首页 > 最新文献

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.最新文献

英文 中文
Fast replication in content distribution overlays 内容分发覆盖中的快速复制
S. Ganguly, Akhilesh Saxena, S. Bhatnagar, R. Izmailov, Suman Banerjee
We present SPIDER-a system for fast replication or distribution of large content from a single source to multiple sites interconnected over Internet or via a private network. In order to exploit spatial diversity of the underlying network, SPIDER uses an overlay structure composed of dedicated transit nodes (TNs). The data transport mechanism in SPIDER leverages this overlay structure to provide a coordinated approach that minimizes the maximum time to replicate to all destination sites (the make span of content replication). In order to achieve this objective, SPIDER employs two orthogonal components: a) creation of multiple dynamic distribution trees using the transit nodes b) end-to-end reliable data transport with flow control on these trees by chaining point-to-point TCPs. We further present simulations based results to quantify benefits of tree construction algorithms in random topologies. We evaluate the real implementation of the SPIDER in Planet Lab and observe a 2-6 times speed up compared to different existing schemes.
我们提出了spider系统,用于将大型内容从单一来源快速复制或分发到通过Internet或专用网络相互连接的多个站点。为了利用底层网络的空间多样性,SPIDER采用了由专用传输节点(TNs)组成的覆盖结构。SPIDER中的数据传输机制利用这种覆盖结构来提供一种协调的方法,以最大限度地减少复制到所有目标站点的最大时间(内容复制的时间跨度)。为了实现这一目标,SPIDER采用了两个正交组件:a)使用传输节点创建多个动态分布树;b)通过链接点对点tcp在这些树上进行流控制的端到端可靠数据传输。我们进一步提出了基于模拟的结果,以量化随机拓扑中树构建算法的好处。我们在Planet Lab中评估了SPIDER的实际实现,并观察到与不同现有方案相比,速度提高了2-6倍。
{"title":"Fast replication in content distribution overlays","authors":"S. Ganguly, Akhilesh Saxena, S. Bhatnagar, R. Izmailov, Suman Banerjee","doi":"10.1109/INFCOM.2005.1498512","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498512","url":null,"abstract":"We present SPIDER-a system for fast replication or distribution of large content from a single source to multiple sites interconnected over Internet or via a private network. In order to exploit spatial diversity of the underlying network, SPIDER uses an overlay structure composed of dedicated transit nodes (TNs). The data transport mechanism in SPIDER leverages this overlay structure to provide a coordinated approach that minimizes the maximum time to replicate to all destination sites (the make span of content replication). In order to achieve this objective, SPIDER employs two orthogonal components: a) creation of multiple dynamic distribution trees using the transit nodes b) end-to-end reliable data transport with flow control on these trees by chaining point-to-point TCPs. We further present simulations based results to quantify benefits of tree construction algorithms in random topologies. We evaluate the real implementation of the SPIDER in Planet Lab and observe a 2-6 times speed up compared to different existing schemes.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"4 1","pages":"2246-2256 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77949626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Reaction-diffusion based transmission patterns for ad hoc networks 基于反应扩散的自组织网络传输模式
M. Durvy, Patrick Thiran
We present a new scheme that mimics pattern formation in biological systems to create transmission patterns in multi-hop ad hoc networks. Our scheme is decentralized and relies exclusively on local interactions between the network nodes to create global transmission patterns. A transmission inhibits other transmissions in its immediate surrounding and encourages nodes located further away to transmit. The transmission patterns created by our medium access control scheme combine the efficiency of allocation-based schemes at high traffic loads and the flexibility of random access schemes. Moreover, we show that with appropriately chosen parameters our scheme converges to collision free transmission patterns that guarantee some degree of spatial reuse.
