首页 > 最新文献

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.最新文献

英文 中文
Achieving per-stream QoS with distributed airtime allocation and admission control in IEEE 802.11e wireless LANs 在IEEE 802.11e无线局域网中利用分布式通话时间分配和准入控制实现逐流QoS
Chun-Ting Chou, S. Shankar, K. Shin
To support the transmission of (high-rate and oftenbursty) multimedia data with performance guarantees in an IEEE 802.11e wireless local area network (LAN), it is crucial to design judicious algorithms for admission control and resource allocation. The traffic specification element (TSPEC) of the new IEEE 802.11e standard is used to facilitate the design of the admission control. Based on the traffic profile given in the TSPEC and the dual-token bucket regulation, a guaranteed rate is derived for our airtime-based admission control. The admission control is integrated with the contention-based enhanced distributed channel access (EDCA), which together can provide so-called "parameterized QoS" - as in the polling-based HCF controlled channel access (HCCA) - via a new distributed, quantitative control of stations' airtime usage. We also extend the current QoS signaling of HCCA defined in IEEE 802.11e to perform admission control for this enhanced EDCA. Furthermore, we extend the integrated scheme for QoS provisioning in ad hoc wireless LANs and design appropriate signaling procedures. We evaluate via simulation the effectiveness of this parameterized QoS-capable EDCA scheme, and demonstrate its advantages over the centralized, polling-based HCCA scheme.
为了在IEEE 802.11e无线局域网(LAN)中支持(高速率且经常是突发的)多媒体数据的传输并保证性能,设计合理的接收控制和资源分配算法至关重要。采用新的IEEE 802.11e标准中的流量规范元素(traffic specification element, TSPEC)来简化接纳控制的设计。基于TSPEC中给出的流量配置文件和双令牌桶规则,导出了基于空时的准入控制的保证速率。接纳控制与基于争用的增强型分布式信道访问(EDCA)集成在一起,它们可以通过对电台广播时间使用的一种新的分布式定量控制,提供所谓的“参数化QoS”——就像基于轮询的HCF控制信道访问(HCCA)一样。我们还扩展了IEEE 802.11e中定义的HCCA的当前QoS信令,以对这种增强的EDCA执行准入控制。此外,我们还扩展了在自组织无线局域网中提供QoS的集成方案,并设计了适当的信令程序。我们通过仿真评估了这种参数化的支持qos的EDCA方案的有效性,并证明了它优于集中式的基于轮询的HCCA方案。
{"title":"Achieving per-stream QoS with distributed airtime allocation and admission control in IEEE 802.11e wireless LANs","authors":"Chun-Ting Chou, S. Shankar, K. Shin","doi":"10.1109/INFCOM.2005.1498441","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498441","url":null,"abstract":"To support the transmission of (high-rate and oftenbursty) multimedia data with performance guarantees in an IEEE 802.11e wireless local area network (LAN), it is crucial to design judicious algorithms for admission control and resource allocation. The traffic specification element (TSPEC) of the new IEEE 802.11e standard is used to facilitate the design of the admission control. Based on the traffic profile given in the TSPEC and the dual-token bucket regulation, a guaranteed rate is derived for our airtime-based admission control. The admission control is integrated with the contention-based enhanced distributed channel access (EDCA), which together can provide so-called \"parameterized QoS\" - as in the polling-based HCF controlled channel access (HCCA) - via a new distributed, quantitative control of stations' airtime usage. We also extend the current QoS signaling of HCCA defined in IEEE 802.11e to perform admission control for this enhanced EDCA. Furthermore, we extend the integrated scheme for QoS provisioning in ad hoc wireless LANs and design appropriate signaling procedures. We evaluate via simulation the effectiveness of this parameterized QoS-capable EDCA scheme, and demonstrate its advantages over the centralized, polling-based HCCA scheme.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"19 1","pages":"1584-1595 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90176769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Low-state fairness: lower bounds and practical enforcement 低状态公平:下限和实际执行
Abhimanyu Das, Debojyoti Dutta, A. Helmy, Ashish Goel, J. Heidemann
Providing approximate max-min fair bandwidth allocation among flows within a network or at a single router has been an important research problem. In this paper, we study the space complexity of fairness algorithms, and the communication complexity of distributed global fairness algorithms. We show that in order to enforce max-min fairness with bounded errors, a router must maintain per-flow state. Then we present a practical edge-marking based architecture to demonstrate the enforcement of approximate global max-min fairness for representative scenarios with multiple bottlenecks and non-responsive traffic. We validate our architecture using packet level simulations.
