首页 > 最新文献

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.最新文献

英文 中文
MV routing and capacity building in disruption tolerant networks 中断容忍网络中的中频路由和能力建设
B. Burns, O. Brock, B. Levine
Disruption-tolerant networks (DTNs) differ from other types of networks in that capacity is exclusively created by the movements of participants. This implies that understanding and influencing the participants' motions can have a significant impact on network performance. In this paper, we introduce the routing protocol MV, which learns structure in the movement patterns of network participants and uses it to enable informed message passing. We also propose the introduction of autonomous agents as additional participants in DTNs. These agents adapt their movements in response to variations in network capacity and demand. We use multi-objective control methods from robotics to generate motions capable of optimizing multiple network performance metrics simultaneously. We present experimental evidence that these strategies, individually and in conjunction, result in significant performance improvements in DTNs.
中断容忍网络(dtn)不同于其他类型的网络,其能力完全由参与者的运动创造。这意味着理解和影响参与者的动作会对网络性能产生重大影响。本文介绍了路由协议MV,它学习网络参与者运动模式中的结构,并利用它来实现消息的知情传递。我们还建议在ddn中引入自主代理作为额外的参与者。这些代理根据网络容量和需求的变化调整其动作。我们使用机器人的多目标控制方法来生成能够同时优化多个网络性能指标的运动。我们提出的实验证据表明,这些策略,单独和联合,导致显著的性能改进在ddn。
{"title":"MV routing and capacity building in disruption tolerant networks","authors":"B. Burns, O. Brock, B. Levine","doi":"10.1109/INFCOM.2005.1497909","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497909","url":null,"abstract":"Disruption-tolerant networks (DTNs) differ from other types of networks in that capacity is exclusively created by the movements of participants. This implies that understanding and influencing the participants' motions can have a significant impact on network performance. In this paper, we introduce the routing protocol MV, which learns structure in the movement patterns of network participants and uses it to enable informed message passing. We also propose the introduction of autonomous agents as additional participants in DTNs. These agents adapt their movements in response to variations in network capacity and demand. We use multi-objective control methods from robotics to generate motions capable of optimizing multiple network performance metrics simultaneously. We present experimental evidence that these strategies, individually and in conjunction, result in significant performance improvements in DTNs.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"60 33","pages":"398-408 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91400674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 458
Location management for PCS networks with consideration of mobility patterns 考虑移动模式的PCS网络位置管理
Jie Li, A. Kubota, H. Kameda
This paper addresses the dynamic location management for personal communication service (PCS) networks with consideration of mobility patterns. The popular hexagonal cellular architecture is considered. In this paper, we first introduce a coordinate system for the hexagonal cellular architectures. Then, we develop an all-direction mobility model based on the coordinate system for the hexagonal cellular architecture to cope with the mobility patterns of mobile terminals (MTs). The shape and size of the local area (LA) in the dynamic location management scheme is determined by minimizing the total location management cost with bounding the paging cost The optimization problem is transferred to maximize expected number of cells traversed by the MT in the LA with a given size of the LA. The analytic model of calculating the probabilities of any MT's moving is established. An algorithm is proposed to solve the optimization problem efficiently.