我们提出了一种模拟生物系统模式形成的新方案来创建多跳自组织网络中的传输模式。我们的方案是分散的,并且完全依赖于网络节点之间的本地交互来创建全局传输模式。一个传输抑制其周围的其他传输,并鼓励位于更远的节点进行传输。我们的介质访问控制方案所创建的传输模式结合了基于分配的方案在高流量负载下的效率和随机访问方案的灵活性。此外,我们还表明,在适当选择参数的情况下,我们的方案收敛到保证一定程度空间重用的无碰撞传输模式。
{"title":"Reaction-diffusion based transmission patterns for ad hoc networks","authors":"M. Durvy, Patrick Thiran","doi":"10.1109/INFCOM.2005.1498494","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498494","url":null,"abstract":"We present a new scheme that mimics pattern formation in biological systems to create transmission patterns in multi-hop ad hoc networks. Our scheme is decentralized and relies exclusively on local interactions between the network nodes to create global transmission patterns. A transmission inhibits other transmissions in its immediate surrounding and encourages nodes located further away to transmit. The transmission patterns created by our medium access control scheme combine the efficiency of allocation-based schemes at high traffic loads and the flexibility of random access schemes. Moreover, we show that with appropriately chosen parameters our scheme converges to collision free transmission patterns that guarantee some degree of spatial reuse.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"1 1","pages":"2195-2205 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77987324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Network equilibrium of heterogeneous congestion control protocols 异构拥塞控制协议的网络均衡
A. Tang, Jiantao Wang, S. Low, M. Chiang
When heterogeneous congestion control protocols that react to different pricing signals share the same network, the resulting equilibrium may no longer be interpreted as a solution to the standard utility maximization problem. We prove the existence of equilibrium under mild assumptions. Then we show that multi-protocol networks whose equilibria are locally non-unique or infinite in number can only form a set of measure zero. Multiple locally unique equilibria can arise in two ways. First, unlike in the single-protocol case, the set of bottleneck links can be non-unique with heterogeneous protocols even when the routing matrix has full row rank. The equilibria associated with different sets of bottleneck links are necessarily distinct. Second, even when there is a unique set of bottleneck links, network equilibrium can still be non-unique, but is always finite and odd in number. They cannot all be locally stable unless it is globally unique. Finally, we provide various sufficient conditions for global uniqueness. Numerical examples are used throughout the paper to illustrate these results.
当对不同定价信号作出反应的异构拥塞控制协议共享同一网络时,所产生的均衡可能不再被解释为标准效用最大化问题的解决方案。我们在温和的假设下证明了均衡的存在性。然后证明了平衡点局部非唯一或无穷多的多协议网络只能形成测度零的集合。多个局部唯一均衡可以通过两种方式产生。首先,与单一协议的情况不同,异构协议的瓶颈链路集可以是非唯一的,即使路由矩阵具有完整的行秩。与不同瓶颈环节相关联的均衡必然是不同的。其次,即使存在一组唯一的瓶颈链路,网络均衡仍然可以是非唯一的,但总是有限的和奇数的。它们不可能都是局部稳定的,除非它是全球唯一的。最后,给出了全局唯一性的各种充分条件。文中用数值算例来说明这些结果。
{"title":"Network equilibrium of heterogeneous congestion control protocols","authors":"A. Tang, Jiantao Wang, S. Low, M. Chiang","doi":"10.1109/INFCOM.2005.1498359","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498359","url":null,"abstract":"When heterogeneous congestion control protocols that react to different pricing signals share the same network, the resulting equilibrium may no longer be interpreted as a solution to the standard utility maximization problem. We prove the existence of equilibrium under mild assumptions. Then we show that multi-protocol networks whose equilibria are locally non-unique or infinite in number can only form a set of measure zero. Multiple locally unique equilibria can arise in two ways. First, unlike in the single-protocol case, the set of bottleneck links can be non-unique with heterogeneous protocols even when the routing matrix has full row rank. The equilibria associated with different sets of bottleneck links are necessarily distinct. Second, even when there is a unique set of bottleneck links, network equilibrium can still be non-unique, but is always finite and odd in number. They cannot all be locally stable unless it is globally unique. Finally, we provide various sufficient conditions for global uniqueness. Numerical examples are used throughout the paper to illustrate these results.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"1 1","pages":"1338-1349 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82392194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites 多点MFTDMA卫星准最优带宽分配
Sara Alouf, E. Altman, J. Galtier, Jean-François Lalande, Corinne Touati
This paper presents an algorithm for resource allocation in satellite networks. It deals with planning a time/frequency plan for a set of terminals with a known geometric configuration under interference constraints. Our objective is to maximize the system throughput while guaranteeing that the different types of demands are satisfied, each type using a different amount of bandwidth. The proposed algorithm relies on two main techniques. The first generates admissible configurations for the interference constraints, whereas the second uses linear and integer programming with column generation. The obtained solution estimates a possible allocation plan with optimality guarantees, and highlights the frequency interferences which degrade the construction of good solutions.
