首页 > 最新文献

2007 2nd International Conference on Communication Systems Software and Middleware最新文献

英文 中文
Role Based Access Control for UDDI Inquiries UDDI查询基于角色的访问控制
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382559
Raymond Peterkin, J. Solomon, D. Ionescu
Web services are commonly used by organizations for B2B integration and enterprise application integration. UDDI registries are widely used as mechanisms for businesses to list and discover available services. Businesses may want to limit the information of their services to certain users and businesses. However, UDDI provides no mechanisms to limit data inquiries to a particular subset of requesters. This paper presents a role-based access control implementation of UDDI so businesses may safely publish data and limit the organizations who may perform inquiries against their information.
Web服务通常被组织用于B2B集成和企业应用程序集成。UDDI注册中心被广泛用作企业列出和发现可用服务的机制。企业可能希望将其服务的信息限制为特定用户和企业。但是,UDDI没有提供将数据查询限制为特定请求者子集的机制。本文提出了UDDI的基于角色的访问控制实现,这样企业就可以安全地发布数据并限制可能对其信息执行查询的组织。
{"title":"Role Based Access Control for UDDI Inquiries","authors":"Raymond Peterkin, J. Solomon, D. Ionescu","doi":"10.1109/COMSWA.2007.382559","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382559","url":null,"abstract":"Web services are commonly used by organizations for B2B integration and enterprise application integration. UDDI registries are widely used as mechanisms for businesses to list and discover available services. Businesses may want to limit the information of their services to certain users and businesses. However, UDDI provides no mechanisms to limit data inquiries to a particular subset of requesters. This paper presents a role-based access control implementation of UDDI so businesses may safely publish data and limit the organizations who may perform inquiries against their information.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"2245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127473027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EDRFS: An Effective Distributed Replication File System for Small-File and Data-Intensive Application EDRFS:适用于小文件和数据密集型应用的高效分布式复制文件系统
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382422
Bin Cai, C. Xie, Guangxi Zhu
With the system scale keeping grown, the key challenge is to mask the failures that arise among the system components and to improve the performance of data-intensive applications. This paper designs and implements a cluster-based distributed replication file system EDRFS to meet these critical demands. EDRFS works with a single metadata server and multiple storage nodes, deploys whole-file replication scheme at the file level, and tracks what storage node a file is replicated on. We use a linear hash algorithm to evenly distribute data and load across multiple storage nodes so as to achieve balancing workload and incremental scalability of throughput and storage capacity as the system scale grows. In addition, we employ metadata caches and file data caches in clients to enhance system performance. Furthermore, we deploy a concurrency lock scheme to avoid namespace operation bottleneck and a replicas consistency method to keep a consistent mutation order among replicas of a file. We provide the initial experimental evaluations of our prototypical system on a small-file and data-intensive workload.
随着系统规模的不断扩大,关键的挑战是掩盖系统组件之间出现的故障,并提高数据密集型应用程序的性能。为了满足这些需求,本文设计并实现了一个基于集群的分布式复制文件系统EDRFS。EDRFS支持单个元数据服务器和多个存储节点,在文件级部署全文件复制方案,并跟踪文件被复制到哪个存储节点。我们使用线性哈希算法将数据和负载均匀分布在多个存储节点上,从而实现负载均衡,并随着系统规模的增长实现吞吐量和存储容量的增量可扩展性。此外,我们在客户端使用元数据缓存和文件数据缓存来提高系统性能。此外,我们部署了并发锁方案以避免命名空间操作瓶颈,并部署了副本一致性方法以保持文件副本之间的一致突变顺序。我们在一个小文件和数据密集型工作负载上对我们的原型系统进行了初步的实验评估。
{"title":"EDRFS: An Effective Distributed Replication File System for Small-File and Data-Intensive Application","authors":"Bin Cai, C. Xie, Guangxi Zhu","doi":"10.1109/COMSWA.2007.382422","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382422","url":null,"abstract":"With the system scale keeping grown, the key challenge is to mask the failures that arise among the system components and to improve the performance of data-intensive applications. This paper designs and implements a cluster-based distributed replication file system EDRFS to meet these critical demands. EDRFS works with a single metadata server and multiple storage nodes, deploys whole-file replication scheme at the file level, and tracks what storage node a file is replicated on. We use a linear hash algorithm to evenly distribute data and load across multiple storage nodes so as to achieve balancing workload and incremental scalability of throughput and storage capacity as the system scale grows. In addition, we employ metadata caches and file data caches in clients to enhance system performance. Furthermore, we deploy a concurrency lock scheme to avoid namespace operation bottleneck and a replicas consistency method to keep a consistent mutation order among replicas of a file. We provide the initial experimental evaluations of our prototypical system on a small-file and data-intensive workload.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121507759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Middleware Architecture for Replica Voting on Fuzzy Data in Dependable Real-time Systems 可靠实时系统中模糊数据副本投票的中间件体系结构
