Still, problems become worse if nodes are heterogenous in processing speed, power, stability and storage capability. To bridge the heterogeneity, we propose a 2-tier hierarchical distributed hash table (DHT) in which nodes are classified into three categories: temporary, stable and fully stable nodes. We have achieved intra-group lookup and query routing in O(log(|Gj|)) steps, where |Gj| is the number of (super)peers in destination group Gj, while inter-group lookup in O(1) steps. We have also saved at least 66.67% messages in repairing the routing table due to frequent joining and leaving of nodes in average case.
分散式点对点(P2P)架构的日益普及带来了一些挑战,例如如何处理高效的查找和查询路由、频繁的节点加入和离开以及可伸缩性问题。为了克服这些问题,提出了结构化P2P网络中几种基于密钥的确定性路由方法。然而,如果节点在处理速度、功率、稳定性和存储能力上是异构的,问题就会变得更糟。为了消除异构性,我们提出了一个两层分层分布式哈希表(DHT),其中节点分为三类:临时节点、稳定节点和完全稳定节点。我们在O(log(|Gj|))步内实现了组内查找和查询路由,其中|Gj|为目标组Gj中的(超级)对等体数,而组间查找则在O(1)步内实现。在平均情况下,由于节点的频繁加入和离开,我们在修复路由表时至少节省了66.67%的消息。
{"title":"Performance Enhancement in Hierarchical Peer-to-Peer Systems","authors":"B. K. Shrivastava, G. Khataniar, D. Goswami","doi":"10.1109/COMSWA.2007.382555","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382555","url":null,"abstract":"Increased popularity of decentralized peer-to-peer (P2P) architecture comes with several challenges, like how to handle efficient lookup and query routing, frequent joining and leaving of nodes and scalability problem. Several key based deterministic routing approaches in a structured P2P networks have been proposed to overcome with these problems. Still, problems become worse if nodes are heterogenous in processing speed, power, stability and storage capability. To bridge the heterogeneity, we propose a 2-tier hierarchical distributed hash table (DHT) in which nodes are classified into three categories: temporary, stable and fully stable nodes. We have achieved intra-group lookup and query routing in O(log(|Gj|)) steps, where |Gj| is the number of (super)peers in destination group Gj, while inter-group lookup in O(1) steps. We have also saved at least 66.67% messages in repairing the routing table due to frequent joining and leaving of nodes in average case.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114696178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Securing Mesh Networks: A Novel Solution for Home Scenario 保护网状网络:家庭场景的新解决方案
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382598
A. Prasad
This paper analyzes the security concerns of IEEE 802.11 WLAN based mesh networking for the home scenario. The paper also provides a novel solution to setup the wireless home area network (WHAN) with minimal user intervention. The proposed solution makes use of the concept of resurrecting duckling. Once the network is setup the proposed solution takes care that not only data but also management and control/signaling are secured. The paper also presents a security analysis of the novel solution.
本文分析了基于IEEE 802.11无线局域网的网状家庭网络的安全问题。本文还提出了一种以最少用户干预建立无线家庭区域网络(WHAN)的新方案。提出的解决方案利用了复活小鸭的概念。一旦建立了网络,建议的解决方案不仅要注意数据,而且要注意管理和控制/信令的安全性。本文还对该方案进行了安全性分析。
{"title":"Securing Mesh Networks: A Novel Solution for Home Scenario","authors":"A. Prasad","doi":"10.1109/COMSWA.2007.382598","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382598","url":null,"abstract":"This paper analyzes the security concerns of IEEE 802.11 WLAN based mesh networking for the home scenario. The paper also provides a novel solution to setup the wireless home area network (WHAN) with minimal user intervention. The proposed solution makes use of the concept of resurrecting duckling. Once the network is setup the proposed solution takes care that not only data but also management and control/signaling are secured. The paper also presents a security analysis of the novel solution.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127195757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the capacity of certain virtual MIMO schemes for mobie communications 移动通信中某些虚拟MIMO方案的容量研究
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382615
Anubala S. Varikat
We consider a virtual multiple-input-multiple-output (MIMO) system, where mobile user equipments (UE) in the vicinity of each other act as antennas for each other for communication with a multiple-antenna base station (BS). The UEs communicate with each other on an 'Interlink', and with the BS on an Up/Downlink. A 'Sample-and-Forward' strategy is proposed for the downlink. The capacity of the proposed scheme and of a conventional Decode-and-Forward scheme for the uplink are investigated. Rules for optimal partitioning of time and bandwidth resources between the Interlink and the Up/Downlink are obtained. Capacity outage curves are provided to compare the virtual MIMO schemes with conventional MIMO and single-input-single-output (SISO) schemes.