提出了一种卫星网络资源分配算法。在干扰约束下,对一组已知几何构型的终端进行时间/频率规划。我们的目标是最大化系统吞吐量,同时保证满足不同类型的需求,每种类型使用不同数量的带宽。该算法主要依赖于两种技术。第一种方法为干扰约束生成可接受的配置,而第二种方法使用线性和整数规划与列生成。所得到的解估计了一个具有最优性保证的可能的分配方案,并突出了频率干扰,从而降低了好解的构造。
{"title":"Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites","authors":"Sara Alouf, E. Altman, J. Galtier, Jean-François Lalande, Corinne Touati","doi":"10.1109/INFCOM.2005.1497923","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497923","url":null,"abstract":"This paper presents an algorithm for resource allocation in satellite networks. It deals with planning a time/frequency plan for a set of terminals with a known geometric configuration under interference constraints. Our objective is to maximize the system throughput while guaranteeing that the different types of demands are satisfied, each type using a different amount of bandwidth. The proposed algorithm relies on two main techniques. The first generates admissible configurations for the interference constraints, whereas the second uses linear and integer programming with column generation. The obtained solution estimates a possible allocation plan with optimality guarantees, and highlights the frequency interferences which degrade the construction of good solutions.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"89 1","pages":"560-571 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81461359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks 基于CSMA/CA的自组织网络的吞吐量建模和公平性问题
X. Wang, K. Kar
In this paper, we consider the throughput modelling and fairness provisioning in CSMA/CA based ad-hoc networks. The main contributions are: firstly, a throughput model based on Markovian analysis is proposed for the CSMA/CA network with a general topology. Simulation investigations are presented to verify its performance. Secondly, fairness issues in CSMA/CA networks are discussed based on the throughput model. The origin of unfairness is explained and the trade-off between throughput and fairness is illustrated. Thirdly, throughput approximations based on local topology information are proposed and their performances are investigated. Fourthly, three different fairness metrics are presented and their distributed implementations, based on the throughput approximation, are proposed.