本文研究了考虑移动模式的个人通信服务(PCS)网络的动态位置管理。考虑了流行的六边形细胞结构。本文首先介绍了六边形细胞结构的坐标系统。在此基础上,针对移动终端的移动模式,建立了基于坐标系统的六边形蜂窝结构的全向移动模型。在动态位置管理方案中,局部区域(LA)的形状和大小是通过最小化总位置管理成本和限制分页成本来确定的,优化问题转化为在给定LA大小的情况下,使MT在LA中遍历的期望单元数最大化。建立了计算任意MT移动概率的解析模型。提出了一种有效求解优化问题的算法。
{"title":"Location management for PCS networks with consideration of mobility patterns","authors":"Jie Li, A. Kubota, H. Kameda","doi":"10.1109/INFCOM.2005.1498347","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498347","url":null,"abstract":"This paper addresses the dynamic location management for personal communication service (PCS) networks with consideration of mobility patterns. The popular hexagonal cellular architecture is considered. In this paper, we first introduce a coordinate system for the hexagonal cellular architectures. Then, we develop an all-direction mobility model based on the coordinate system for the hexagonal cellular architecture to cope with the mobility patterns of mobile terminals (MTs). The shape and size of the local area (LA) in the dynamic location management scheme is determined by minimizing the total location management cost with bounding the paging cost The optimization problem is transferred to maximize expected number of cells traversed by the MT in the LA with a given size of the LA. The analytic model of calculating the probabilities of any MT's moving is established. An algorithm is proposed to solve the optimization problem efficiently.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"59 1","pages":"1207-1216 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73103539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Efficient and scalable query routing for unstructured peer-to-peer networks 用于非结构化点对点网络的高效可伸缩查询路由
Abhishek Kumar, Jun Xu, E. Zegura
Searching for content in peer-to-peer networks is an interesting and challenging problem. Queries in Gnutella-like unstructured systems that use flooding or random walk to search must visit O(n) nodes in a network of size n, thus consuming significant amounts of bandwidth. In this paper, we propose a query routing protocol that allows low bandwidth consumption during query forwarding using a low cost mechanism to create and maintain information about nearby objects. To achieve this, our protocol maintains a lightweight probabilistic routing table at each node that suggests the location of each object in the network. Following the corresponding routing table entries, a query can reach the destination in a small number of hops with high probability. However, maintaining routing tables in a large and highly dynamic network requires non-traditional mechanisms. We design a novel data structure called an exponentially decaying bloom filter (EDBF) that encodes such probabilistic routing tables in a highly compressed manner, and allows for efficient aggregation and propagation. The search primitives provided by our system can be used to search for single keys or multiple keywords with equal ease. Analytical modeling of our design predicts significant improvements in search efficiency, verified through extensive simulations in which we observed an order of magnitude reduction in query path length over previous proposals.
在对等网络中搜索内容是一个有趣且具有挑战性的问题。在类似gnutella的非结构化系统中,使用泛洪或随机游动进行搜索的查询必须访问大小为n的网络中的O(n)个节点,从而消耗大量带宽。在本文中,我们提出了一种查询路由协议,该协议允许在查询转发过程中使用低成本机制来创建和维护有关附近对象的信息。为了实现这一点,我们的协议在每个节点上维护一个轻量级的概率路由表,该路由表建议网络中每个对象的位置。根据相应的路由表项,查询可以以较小的跳数以较高的概率到达目的地。然而,在一个大型且高度动态的网络中维护路由表需要非传统的机制。我们设计了一种新的数据结构,称为指数衰减布隆滤波器(EDBF),它以高度压缩的方式编码这种概率路由表,并允许有效的聚合和传播。我们的系统提供的搜索原语可以同样轻松地用于搜索单个关键字或多个关键字。我们设计的分析建模预测了搜索效率的显著提高,通过广泛的模拟验证了这一点,我们观察到查询路径长度比以前的建议减少了一个数量级。
{"title":"Efficient and scalable query routing for unstructured peer-to-peer networks","authors":"Abhishek Kumar, Jun Xu, E. Zegura","doi":"10.1109/INFCOM.2005.1498343","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498343","url":null,"abstract":"Searching for content in peer-to-peer networks is an interesting and challenging problem. Queries in Gnutella-like unstructured systems that use flooding or random walk to search must visit O(n) nodes in a network of size n, thus consuming significant amounts of bandwidth. In this paper, we propose a query routing protocol that allows low bandwidth consumption during query forwarding using a low cost mechanism to create and maintain information about nearby objects. To achieve this, our protocol maintains a lightweight probabilistic routing table at each node that suggests the location of each object in the network. Following the corresponding routing table entries, a query can reach the destination in a small number of hops with high probability. However, maintaining routing tables in a large and highly dynamic network requires non-traditional mechanisms. We design a novel data structure called an exponentially decaying bloom filter (EDBF) that encodes such probabilistic routing tables in a highly compressed manner, and allows for efficient aggregation and propagation. The search primitives provided by our system can be used to search for single keys or multiple keywords with equal ease. Analytical modeling of our design predicts significant improvements in search efficiency, verified through extensive simulations in which we observed an order of magnitude reduction in query path length over previous proposals.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"17 1","pages":"1162-1173 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78361631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 170