在网络内或单个路由器上的流之间提供近似的最大最小公平带宽分配一直是一个重要的研究问题。本文研究了公平性算法的空间复杂度和分布式全局公平性算法的通信复杂度。我们证明,为了在有界错误的情况下实现最大最小公平性,路由器必须保持每流状态。然后,我们提出了一个实用的基于边缘标记的架构,以演示在具有多个瓶颈和无响应流量的代表性场景中近似全局最大最小公平性的实施。我们使用包级模拟验证我们的体系结构。
{"title":"Low-state fairness: lower bounds and practical enforcement","authors":"Abhimanyu Das, Debojyoti Dutta, A. Helmy, Ashish Goel, J. Heidemann","doi":"10.1109/INFCOM.2005.1498529","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498529","url":null,"abstract":"Providing approximate max-min fair bandwidth allocation among flows within a network or at a single router has been an important research problem. In this paper, we study the space complexity of fairness algorithms, and the communication complexity of distributed global fairness algorithms. We show that in order to enforce max-min fairness with bounded errors, a router must maintain per-flow state. Then we present a practical edge-marking based architecture to demonstrate the enforcement of approximate global max-min fairness for representative scenarios with multiple bottlenecks and non-responsive traffic. We validate our architecture using packet level simulations.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"75 1","pages":"2436-2446 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88932387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SICTA: a 0.693 contention tree algorithm using successive interference cancellation SICTA:使用连续干扰消除的0.693争用树算法
Yingqun Yu, G. Giannakis
Contention tree algorithms have provable stability properties, and are known to achieve stable throughput as high as 0.487 for the infinite population Poisson model. A common feature in all these random access protocols is that collided packets at the receive-node are always discarded. In this paper, we derive a novel tree algorithm (TA) that we naturally term SICTA because it relies on successive interference cancellation to resolve collided packets. Performance metrics including throughput and delay are analyzed to establish that SICTA outperforms existing contention tree algorithms reaching 0.693 in stable throughput.
争用树算法具有可证明的稳定性,并且已知对于无限种群泊松模型可以实现高达0.487的稳定吞吐量。所有这些随机访问协议的一个共同特点是接收节点上发生冲突的数据包总是被丢弃。在本文中,我们推导了一种新的树算法(TA),我们自然地称之为SICTA,因为它依赖于连续干扰消除来解决碰撞数据包。分析了包括吞吐量和延迟在内的性能指标,确定SICTA在稳定吞吐量方面优于现有的争用树算法,达到0.693。
{"title":"SICTA: a 0.693 contention tree algorithm using successive interference cancellation","authors":"Yingqun Yu, G. Giannakis","doi":"10.1109/INFCOM.2005.1498469","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498469","url":null,"abstract":"Contention tree algorithms have provable stability properties, and are known to achieve stable throughput as high as 0.487 for the infinite population Poisson model. A common feature in all these random access protocols is that collided packets at the receive-node are always discarded. In this paper, we derive a novel tree algorithm (TA) that we naturally term SICTA because it relies on successive interference cancellation to resolve collided packets. Performance metrics including throughput and delay are analyzed to establish that SICTA outperforms existing contention tree algorithms reaching 0.693 in stable throughput.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"1 1","pages":"1908-1916 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83097438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
A delay analysis for opportunistic transmission in fading broadcast channels 衰落广播信道中机会传输的延迟分析
M. Sharif, B. Hassibi
We consider a single-antenna broadcast block fading channel (downlink scheduling) with n users where the transmission is packet-based and all users are backlogged. We define the delay as the minimum number of channel uses that guarantees all n users successfully receive m packets. This is a more stringent notion of delay than average delay and is the worst case delay among the users. A delay optimal scheduling scheme, such as round-robin, achieves the delay of mn. In a heterogeneous network and for the optimal throughput strategy where the transmitter sends the packet to the user with the best channel conditions, we derive the moment generating-function of the delay for any m and n. For large n and in a homogeneous network, the expected delay in receiving one packet by all the receivers scales as n logn, as opposed to n for the round-robin scheduling. We also show that when m grows faster than (logn)/sup r/, for some r>1, then the expected value of delay scales like mn. This roughly determines the time-scale required for the system to behave fairly in a homogeneous network. We then propose a scheme to significantly reduce the delay at the expense of a small throughput hit. We further look into two generalizations of our work: i) the effect of temporal channel correlation and ii) the advantage of multiple transmit antennas on the delay. For a channel with memory of two, we prove that the delay scales again like n logn no matter how severe the correlation is. For a system with M transmit antennas, we prove that the expected delay in receiving one packet by all the users scales like n log n/(M+O(M/sup 2//n)) for large n when M is not growing faster than logn. Thus, when the temporal channel correlation is zero, multiple transmit antenna systems do not reduce the delay significantly. However, when channel correlation is present, they can lead to significant gains by "decorrelating" the effective channel through means such as random beamforming.