本文研究了基于CSMA/CA的自组织网络的吞吐量建模和公平性分配问题。主要贡献有:首先,针对具有一般拓扑结构的CSMA/CA网络,提出了基于马尔可夫分析的吞吐量模型。仿真研究验证了其性能。其次,基于吞吐量模型讨论了CSMA/CA网络中的公平性问题。解释了不公平的起源,并说明了吞吐量与公平之间的权衡。第三,提出了基于局部拓扑信息的吞吐量近似,并对其性能进行了研究。第四,提出了三种不同的公平性指标,并提出了基于吞吐量近似的分布式实现方法。
{"title":"Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks","authors":"X. Wang, K. Kar","doi":"10.1109/INFCOM.2005.1497875","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497875","url":null,"abstract":"In this paper, we consider the throughput modelling and fairness provisioning in CSMA/CA based ad-hoc networks. The main contributions are: firstly, a throughput model based on Markovian analysis is proposed for the CSMA/CA network with a general topology. Simulation investigations are presented to verify its performance. Secondly, fairness issues in CSMA/CA networks are discussed based on the throughput model. The origin of unfairness is explained and the trade-off between throughput and fairness is illustrated. Thirdly, throughput approximations based on local topology information are proposed and their performances are investigated. Fourthly, three different fairness metrics are presented and their distributed implementations, based on the throughput approximation, are proposed.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"87 1","pages":"23-34 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82473502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 287
On the critical total power for asymptotic k-connectivity in wireless networks 无线网络渐近k-连通性的临界总功率
Honghai Zhang, J. Hou
In this paper, we investigate the minimum total power (termed as critical total power) required to ensure asymptotic k-connectivity in heterogeneous wireless networks where nodes may transmit using different levels of power. We show that under the assumption that wireless nodes form a homogeneous Poisson point process with density /spl lambda/ on a unit square region [0, 1]/sup 2/ and the Toroidal model [M.D. Penrose, 1997], the critical total power required for maintaining k-connectivity is /spl theta/((/spl Gamma/(e/2+k))/((k-1)l)/spl lambda//sup 1-e/2/) with probability approaching one as /spl lambda/ goes to infinity, where e is the path loss exponent. Compared with the results that all nodes use a common critical transmission power for maintaining k-connectivity [M.D. Penrose, 1999], [P.-J. Wan and C. Yi, 2004], we show that the critical total power can be reduced by an order of (log /spl lambda/)e/2 by allowing nodes to optimally choose different levels of transmission power. This result is not subject to any specific power/topology control algorithm, but rather a fundamental property in wireless networks.
在本文中,我们研究了保证异构无线网络中节点可能使用不同水平的功率进行传输的渐近k-连通性所需的最小总功率(称为临界总功率)。假设无线节点在单位平方区域[0,1]/sup 2/上形成密度为/spl λ /的齐次泊松点过程,圆环模型[md . d .Penrose, 1997],维持k连接所需的临界总功率为/spl theta/((/spl Gamma/(e/2+k))/((k-1)l)/spl lambda//sup 1-e/2/),当/spl lambda/趋于无穷时,概率接近1,其中e为路径损耗指数。与所有节点使用一个共同的临界传输功率来维持k-连通性的结果相比[M.D.][j]; [j]。Wan和C. Yi, 2004],我们表明,通过允许节点最优地选择不同的传输功率水平,临界总功率可以降低一个数量级(log /spl lambda/)e/2。该结果不受任何特定功率/拓扑控制算法的影响,而是无线网络的基本特性。
{"title":"On the critical total power for asymptotic k-connectivity in wireless networks","authors":"Honghai Zhang, J. Hou","doi":"10.1109/INFCOM.2005.1497915","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497915","url":null,"abstract":"In this paper, we investigate the minimum total power (termed as critical total power) required to ensure asymptotic k-connectivity in heterogeneous wireless networks where nodes may transmit using different levels of power. We show that under the assumption that wireless nodes form a homogeneous Poisson point process with density /spl lambda/ on a unit square region [0, 1]/sup 2/ and the Toroidal model [M.D. Penrose, 1997], the critical total power required for maintaining k-connectivity is /spl theta/((/spl Gamma/(e/2+k))/((k-1)l)/spl lambda//sup 1-e/2/) with probability approaching one as /spl lambda/ goes to infinity, where e is the path loss exponent. Compared with the results that all nodes use a common critical transmission power for maintaining k-connectivity [M.D. Penrose, 1999], [P.-J. Wan and C. Yi, 2004], we show that the critical total power can be reduced by an order of (log /spl lambda/)e/2 by allowing nodes to optimally choose different levels of transmission power. This result is not subject to any specific power/topology control algorithm, but rather a fundamental property in wireless networks.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"86 1","pages":"466-476 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76356748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A class of reliable UDP-based transport protocols based on stochastic approximation 一类基于随机逼近的可靠udp传输协议
C. Wu, N. Rao
The capacities of Internet backbone links have been continuously improving over the last decade, but such improvements have not been fully realized at the application level, particularly in high-performance applications. The complicated and monolithic TCP-AIMD dynamics are responsible to a large degree for low throughputs as a result of the difficulty in optimally configuring its parameters such as buffer sizes, AIMD coefficients, and slow-start transition points. In this paper, we propose a new class of UDP-based transport protocols that utilize a rate control scheme founded on the stochastic approximation method to achieve high throughputs at the application level. These protocols operate around a local maximum of the throughput regression curve by dynamically adjusting the source rate in response to acknowledgements and losses based on the statistical behavior of the network connection. We analytically show that this protocol generates a TCP-friendly flow, and also stochastically converges to the maximum throughput under a monotone loss rate condition. Our implementation achieved very robust performance over diverse Internet connections with different characteristics: it tracked the peak throughput in presence of time-varying cross traffic and consistently achieved 2-5 times the throughput of default TCP without significantly affecting the concurrent regular traffic.