On stochastic recursive equations and infinite server queues 随机递归方程与无限服务器队列
E. Altman
The purpose of this paper is to investigate some performance measures of the discrete time infinite server queue under a general arrival process. We assume, more precisely, that at each time unit a batch with a random size may arrive, where the sequence of batch sizes need not be i.i.d. All we request is that it would be stationary ergodic and that the service duration has a phase type distribution. Our goal is to obtain explicit expressions for the first two moments of number of customers in steady state. We obtain this by computing the first two moments of some generic stochastic recursive equations that our system satisfies. We then show that this class of recursive equations allow to solve not only the G/PH//spl infin/ queue but also a network of such queues. We finally investigate the process of residual activity time in a G/G//spl infin/ queue under general stationary ergodic assumptions, obtain the unique stationary solution and establish coupling convergence to it from any initial state.
本文的目的是研究一般到达过程下离散时间无限服务器队列的一些性能度量。更准确地说,我们假设,在每个时间单位,一个随机大小的批可能到达,其中批大小的顺序不需要id。我们所要求的是它将是平稳遍历的,并且服务持续时间具有阶段类型分布。我们的目标是得到稳定状态下客户数的前两个矩的显式表达式。我们通过计算系统所满足的一些一般随机递归方程的前两个矩得到它。然后,我们证明了这类递归方程不仅允许求解G/PH//spl infin/队列,而且允许求解此类队列的网络。最后研究了G/G//spl infin/队列在一般平稳遍历假设下的剩余活动时间过程,得到了唯一的平稳解,并建立了其从任意初始状态出发的耦合收敛性。
{"title":"On stochastic recursive equations and infinite server queues","authors":"E. Altman","doi":"10.1109/INFCOM.2005.1498355","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498355","url":null,"abstract":"The purpose of this paper is to investigate some performance measures of the discrete time infinite server queue under a general arrival process. We assume, more precisely, that at each time unit a batch with a random size may arrive, where the sequence of batch sizes need not be i.i.d. All we request is that it would be stationary ergodic and that the service duration has a phase type distribution. Our goal is to obtain explicit expressions for the first two moments of number of customers in steady state. We obtain this by computing the first two moments of some generic stochastic recursive equations that our system satisfies. We then show that this class of recursive equations allow to solve not only the G/PH//spl infin/ queue but also a network of such queues. We finally investigate the process of residual activity time in a G/G//spl infin/ queue under general stationary ergodic assumptions, obtain the unique stationary solution and establish coupling convergence to it from any initial state.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"16 1","pages":"1295-1302 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77637781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Network localization in partially localizable networks 部分可本地化网络中的网络本地化
D. Goldenberg, Krishnamurthy Wcsley, C. Maness, Yang Richard, Yang Anthony, Young A Stephen Morse, A. Savvides, B.D.O. Anderson, Haven Ct
Knowing the positions of the nodes in a network is essential to many next generation pervasive and sensor network functionalities. Although many network localization systems have recently been proposed and evaluated, there has been no systematic study of partially localizable networks, i.e., networks in which there exist nodes whose positions cannot be uniquely determined. There is no existing study which correctly identifies precisely which nodes in a network are uniquely localizable and which are not. This absence of a sufficient uniqueness condition permits the computation of erroneous positions that may in turn lead applications to produce flawed results. In this paper, in addition to demonstrating the relevance of networks that may not be fully localizable, we design the first framework for two dimensional network localization with an efficient component to correctly determine which nodes are localizable and which are not. Implementing this system, we conduct comprehensive evaluations of network localizability, providing guidelines for both network design and deployment. Furthermore, we study an integration of traditional geographic routing with geographic routing over virtual coordinates in the partially localizable network setting. We show that this novel cross-layer integration yields good performance, and argue that such optimizations will be likely be necessary to ensure acceptable application performance in partially localizable networks.