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382564
K. Ravindran, K. Kwiat
Majority voting among replicated data collection devices enhances the trust-worthiness of data flowing from a hostile external environment. It allows a correct data fusion and dissemination by the end-users, in the presence of content corruptions and/or timing failures that may possibly occur during data collection. In addition, a device may operate on fuzzy inputs, thereby generating a data that occasionally deviates from the reference datum in physical world. In this paper, we provide a QoS-oriented approach to manage the data flow through various system elements. The application-level QoS parameters we consider are timeliness and accuracy of data. The underlying protocol-level parameters that influence data delivery performance are the data sizes, network bandwidth, device asynchrony, and data fuzziness. A replica voting protocol takes into account the interplay between these parameters as the faulty behavior of malicious devices unfolds in various forms during data collection. Our QoS-oriented approach casts the well-known fault-tolerance techniques, namely, 2-phase voting, with control mechanisms that adapt the data delivery to meet the end-to-end constraints - such as latency, data integrity, and resource cost. The paper describes a middleware architecture to realize our QoS-oriented approach to the management of replicated data flows.
复制数据收集设备之间的多数投票增强了来自敌对外部环境的数据的可信度。在数据收集过程中可能出现内容损坏和/或定时故障的情况下,它允许最终用户进行正确的数据融合和传播。此外,设备可能在模糊输入上运行,从而产生偶尔偏离物理世界参考数据的数据。在本文中,我们提供了一种面向qos的方法来管理通过各种系统元素的数据流。我们考虑的应用层QoS参数是数据的时效性和准确性。影响数据传递性能的底层协议级参数是数据大小、网络带宽、设备异步性和数据模糊性。当恶意设备的错误行为在数据收集过程中以各种形式展开时,副本投票协议考虑了这些参数之间的相互作用。我们面向qos的方法将众所周知的容错技术(即两阶段投票)与控制机制结合起来,这些控制机制可以调整数据交付以满足端到端约束(如延迟、数据完整性和资源成本)。本文描述了一种中间件体系结构来实现我们的面向qos的复制数据流管理方法。
{"title":"A Middleware Architecture for Replica Voting on Fuzzy Data in Dependable Real-time Systems","authors":"K. Ravindran, K. Kwiat","doi":"10.1109/COMSWA.2007.382564","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382564","url":null,"abstract":"Majority voting among replicated data collection devices enhances the trust-worthiness of data flowing from a hostile external environment. It allows a correct data fusion and dissemination by the end-users, in the presence of content corruptions and/or timing failures that may possibly occur during data collection. In addition, a device may operate on fuzzy inputs, thereby generating a data that occasionally deviates from the reference datum in physical world. In this paper, we provide a QoS-oriented approach to manage the data flow through various system elements. The application-level QoS parameters we consider are timeliness and accuracy of data. The underlying protocol-level parameters that influence data delivery performance are the data sizes, network bandwidth, device asynchrony, and data fuzziness. A replica voting protocol takes into account the interplay between these parameters as the faulty behavior of malicious devices unfolds in various forms during data collection. Our QoS-oriented approach casts the well-known fault-tolerance techniques, namely, 2-phase voting, with control mechanisms that adapt the data delivery to meet the end-to-end constraints - such as latency, data integrity, and resource cost. The paper describes a middleware architecture to realize our QoS-oriented approach to the management of replicated data flows.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131514594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Scheduling of Sensor Activity for Information Coverage in Wireless Sensor Networks 无线传感器网络信息覆盖下传感器活动的有效调度
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382425
S. Vashistha, A. Azad, A. Chockalingam
In this paper, we are concerned with algorithms for scheduling the sensing activity of sensor nodes that are deployed to sense/measure point-targets in wireless sensor networks using information coverage. Defining a set of sensors which collectively can sense a target accurately as an information cover, we propose an algorithm to obtain disjoint set of information covers (DSIC), which achieves longer network life compared to the set of covers obtained using an exhaustive-greedy-equalized heuristic (EGEH) algorithm proposed in the literature. We also present a detailed complexity comparison between the DSIC and EGEH algorithms.