近十年来,互联网骨干链路的容量不断提高,但在应用层面,特别是在高性能应用中,这种提高尚未得到充分实现。由于难以优化配置其参数(如缓冲区大小、AIMD系数和慢启动转换点),复杂而单一的TCP-AIMD动态在很大程度上导致了低吞吐量。在本文中,我们提出了一类新的基于udp的传输协议,它利用基于随机逼近方法的速率控制方案来实现应用层的高吞吐量。这些协议根据网络连接的统计行为动态调整响应确认和损失的源速率,从而围绕吞吐量回归曲线的局部最大值运行。分析表明,该协议产生了一个tcp友好的流,并且在单调损失率条件下随机收敛到最大吞吐量。我们的实现在具有不同特征的各种互联网连接上实现了非常健壮的性能:它跟踪了时变交叉流量存在的峰值吞吐量,并始终实现了默认TCP吞吐量的2-5倍,而不会显著影响并发的常规流量。
{"title":"A class of reliable UDP-based transport protocols based on stochastic approximation","authors":"C. Wu, N. Rao","doi":"10.1109/INFCOM.2005.1498330","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498330","url":null,"abstract":"The capacities of Internet backbone links have been continuously improving over the last decade, but such improvements have not been fully realized at the application level, particularly in high-performance applications. The complicated and monolithic TCP-AIMD dynamics are responsible to a large degree for low throughputs as a result of the difficulty in optimally configuring its parameters such as buffer sizes, AIMD coefficients, and slow-start transition points. In this paper, we propose a new class of UDP-based transport protocols that utilize a rate control scheme founded on the stochastic approximation method to achieve high throughputs at the application level. These protocols operate around a local maximum of the throughput regression curve by dynamically adjusting the source rate in response to acknowledgements and losses based on the statistical behavior of the network connection. We analytically show that this protocol generates a TCP-friendly flow, and also stochastically converges to the maximum throughput under a monotone loss rate condition. Our implementation achieved very robust performance over diverse Internet connections with different characteristics: it tracked the peak throughput in presence of time-varying cross traffic and consistently achieved 2-5 times the throughput of default TCP without significantly affecting the concurrent regular traffic.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"49 1","pages":"1013-1024 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76094973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Coverage and connectivity of ad hoc networks presence of channel randomness 自组织网络的覆盖和连通性存在信道随机性
D. Miorandi, E. Altman
In this paper, we present an analytical procedure for the computation of the node isolation probability in an ad hoc network in the presence of channel randomness, with applications to shadowing and fading phenomena. Such a probability coincides with the complement of the coverage probability, given that nodes are distributed according to a Poisson point process. These results are used to obtain an estimate of the connectivity features for very dense networks. For the case of superimposed lognormal shadowing and Rayleigh fading, the connectivity improvements achievable by means of diversity schemes are investigated.