了解网络中节点的位置对于许多下一代普适网络和传感器网络功能至关重要。尽管最近提出并评估了许多网络定位系统,但尚未对部分可定位网络(即存在节点位置不能唯一确定的网络)进行系统研究。目前还没有研究能够准确准确地识别网络中哪些节点是唯一可定位的,哪些节点不是。由于缺乏足够的唯一性条件,导致计算错误的位置,从而导致应用程序产生有缺陷的结果。在本文中,除了展示可能无法完全本地化的网络的相关性之外,我们还设计了第一个二维网络本地化框架,该框架具有有效的组件来正确确定哪些节点可本地化,哪些节点不可本地化。通过实施该系统,我们对网络的可本地化性进行了全面的评估,为网络设计和部署提供了指导。在部分可定位网络环境下,研究了传统地理路由与虚拟坐标地理路由的集成。我们展示了这种新颖的跨层集成产生了良好的性能,并认为这种优化可能是必要的,以确保在部分可本地化的网络中可接受的应用程序性能。
{"title":"Network localization in partially localizable networks","authors":"D. Goldenberg, Krishnamurthy Wcsley, C. Maness, Yang Richard, Yang Anthony, Young A Stephen Morse, A. Savvides, B.D.O. Anderson, Haven Ct","doi":"10.1109/INFCOM.2005.1497902","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497902","url":null,"abstract":"Knowing the positions of the nodes in a network is essential to many next generation pervasive and sensor network functionalities. Although many network localization systems have recently been proposed and evaluated, there has been no systematic study of partially localizable networks, i.e., networks in which there exist nodes whose positions cannot be uniquely determined. There is no existing study which correctly identifies precisely which nodes in a network are uniquely localizable and which are not. This absence of a sufficient uniqueness condition permits the computation of erroneous positions that may in turn lead applications to produce flawed results. In this paper, in addition to demonstrating the relevance of networks that may not be fully localizable, we design the first framework for two dimensional network localization with an efficient component to correctly determine which nodes are localizable and which are not. Implementing this system, we conduct comprehensive evaluations of network localizability, providing guidelines for both network design and deployment. Furthermore, we study an integration of traditional geographic routing with geographic routing over virtual coordinates in the partially localizable network setting. We show that this novel cross-layer integration yields good performance, and argue that such optimizations will be likely be necessary to ensure acceptable application performance in partially localizable networks.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"170 1","pages":"313-326 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74146365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 208
A study of analyzing network traffic as images in real-time 网络流量实时图像分析的研究
S. Kim, A. Reddy
This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively monitoring packet headers. We propose to represent samples of network packet header data as frames or images. With such a formulation, a series of samples can be seen as a sequence of frames or video. This enables techniques from image processing and video compression to be applied to the packet header data to reveal interesting properties of traffic. We show that "scene change analysis" can reveal sudden changes in traffic behavior or anomalies. We also show that "motion prediction" techniques can be employed to understand the patterns of some of the attacks. We show that it may be feasible to represent multiple pieces of data as different colors of an image enabling a uniform treatment of multidimensional packet header data. We compare NetViewer with classical detection theory based Neyman-Pearson test and an IDS tool.