在本文中,我们关注的算法调度传感器节点的传感活动部署到无线传感器网络中使用信息覆盖的传感/测量点目标。将一组能够准确感知目标的传感器集合定义为信息覆盖,提出了一种获取不相交信息覆盖集(disjoint set of information covers, DSIC)的算法,该算法比文献中提出的穷尽贪婪均衡启发式(EGEH)算法获得的覆盖集具有更长的网络寿命。我们还详细比较了DSIC和EGEH算法的复杂度。
{"title":"Efficient Scheduling of Sensor Activity for Information Coverage in Wireless Sensor Networks","authors":"S. Vashistha, A. Azad, A. Chockalingam","doi":"10.1109/COMSWA.2007.382425","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382425","url":null,"abstract":"In this paper, we are concerned with algorithms for scheduling the sensing activity of sensor nodes that are deployed to sense/measure point-targets in wireless sensor networks using information coverage. Defining a set of sensors which collectively can sense a target accurately as an information cover, we propose an algorithm to obtain disjoint set of information covers (DSIC), which achieves longer network life compared to the set of covers obtained using an exhaustive-greedy-equalized heuristic (EGEH) algorithm proposed in the literature. We also present a detailed complexity comparison between the DSIC and EGEH algorithms.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121481938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Competition between SOM Clusters to Model User Authentication System in Computer Networks 计算机网络中SOM集群对用户认证系统模型的竞争
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382421
S. Joshi, V. Phoha
Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication through keystroke dynamics. Proposed architecture consists of a set of self organizing maps where each user has a distinct map. Each map consists of n neurons in the input layer where n is the length of a keystroke pattern; however to determine the number of neurons in the output layer, a strategy is proposed. For authenticating claimed user, probable user(s) for a given pattern and the degree of similarity between the map of the claimed user and a given pattern are determined. Finally, a decision on the authenticity is made using threshold criteria. Evaluation results show the best false accept rate of 0.88% when false reject rate was 3.55% with authentication accuracy of 97.83%. An application scenario of the method in a computer network environment is also presented.
传统的互联网认证系统面临着严重的入侵问题。在这种情况下,我们提出了一个通过击键动力学进行用户认证的神经结构。建议的体系结构由一组自组织映射组成,其中每个用户都有一个不同的映射。每个映射由输入层中的n个神经元组成,其中n是击键模式的长度;然而,为了确定输出层的神经元数量,提出了一种策略。为了验证所要求的用户,确定给定模式的可能用户以及所要求的用户的映射与给定模式之间的相似程度。最后,使用阈值标准对真实性进行判断。评价结果表明,当误拒率为3.55%时,最佳误接受率为0.88%,认证准确率为97.83%。并给出了该方法在计算机网络环境中的应用场景。
{"title":"Competition between SOM Clusters to Model User Authentication System in Computer Networks","authors":"S. Joshi, V. Phoha","doi":"10.1109/COMSWA.2007.382421","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382421","url":null,"abstract":"Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication through keystroke dynamics. Proposed architecture consists of a set of self organizing maps where each user has a distinct map. Each map consists of n neurons in the input layer where n is the length of a keystroke pattern; however to determine the number of neurons in the output layer, a strategy is proposed. For authenticating claimed user, probable user(s) for a given pattern and the degree of similarity between the map of the claimed user and a given pattern are determined. Finally, a decision on the authenticity is made using threshold criteria. Evaluation results show the best false accept rate of 0.88% when false reject rate was 3.55% with authentication accuracy of 97.83%. An application scenario of the method in a computer network environment is also presented.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Suitability of FH codes as TH codes for multiuser UWB Systems 多用户UWB系统中跳频码作为TH码的适用性
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382452
Rajendra Singh, A. Chaturvedi
In this paper performance of four frequency hopping (FH) code sequences has been studied from the point of view of evaluating their suitability for time hopping (TH) UWB systems. Multiuser interference analysis and correlation properties of the code sequences have been considered as the tools to derive the final conclusions. The paper also provides the lower bound on the correlation measure of TH codes.