本文给出了一种计算随机信道下ad hoc网络中节点隔离概率的解析方法,并将其应用于阴影和衰落现象。假设节点按泊松点过程分布,该概率与覆盖概率的补数重合。这些结果用于估计非常密集的网络的连通性特征。在对数正态阴影和瑞利衰落叠加的情况下,研究了分集方案所能达到的连通性改善。
{"title":"Coverage and connectivity of ad hoc networks presence of channel randomness","authors":"D. Miorandi, E. Altman","doi":"10.1109/INFCOM.2005.1497917","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497917","url":null,"abstract":"In this paper, we present an analytical procedure for the computation of the node isolation probability in an ad hoc network in the presence of channel randomness, with applications to shadowing and fading phenomena. Such a probability coincides with the complement of the coverage probability, given that nodes are distributed according to a Poisson point process. These results are used to obtain an estimate of the connectivity features for very dense networks. For the case of superimposed lognormal shadowing and Rayleigh fading, the connectivity improvements achievable by means of diversity schemes are investigated.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"77 1","pages":"491-502 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87782045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 182
Fast, memory-efficient traffic estimation by coincidence counting 通过巧合计数快速,内存高效的流量估计
F. Hao, M. Kodialam, T. V. Lakshman, Hui Zhang
We consider the problem of fast, estimation of flow rates in backbone network links with possibly millions of flows. Accurate flow rate estimation is necessary for network traffic management, network planning, measuring compliance to service level agreements, and network security. Ideally, a rate estimation scheme should have short estimation times with provable bounds on estimation error, be low in memory usage, and be easily implementable in hardware for operation at high speeds. We develop such a scheme, and achieve up to two orders of magnitude speed-up in estimation time over the previously proposed two-runs-based RATE scheme [Kodialam, M et al., 2004]. The speedups are achieved without a significant increase in memory usage, by using coincidences instead of runs. Counting coincidences has a higher processing overhead than detecting two-runs, but this higher overhead is not significant for a hardware implementation. We show that the proposed scheme is faster and more accurate than other recently proposed schemes such as ACCEL-RATE [Hao, F et al., 2004] and smart sampling [Duffield, N et al., 2004]. The faster estimation time of the new scheme has many benefits including quicker detection of incipient denial of service attacks. We prove bounds on the scheme's accuracy, memory needs, and also show that it performs well by simulations that use both synthetic and real traffic traces.
我们考虑了在可能有数以百万计的流量的骨干网络链路中快速估计流量的问题。准确的流量估计对于网络流量管理、网络规划、衡量服务水平协议的遵从性和网络安全都是必要的。理想情况下,速率估计方案应该具有较短的估计时间和可证明的估计误差界限,内存使用率低,并且易于在硬件中实现以高速运行。我们开发了这样一种方案,与之前提出的基于两次运行的RATE方案相比,估计时间加快了两个数量级[Kodialam, M et al., 2004]。通过使用巧合而不是运行,在没有显著增加内存使用的情况下实现了速度提升。与检测两次运行相比,计算巧合的处理开销更高,但这种更高的开销对于硬件实现来说并不重要。我们表明,所提出的方案比最近提出的其他方案(如ACCEL-RATE [Hao, F等,2004]和智能采样[Duffield, N等,2004])更快,更准确。新方案具有更快的估计时间,包括更快地检测早期拒绝服务攻击。我们证明了该方案的精度和内存需求的界限,并通过使用合成和真实流量轨迹的仿真表明它具有良好的性能。
{"title":"Fast, memory-efficient traffic estimation by coincidence counting","authors":"F. Hao, M. Kodialam, T. V. Lakshman, Hui Zhang","doi":"10.1109/INFCOM.2005.1498484","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498484","url":null,"abstract":"We consider the problem of fast, estimation of flow rates in backbone network links with possibly millions of flows. Accurate flow rate estimation is necessary for network traffic management, network planning, measuring compliance to service level agreements, and network security. Ideally, a rate estimation scheme should have short estimation times with provable bounds on estimation error, be low in memory usage, and be easily implementable in hardware for operation at high speeds. We develop such a scheme, and achieve up to two orders of magnitude speed-up in estimation time over the previously proposed two-runs-based RATE scheme [Kodialam, M et al., 2004]. The speedups are achieved without a significant increase