我们考虑了一个虚拟多输入多输出(MIMO)系统,其中彼此相邻的移动用户设备(UE)相互充当天线,用于与多天线基站(BS)通信。ue通过“Interlink”相互通信,并通过Up/Downlink与BS通信。对下行链路提出了“采样转发”策略。研究了该方案和传统的上行译码转发方案的容量。得到了Interlink和Up/Downlink之间时间和带宽资源的最优分配规则。给出了容量中断曲线,将虚拟MIMO方案与传统MIMO方案和单输入单输出(SISO)方案进行比较。
{"title":"On the capacity of certain virtual MIMO schemes for mobie communications","authors":"Anubala S. Varikat","doi":"10.1109/COMSWA.2007.382615","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382615","url":null,"abstract":"We consider a virtual multiple-input-multiple-output (MIMO) system, where mobile user equipments (UE) in the vicinity of each other act as antennas for each other for communication with a multiple-antenna base station (BS). The UEs communicate with each other on an 'Interlink', and with the BS on an Up/Downlink. A 'Sample-and-Forward' strategy is proposed for the downlink. The capacity of the proposed scheme and of a conventional Decode-and-Forward scheme for the uplink are investigated. Rules for optimal partitioning of time and bandwidth resources between the Interlink and the Up/Downlink are obtained. Capacity outage curves are provided to compare the virtual MIMO schemes with conventional MIMO and single-input-single-output (SISO) schemes.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127072636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Management Method of Access Policies for Hierarchical Virtual Private Networks 分层虚拟专用网访问策略的有效管理方法
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382593
K. Okayama, N. Yamai, Hayato Ishibashi, K. Abe, T. Matsuura
VPN (virtual private network) is one of the most important technologies on the Internet. With VPN, we can securely access to resources in the organizational network via the Internet. In VPNs having hierarchical structure, since each VPN domain has different access policy (whether VPN gateway should perform authentication, data encryption, and so on or not), an administrator of a VPN domain may need to configure access policies which are different from every VPN sub-domain. However, in the existing VPN methods, since access policies are stored in a static configuration file of each VPN gateway, an administrator of a VPN domain has to cooperate with the other administrators of its sub-domains. Therefore, management cost of access policies becomes considerably large if the organization has large and complicated structure. In this paper, we propose an efficient management method of access policies for hierarchical VPNs. In order to reduce management cost, we introduce a database with hierarchical structure to represent access policies easily and policy servers to get access policies automatically. The effectiveness of our proposed method is confirmed by an experiment on an actual network using policy servers based on the proposed method.
虚拟专用网(VPN)是Internet上最重要的技术之一。使用VPN,我们可以通过Internet安全地访问组织网络中的资源。在具有分层结构的VPN中,由于每个VPN域都有不同的访问策略(VPN网关是否需要进行认证、数据加密等),因此VPN域的管理员可能需要为每个VPN子域配置不同的访问策略。但是,在现有的VPN方式中,由于访问策略存储在每个VPN网关的静态配置文件中,因此VPN域的管理员必须与其子域的管理员协同工作。因此,如果组织结构庞大而复杂,访问策略的管理成本就会相当大。本文提出了一种有效的分层vpn访问策略管理方法。为了降低管理成本,我们引入了层次结构的数据库来方便地表示访问策略,并引入了策略服务器来自动获取访问策略。通过在实际网络中使用基于该方法的策略服务器的实验,验证了该方法的有效性。
{"title":"An Efficient Management Method of Access Policies for Hierarchical Virtual Private Networks","authors":"K. Okayama, N. Yamai, Hayato Ishibashi, K. Abe, T. Matsuura","doi":"10.1109/COMSWA.2007.382593","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382593","url":null,"abstract":"VPN (virtual private network) is one of the most important technologies on the Internet. With VPN, we can securely access to resources in the organizational network via the Internet. In VPNs having hierarchical structure, since each VPN domain has different access policy (whether VPN gateway should perform authentication, data encryption, and so on or not), an administrator of a VPN domain may need to configure access policies which are different from every VPN sub-domain. However, in the existing VPN methods, since access policies are stored in a static configuration file of each VPN gateway, an administrator of a VPN domain has to cooperate with the other administrators of its sub-domains. Therefore, management cost of access policies becomes considerably large if the organization has large and complicated structure. In this paper, we propose an efficient management method of access policies for hierarchical VPNs. In order to reduce management cost, we introduce a database with hierarchical structure to represent access policies easily and policy servers to get access policies automatically. The effectiveness of our proposed method is confirmed by an experiment on an actual network using policy servers based on the proposed method.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114235824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2007 2nd International Conference on Communication Systems Software and Middleware
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1