本文从评价跳频码序列在跳时超宽带系统中的适用性的角度,研究了四种跳频码序列的性能。多用户干扰分析和码序列的相关特性被认为是得出最终结论的工具。文中还给出了TH码相关测度的下界。
{"title":"Suitability of FH codes as TH codes for multiuser UWB Systems","authors":"Rajendra Singh, A. Chaturvedi","doi":"10.1109/COMSWA.2007.382452","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382452","url":null,"abstract":"In this paper performance of four frequency hopping (FH) code sequences has been studied from the point of view of evaluating their suitability for time hopping (TH) UWB systems. Multiuser interference analysis and correlation properties of the code sequences have been considered as the tools to derive the final conclusions. The paper also provides the lower bound on the correlation measure of TH codes.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134112930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Leveraging MAC-layer information for single-hop wireless transport in the Cache and Forward Architecture of the Future Internet 在未来互联网的缓存和转发架构中利用mac层信息进行单跳无线传输
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382503
S. Gopal, S. Paul, D. Raychaudhuri
Cache and forward (CNF) Architecture is a novel architecture aimed at delivering content efficiently to potentially large number of intermittently connected mobile hosts. It uses a reliable hop-by-hop transport mechanism where in-network storage is leveraged to store the entire file in each node, before forwarding it towards the destination(s). Links between nodes may be wired, or wireless, 802.11 a/b/g, cellular, or satellite, or some other upcoming wired/wireless technology. A key aspect in the CNF architecture is to choose the link-layer protocol with parameters such that it optimizes the performance of the link between two CNF nodes. In this paper we propose cross-layer aware transport protocol (CLAP) as a potential candidate for a reliable link-layer protocol between two CNF nodes connected by 802.11 a/b/g link. Leveraging upon MAC layer status information, CLAP quickly adapts its flow control rate to bandwidth fluctuations and maximizes link utilization efficiency. Due to the self-interference problem in wireless links, where ACK packets corresponding to a given flow interfere with the DATA packets of the same flow, CLAP's error control algorithm is based on aggregate negative acknowledgements (NACKs) which reduce the reverse traffic and hence the interference with the data traffic. Since CLAP performs transport layer functionality, we compare it with TCP-SACK -a popular variation of TCP. CLAP significantly outperforms TCP-SACK in both noise-free and noise-prone wireless environments, with throughput gains upward of 150%. For multiple flows, CLAP leverages the fairness characteristics of the underlying MAC layer to achieve fair bandwidth sharing among flows.