in memory usage, by using coincidences instead of runs. Counting coincidences has a higher processing overhead than detecting two-runs, but this higher overhead is not significant for a hardware implementation. We show that the proposed scheme is faster and more accurate than other recently proposed schemes such as ACCEL-RATE [Hao, F et al., 2004] and smart sampling [Duffield, N et al., 2004]. The faster estimation time of the new scheme has many benefits including quicker detection of incipient denial of service attacks. We prove bounds on the scheme's accuracy, memory needs, and also show that it performs well by simulations that use both synthetic and real traffic traces.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"61 1","pages":"2080-2090 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88383090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Capacity of wireless ad-hoc networks under ultra wide band with power constraint 功率约束下超宽带无线自组网容量研究
Honghai Zhang, J. Hou
In this paper, we study how the achievable throughput scales in a wireless network with randomly located nodes as the number of nodes increases, under a communication model where (i) each node has a maximum transmission power W/sub O/ and is capable of utilizing B Hz of bandwidth and (ii) each link can obtain a channel throughput according to the Shannon capacity. Under the limit case that B tends to infinity, we show that each node can obtain a throughput of /spl theta/(n/sup (/spl alpha/-1)/2/) where n is the density of the nodes and /spl alpha/ > 1 is the path loss exponent. Both the upper bound and lower bound are derived through percolation theory. In order to derive the capacity bounds, we have also derived an important result on random geometric graphs: if the distance between two points in a Poisson point process with density n is non-diminishing, the minimum power route requires a power rate at least /spl Omega/(n/sup (1-/spl alpha/)/2/). Our results show that the most promising approach to improving the capacity bounds in wireless ad hoc networks is to employ unlimited bandwidth resources, such as the ultra wide band (UWB).
本文研究了随机节点无线网络中,在每个节点具有最大传输功率W/sub /并能够利用B Hz带宽的通信模型下,随着节点数量的增加,可实现的吞吐量如何扩展;(ii)每个链路根据香农容量获得信道吞吐量。在B趋于无穷大的极限情况下,我们证明了每个节点可以获得/spl theta/(n/sup (/spl alpha/-1)/2/)的吞吐量,其中n为节点密度,/spl alpha/ > 1为路径损失指数。上界和下界均由渗流理论推导得到。为了导出容量边界,我们还得到了随机几何图的一个重要结果:如果密度为n的泊松点过程中两点之间的距离不减小,则最小功率路径需要的功率速率至少为/spl ω /(n/sup (1-/spl α /)/2/)。我们的研究结果表明,改善无线自组织网络容量界限的最有希望的方法是利用无限带宽资源,如超宽带(UWB)。
{"title":"Capacity of wireless ad-hoc networks under ultra wide band with power constraint","authors":"Honghai Zhang, J. Hou","doi":"10.1109/INFCOM.2005.1497914","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497914","url":null,"abstract":"In this paper, we study how the achievable throughput scales in a wireless network with randomly located nodes as the number of nodes increases, under a communication model where (i) each node has a maximum transmission power W/sub O/ and is capable of utilizing B Hz of bandwidth and (ii) each link can obtain a channel throughput according to the Shannon capacity. Under the limit case that B tends to infinity, we show that each node can obtain a throughput of /spl theta/(n/sup (/spl alpha/-1)/2/) where n is the density of the nodes and /spl alpha/ > 1 is the path loss exponent. Both the upper bound and lower bound are derived through percolation theory. In order to derive the capacity bounds, we have also derived an important result on random geometric graphs: if the distance between two points in a Poisson point process with density n is non-diminishing, the minimum power route requires a power rate at least /spl Omega/(n/sup (1-/spl alpha/)/2/). Our results show that the most promising approach to improving the capacity bounds in wireless ad hoc networks is to employ unlimited bandwidth resources, such as the ultra wide band (UWB).","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"31 1","pages":"455-465 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83668388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
期刊
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1