本文介绍了一种网络测量方法NetViewer,它可以通过被动监控数据包头来实时检测、识别和可视化攻击和异常流量。我们建议将网络包头数据的样本表示为帧或图像。有了这样的公式,一系列的样本可以被看作是一个序列的帧或视频。这使得图像处理和视频压缩技术可以应用于包头数据,以揭示流量的有趣属性。我们展示了“场景变化分析”可以揭示交通行为的突然变化或异常。我们还展示了“运动预测”技术可以用来理解一些攻击的模式。我们表明,将多个数据块表示为图像的不同颜色可能是可行的,从而可以对多维包头数据进行统一处理。我们将NetViewer与基于经典检测理论的Neyman-Pearson测试和IDS工具进行了比较。
{"title":"A study of analyzing network traffic as images in real-time","authors":"S. Kim, A. Reddy","doi":"10.1109/INFCOM.2005.1498482","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498482","url":null,"abstract":"This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively monitoring packet headers. We propose to represent samples of network packet header data as frames or images. With such a formulation, a series of samples can be seen as a sequence of frames or video. This enables techniques from image processing and video compression to be applied to the packet header data to reveal interesting properties of traffic. We show that \"scene change analysis\" can reveal sudden changes in traffic behavior or anomalies. We also show that \"motion prediction\" techniques can be employed to understand the patterns of some of the attacks. We show that it may be feasible to represent multiple pieces of data as different colors of an image enabling a uniform treatment of multidimensional packet header data. We compare NetViewer with classical detection theory based Neyman-Pearson test and an IDS tool.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"22 1","pages":"2056-2067 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78707434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Smart power-saving mode for IEEE 802.11 wireless LANs IEEE 802.11无线局域网的智能省电模式
D. Qiao, K. Shin
Static PSM (power-saving mode) schemes employed in the current IEEE 802.11 implementations could not provide any delay-performance guarantee because of their fixed wakeup intervals. In this paper, we propose a smart PSM (SPSM) scheme, which directs a wireless station to sleep/wake up according to an "optimal" sequence, such that the desired delay performance is guaranteed with minimum energy consumption. Instead of constructing the sequence directly, SPSM takes a unique two-step approach. First, it translates an arbitrary user-desired delay performance into a generic penalty function. Second, it provides a generic algorithm that takes the penalty function as the input and produces the optimal station action sequence automatically. This way, the potentially-complicated energy-consumption-minimization problem subject to delay-performance constraints is simplified and solved systematically. Our simulation results show that, with a two-stair penalty function, SPSM achieves delay performance similar to the BSD (bounded slowdown) protocol under various scenarios, but always with less energy consumption, thanks to its capability to adapt to changes in the response-time distribution. Moreover, because of SPSM's two-step design feature, it is more flexible than BSD in the sense of being able to meet arbitrary user-desired delay requirement, e.g., providing soft delay-bound guarantees with power penalty functions.