缓存转发(CNF)架构是一种新的架构,旨在将内容高效地传递给潜在的大量间歇性连接的移动主机。它使用可靠的逐跳传输机制,利用网络内存储将整个文件存储在每个节点中,然后将其转发到目的地。节点之间的连接可以是有线的,也可以是无线的,可以是802.11 a/b/g的,可以是蜂窝的,也可以是卫星的,或者其他一些即将到来的有线/无线技术。CNF体系结构的一个关键方面是选择带有参数的链路层协议,以便优化两个CNF节点之间的链路性能。在本文中,我们提出跨层感知传输协议(CLAP)作为一个潜在的候选可靠的链路层协议之间的两个CNF节点通过802.11 a/b/g链路连接。CLAP利用MAC层的状态信息,根据带宽的波动快速调整流量控制速率,使链路利用率达到最高。由于无线链路中存在自干扰问题,即给定流对应的ACK数据包会干扰同一流的DATA数据包,因此CLAP的错误控制算法基于聚合负确认(aggregate negative acknowledgement, NACKs),从而减少反向流量,从而减少对数据流量的干扰。由于CLAP执行传输层功能,我们将其与TCP- sack(一种流行的TCP变体)进行比较。CLAP在无噪声和易受噪声影响的无线环境中都明显优于TCP-SACK,吞吐量提高了150%以上。对于多个流,CLAP利用底层MAC层的公平性特性来实现流之间的公平带宽共享。
{"title":"Leveraging MAC-layer information for single-hop wireless transport in the Cache and Forward Architecture of the Future Internet","authors":"S. Gopal, S. Paul, D. Raychaudhuri","doi":"10.1109/COMSWA.2007.382503","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382503","url":null,"abstract":"Cache and forward (CNF) Architecture is a novel architecture aimed at delivering content efficiently to potentially large number of intermittently connected mobile hosts. It uses a reliable hop-by-hop transport mechanism where in-network storage is leveraged to store the entire file in each node, before forwarding it towards the destination(s). Links between nodes may be wired, or wireless, 802.11 a/b/g, cellular, or satellite, or some other upcoming wired/wireless technology. A key aspect in the CNF architecture is to choose the link-layer protocol with parameters such that it optimizes the performance of the link between two CNF nodes. In this paper we propose cross-layer aware transport protocol (CLAP) as a potential candidate for a reliable link-layer protocol between two CNF nodes connected by 802.11 a/b/g link. Leveraging upon MAC layer status information, CLAP quickly adapts its flow control rate to bandwidth fluctuations and maximizes link utilization efficiency. Due to the self-interference problem in wireless links, where ACK packets corresponding to a given flow interfere with the DATA packets of the same flow, CLAP's error control algorithm is based on aggregate negative acknowledgements (NACKs) which reduce the reverse traffic and hence the interference with the data traffic. Since CLAP performs transport layer functionality, we compare it with TCP-SACK -a popular variation of TCP. CLAP significantly outperforms TCP-SACK in both noise-free and noise-prone wireless environments, with throughput gains upward of 150%. For multiple flows, CLAP leverages the fairness characteristics of the underlying MAC layer to achieve fair bandwidth sharing among flows.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134339044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Utilizing Directional Antenna in 802.11 Networks: Deafness Study 定向天线在802.11网络中的应用:耳聋研究
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382502
Guoqing Li, L. Yang
This paper presents a performance study of the deafness effect caused by the use of directional antenna in 802.11 networks. We show that different assumptions on antenna and channel model lead to different conclusions on the impact of deafness on network performance. Specifically, it is shown that in the presence of channel scatters between the transmitter and the receiver, directional antenna does not pose significant deafness and performance degradation. We also show that there always exists a CCA (clear-channel-assessment) threshold that eliminates deafness completely, even under existing 802.11 MAC protocols.
本文对802.11网络中使用定向天线引起的耳聋效应进行了性能研究。通过对天线和信道模型的不同假设,我们得出了耳聋对网络性能影响的不同结论。具体来说,在发射器和接收器之间存在信道散射的情况下,定向天线不会造成明显的耳聋和性能下降。我们还表明,即使在现有的802.11 MAC协议下,始终存在完全消除耳聋的CCA (clear-channel-assessment)阈值。
{"title":"On Utilizing Directional Antenna in 802.11 Networks: Deafness Study","authors":"Guoqing Li, L. Yang","doi":"10.1109/COMSWA.2007.382502","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382502","url":null,"abstract":"This paper presents a performance study of the deafness effect caused by the use of directional antenna in 802.11 networks. We show that different assumptions on antenna and channel model lead to different conclusions on the impact of deafness on network performance. Specifically, it is shown that in the presence of channel scatters between the transmitter and the receiver, directional antenna does not pose significant deafness and performance degradation. We also show that there always exists a CCA (clear-channel-assessment) threshold that eliminates deafness completely, even under existing 802.11 MAC protocols.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"135 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114107333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of IP Fast Reroute Proposals IP快速路由提案的评估
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382443
Minas Gjoka, Vinayak Ram, Xiaowei Yang
With the increasing demand for low-latency applications in the Internet, the slow convergence of the existing routing protocols is a growing concern. A number of IP fast reroute mechanisms have been developed by the IETF to address the issue. The goal of the IPFRR mechanisms is to activate alternate routing paths which avoid micro loops under node or link failures. In this paper we present a comprehensive analysis of these proposals by evaluating their coverage for a variety of inferred and synthetic ISP topologies.
随着Internet中对低延迟应用的需求不断增加,现有路由协议的缓慢收敛日益受到关注。IETF已经开发了许多IP快速重路由机制来解决这个问题。IPFRR机制的目标是激活替代路由路径,以避免节点或链路故障下的微环路。在本文中,我们通过评估其对各种推断和综合ISP拓扑的覆盖范围,对这些建议进行全面分析。
{"title":"Evaluation of IP Fast Reroute Proposals","authors":"Minas Gjoka, Vinayak Ram, Xiaowei Yang","doi":"10.1109/COMSWA.2007.382443","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382443","url":null,"abstract":"With the increasing demand for low-latency applications in the Internet, the slow convergence of the existing routing protocols is a growing concern. A number of IP fast reroute mechanisms have been developed by the IETF to address the issue. The goal of the IPFRR mechanisms is to activate alternate routing paths which avoid micro loops under node or link failures. In this paper we present a comprehensive analysis of these proposals by evaluating their coverage for a variety of inferred and synthetic ISP topologies.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114967302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
Design of Multi-party Meeting System for Interactive Collaboration 面向交互协作的多方会议系统设计
Pub Date : 2007-07-09 DOI: 10.1109/COMSWA.2007.382585
Sangwoo Han, N. Kim, Kiho Choi, JongWon Kim
With the advent of Gbps-range research and engineering networks, remote multi-party collaboration systems are getting more interest. However, most existing collaboration systems are limited in providing realistic and interactive quality of user experience. This paper introduces the design of a multiparty meeting system for advanced interactive collaboration. By extending the access grid (AG) multi-party collaboration system, an interactive meeting space is envisioned to enhance the quality of user experience. Several design considerations are reviewed from the integrated view of media, networking, display, and interaction service components. Thus, a prototype framework and realization will be discussed by combining user-friendly pointing/tracking interactions, high-resolution tiled displays, hybrid multicast-based networking, and high-quality HD media services.
随着gbps范围研究和工程网络的出现,远程多方协作系统受到越来越多的关注。然而,大多数现有的协作系统在提供真实的和交互式的用户体验质量方面是有限的。本文介绍了一种用于高级交互式协作的多方会议系统的设计。通过扩展接入网格(AG)多方协作系统,设想一个交互式会议空间,以提高用户体验的质量。从媒体、网络、显示和交互服务组件的综合角度回顾了几个设计考虑。因此,原型框架和实现将结合用户友好的指向/跟踪交互,高分辨率平铺显示,基于多播的混合网络和高质量的高清媒体服务进行讨论。
{"title":"Design of Multi-party Meeting System for Interactive Collaboration","authors":"Sangwoo Han, N. Kim, Kiho Choi, JongWon Kim","doi":"10.1109/COMSWA.2007.382585","DOIUrl":"https://doi.org/10.1109/COMSWA.2007.382585","url":null,"abstract":"With the advent of Gbps-range research and engineering networks, remote multi-party collaboration systems are getting more interest. However, most existing collaboration systems are limited in providing realistic and interactive quality of user experience. This paper introduces the design of a multiparty meeting system for advanced interactive collaboration. By extending the access grid (AG) multi-party collaboration system, an interactive meeting space is envisioned to enhance the quality of user experience. Several design considerations are reviewed from the integrated view of media, networking, display, and interaction service components. Thus, a prototype framework and realization will be discussed by combining user-friendly pointing/tracking interactions, high-resolution tiled displays, hybrid multicast-based networking, and high-quality HD media services.","PeriodicalId":191295,"journal":{"name":"2007 2nd International Conference on Communication Systems Software and Middleware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131787739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2007 2nd International Conference on Communication Systems Software and Middleware
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1