当前IEEE 802.11实现中采用的静态PSM(省电模式)方案由于其固定的唤醒间隔而不能提供任何延迟性能保证。在本文中,我们提出了一种智能PSM (SPSM)方案,该方案根据“最优”顺序指导无线站休眠/唤醒,从而以最小的能量消耗保证所需的延迟性能。SPSM不直接构造序列,而是采用独特的两步方法。首先,它将用户期望的任意延迟性能转换为通用惩罚函数。其次,提出了一种以罚函数为输入,自动生成最优站位动作序列的通用算法;从而简化并系统地解决了受延迟性能约束的潜在复杂的能耗最小化问题。仿真结果表明,在两级惩罚函数下,SPSM在各种场景下都能获得与BSD(有界减速)协议相似的延迟性能,但由于它具有适应响应时间分布变化的能力,因此总是以更少的能耗实现。此外,由于SPSM的两步设计特性,它比BSD更灵活,可以满足任意用户期望的延迟需求,例如,提供带有功率惩罚函数的软延迟约束保证。
{"title":"Smart power-saving mode for IEEE 802.11 wireless LANs","authors":"D. Qiao, K. Shin","doi":"10.1109/INFCOM.2005.1498440","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498440","url":null,"abstract":"Static PSM (power-saving mode) schemes employed in the current IEEE 802.11 implementations could not provide any delay-performance guarantee because of their fixed wakeup intervals. In this paper, we propose a smart PSM (SPSM) scheme, which directs a wireless station to sleep/wake up according to an \"optimal\" sequence, such that the desired delay performance is guaranteed with minimum energy consumption. Instead of constructing the sequence directly, SPSM takes a unique two-step approach. First, it translates an arbitrary user-desired delay performance into a generic penalty function. Second, it provides a generic algorithm that takes the penalty function as the input and produces the optimal station action sequence automatically. This way, the potentially-complicated energy-consumption-minimization problem subject to delay-performance constraints is simplified and solved systematically. Our simulation results show that, with a two-stair penalty function, SPSM achieves delay performance similar to the BSD (bounded slowdown) protocol under various scenarios, but always with less energy consumption, thanks to its capability to adapt to changes in the response-time distribution. Moreover, because of SPSM's two-step design feature, it is more flexible than BSD in the sense of being able to meet arbitrary user-desired delay requirement, e.g., providing soft delay-bound guarantees with power penalty functions.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"60 1","pages":"1573-1583 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84943407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
A distributed adaptive cache update algorithm for the dynamic source routing protocol 动态源路由协议的分布式自适应缓存更新算法
Xin Yu, Z. Kedem
On-demand routing protocols use route caches to make routing decisions. Due to mobility, cached routes easily become stale. To address the cache staleness issue, prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, heuristics cannot accurately predict timeouts because topology changes are unpredictable. In this paper, we propose to proactively disseminate the broken link information to the nodes that have that link in their caches. We define a new cache structure called a cache table and present a distributed cache update algorithm. Each node maintains in its cache table the information necessary for cache updates. When a link failure is detected, the algorithm notifies all reachable nodes that have cached the link in a distributed manner. The algorithm does not use any ad hoc parameters, thus making route caches fully adaptive to topology changes. We show that the algorithm outperforms DSR with path caches and with Link-MaxLife, an adaptive timeout mechanism for link caches. We conclude that proactive cache updating is the key to the adaptation of on-demand routing protocols to mobility.
按需路由协议使用路由缓存来做出路由决定。由于移动性,缓存的路由很容易过时。为了解决缓存过期问题,先前在DSR中的工作使用带有特殊参数的启发式方法来预测链接或路由的生存期。然而,启发式方法不能准确地预测超时,因为拓扑变化是不可预测的。在本文中,我们建议主动将断开的链路信息传播给在其缓存中拥有该链路的节点。我们定义了一种新的缓存结构,称为缓存表,并提出了一种分布式缓存更新算法。每个节点在其缓存表中维护缓存更新所需的信息。当检测到链路故障时,该算法以分布式的方式通知所有可达的已缓存该链路的节点。该算法不使用任何自适应参数,使路由缓存完全适应拓扑结构的变化。我们证明了该算法在路径缓存和link - maxlife(一种链路缓存的自适应超时机制)下优于DSR。我们得出结论,主动缓存更新是按需路由协议适应移动性的关键。
{"title":"A distributed adaptive cache update algorithm for the dynamic source routing protocol","authors":"Xin Yu, Z. Kedem","doi":"10.1109/INFCOM.2005.1497938","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497938","url":null,"abstract":"On-demand routing protocols use route caches to make routing decisions. Due to mobility, cached routes easily become stale. To address the cache staleness issue, prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, heuristics cannot accurately predict timeouts because topology changes are unpredictable. In this paper, we propose to proactively disseminate the broken link information to the nodes that have that link in their caches. We define a new cache structure called a cache table and present a distributed cache update algorithm. Each node maintains in its cache table the information necessary for cache updates. When a link failure is detected, the algorithm notifies all reachable nodes that have cached the link in a distributed manner. The algorithm does not use any ad hoc parameters, thus making route caches fully adaptive to topology changes. We show that the algorithm outperforms DSR with path caches and with Link-MaxLife, an adaptive timeout mechanism for link caches. We conclude that proactive cache updating is the key to the adaptation of on-demand routing protocols to mobility.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"170 1","pages":"730-739 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85009045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
High-performance longest prefix matching supporting high-speed incremental updates and guaranteed compression 高性能最长前缀匹配,支持高速增量更新和保证压缩
Mikael Sundstr̈om, se Lars-Åke Larzon
Longest prefix matching is frequently used for IP forwarding in the Internet. Data structures used must be not only efficient, hut also robust against pathological entries caused by an adversary or misconfiguration. In this paper, we attack the longest prefix matching problem by presenting a new algorithm supporting high lookup performance, fast incremental updates and guaranteed compression ratio. High lookup performance is achieved by using only four memory accesses. Guaranteed compression ratio is achieved by combining direct indexing with an implicit tree structure and carefully choosing which construct to use when updating the forwarding table. Fast incremental updates are achieved by a new memory management technique featuring fast variable size allocation and deallocation while maintaining zero fragmentation. An IPv4 forwarding table data structure can be implemented in software or hardware within 2.7 Mb of memory to represent 2/sup 18/ routing entries. Incremental updates require only 752 memory accesses in worst case for the current guaranteed compression ratio. For a hardware implementation, we can use 300 MHz SRAM organized in four memory banks and four pipeline stages to achieve a guaranteed performance of 300 million lookups per second, corresponding to /spl sim/ 100 Gbit/s wire speed forwarding, and 400,000 incremental updates per second. In measurements performed on a 3.0 GHz Pentium 4 machine using a routing table with more than 2/sup 17/ entries, we can forward over 27 million IPv4 packets per second, which is equivalent to wire speeds exceeding 10 Gbit/s. On the same machine and with the same routing table, we can perform over 230,000 incremental updates/second.
最长前缀匹配是Internet上常用的IP转发方式。所使用的数据结构不仅必须是高效的,而且对于由对手或错误配置引起的病态条目也必须是健壮的。在本文中,我们通过提出一种新的算法来解决最长前缀匹配问题,该算法支持高查找性能、快速增量更新和保证压缩比。只需使用4次内存访问即可实现高查找性能。通过将直接索引与隐式树结构相结合,并在更新转发表时仔细选择要使用的结构,可以保证压缩比。通过一种新的内存管理技术实现快速增量更新,该技术具有快速可变大小分配和释放的特点,同时保持零碎片。一个IPv4转发表数据结构可以在2.7 Mb内存内用软件或硬件实现,表示2/sup 18/路由项。对于当前保证的压缩比,增量更新在最坏的情况下只需要752个内存访问。对于硬件实现,我们可以使用组织在四个存储库和四个管道阶段中的300 MHz SRAM来实现每秒3亿次查找的保证性能,对应于/spl sim/ 100 Gbit/s的线速度转发,以及每秒400,000次增量更新。在3.0 GHz Pentium 4机器上使用超过2/sup 17/条目的路由表进行的测量中,我们每秒可以转发超过2700万个IPv4数据包,这相当于超过10 Gbit/s的线速。在同一台机器上,使用相同的路由表,我们可以每秒执行超过230,000次增量更新。
{"title":"High-performance longest prefix matching supporting high-speed incremental updates and guaranteed compression","authors":"Mikael Sundstr̈om, se Lars-Åke Larzon","doi":"10.1109/INFCOM.2005.1498446","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498446","url":null,"abstract":"Longest prefix matching is frequently used for IP forwarding in the Internet. Data structures used must be not only efficient, hut also robust against pathological entries caused by an adversary or misconfiguration. In this paper, we attack the longest prefix matching problem by presenting a new algorithm supporting high lookup performance, fast incremental updates and guaranteed compression ratio. High lookup performance is achieved by using only four memory accesses. Guaranteed compression ratio is achieved by combining direct indexing with an implicit tree structure and carefully choosing which construct to use when updating the forwarding table. Fast incremental updates are achieved by a new memory management technique featuring fast variable size allocation and deallocation while maintaining zero fragmentation. An IPv4 forwarding table data structure can be implemented in software or hardware within 2.7 Mb of memory to represent 2/sup 18/ routing entries. Incremental updates require only 752 memory accesses in worst case for the current guaranteed compression ratio. For a hardware implementation, we can use 300 MHz SRAM organized in four memory banks and four pipeline stages to achieve a guaranteed performance of 300 million lookups per second, corresponding to /spl sim/ 100 Gbit/s wire speed forwarding, and 400,000 incremental updates per second. In measurements performed on a 3.0 GHz Pentium 4 machine using a routing table with more than 2/sup 17/ entries, we can forward over 27 million IPv4 packets per second, which is equivalent to wire speeds exceeding 10 Gbit/s. On the same machine and with the same routing table, we can perform over 230,000 incremental updates/second.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"15 1","pages":"1641-1652 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73341015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Pricing differentiated Internet services 差异化互联网服务定价
Linhai He, J. Walrand
One of the critical challenges facing the networking industry today is to increase the profitability of Internet services. One well-known method in economics for increasing the revenues of a service is to segment its market through differentiation. However, special characteristics of Internet services, such as congestion externality, may complicate the design and provisioning of such offerings. In this paper, we study how a provider should price its services differentially based on their characteristics. By using a game-theoretic approach, we show that even with a simple two-class differentiated service model, if prices are not properly matched with service qualities, then the system may settle into an undesirable equilibrium similar to that in the classical "prisoner's dilemma" game. In addition, there may not even be a stable equilibrium under certain conditions. We then show that dynamic pricing approaches, in which prices are chosen according to users' relative preferences over different service classes, may be used to avoid such types of problems.
当今网络行业面临的关键挑战之一是提高互联网服务的盈利能力。在经济学中,一个众所周知的增加服务收入的方法是通过差异化来细分市场。然而,Internet服务的特殊特性(如拥塞外部性)可能会使此类产品的设计和供应复杂化。在本文中,我们研究了供应商如何根据其服务的特点对其进行差异化定价。通过博弈论方法,我们证明了即使是一个简单的两类差异化服务模型,如果价格与服务质量不适当匹配,那么系统也可能陷入类似于经典的“囚徒困境”博弈中的不期望均衡。此外,在某些条件下甚至可能不存在稳定的平衡。然后我们展示了动态定价方法,其中价格是根据用户对不同服务类别的相对偏好来选择的,可以用来避免这类问题。
{"title":"Pricing differentiated Internet services","authors":"Linhai He, J. Walrand","doi":"10.1109/INFCOM.2005.1497891","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497891","url":null,"abstract":"One of the critical challenges facing the networking industry today is to increase the profitability of Internet services. One well-known method in economics for increasing the revenues of a service is to segment its market through differentiation. However, special characteristics of Internet services, such as congestion externality, may complicate the design and provisioning of such offerings. In this paper, we study how a provider should price its services differentially based on their characteristics. By using a game-theoretic approach, we show that even with a simple two-class differentiated service model, if prices are not properly matched with service qualities, then the system may settle into an undesirable equilibrium similar to that in the classical \"prisoner's dilemma\" game. In addition, there may not even be a stable equilibrium under certain conditions. We then show that dynamic pricing approaches, in which prices are chosen according to users' relative preferences over different service classes, may be used to avoid such types of problems.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"8 1","pages":"195-204 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75107660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
期刊
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1