我们考虑有n个用户的单天线广播块衰落信道(下行链路调度),其中传输是基于分组的,所有用户都是积压的。我们将延迟定义为保证所有n个用户成功接收m个数据包的最小通道使用数。这是比平均延迟更严格的延迟概念,并且是用户中最糟糕的延迟。时延最优调度方案,如轮询调度,可以达到mn的时延。在异构网络和最优吞吐量策略中,发射器将数据包发送给具有最佳信道条件的用户,我们推导了任意m和n的延迟的矩生成函数。对于大n和在同构网络中,所有接收器接收一个数据包的预期延迟缩放为n logn,而不是轮询调度的n。我们还表明,当m的增长速度大于(logn)/sup r/时,对于某些r>1,则延迟的期望值为mn。这大致决定了系统在同质网络中表现良好所需的时间尺度。然后,我们提出了一个方案,以很小的吞吐量损失为代价显著减少延迟。我们进一步研究了我们工作的两个概括:i)时间信道相关的影响和ii)多发射天线对延迟的优势。对于内存为2的信道,我们证明了无论相关性有多严重,延迟的尺度仍然是n logn。对于具有M个发射天线的系统,我们证明了当M的增长速度不大于logn时,所有用户接收一个数据包的期望延迟为n logn /(M+O(M/sup 2//n))。因此,当时域信道相关为零时,多发射天线系统不能显著降低延迟。然而,当信道相关存在时,它们可以通过随机波束形成等手段“去相关”有效信道,从而获得显著的增益。
{"title":"A delay analysis for opportunistic transmission in fading broadcast channels","authors":"M. Sharif, B. Hassibi","doi":"10.1109/INFCOM.2005.1498555","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498555","url":null,"abstract":"We consider a single-antenna broadcast block fading channel (downlink scheduling) with n users where the transmission is packet-based and all users are backlogged. We define the delay as the minimum number of channel uses that guarantees all n users successfully receive m packets. This is a more stringent notion of delay than average delay and is the worst case delay among the users. A delay optimal scheduling scheme, such as round-robin, achieves the delay of mn. In a heterogeneous network and for the optimal throughput strategy where the transmitter sends the packet to the user with the best channel conditions, we derive the moment generating-function of the delay for any m and n. For large n and in a homogeneous network, the expected delay in receiving one packet by all the receivers scales as n logn, as opposed to n for the round-robin scheduling. We also show that when m grows faster than (logn)/sup r/, for some r>1, then the expected value of delay scales like mn. This roughly determines the time-scale required for the system to behave fairly in a homogeneous network. We then propose a scheme to significantly reduce the delay at the expense of a small throughput hit. We further look into two generalizations of our work: i) the effect of temporal channel correlation and ii) the advantage of multiple transmit antennas on the delay. For a channel with memory of two, we prove that the delay scales again like n logn no matter how severe the correlation is. For a system with M transmit antennas, we prove that the expected delay in receiving one packet by all the users scales like n log n/(M+O(M/sup 2//n)) for large n when M is not growing faster than logn. Thus, when the temporal channel correlation is zero, multiple transmit antenna systems do not reduce the delay significantly. However, when channel correlation is present, they can lead to significant gains by \"decorrelating\" the effective channel through means such as random beamforming.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"126 1","pages":"2720-2730 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84767310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Optimal peer selection for P2P downloading and streaming P2P下载和流媒体的最佳对等选择
M. Adler, Rakesh Kumar, K. Ross, D. Rubenstein, Torsten Suel, D. Yao
In a P2P system, a client peer may select one or more server peers to download a specific file. In a P2P resource economy, the server peers charge the client for the downloading. A server peer's price would naturally depend on the specific object being downloaded, the duration of the download, and the rate at which the download is to occur. The optimal peer selection problem is to select, from the set of peers that have the desired object, the subset of peers and download rates that minimizes cost. In this paper we examine a number of natural peer selection problems for both P2P downloading and P2P streaming. For downloading, we obtain the optimal solution for minimizing the download delay subject to a budget constraint, as well as the corresponding Nash equilibrium. For the streaming problem, we obtain a solution that minimizes cost subject to continuous playback while allowing for one or more server peers to fail during the streaming process. The methodologies developed in this paper are applicable to a variety of P2P resource economy problems.
在P2P系统中,客户机对等体可以选择一个或多个服务器对等体来下载特定的文件。在P2P资源经济中,服务器对等端向客户端收取下载费用。服务器对等体的价格自然取决于正在下载的特定对象、下载的持续时间和下载发生的速率。最优对等点选择问题是从具有所需对象的对等点集合中选择代价最小的对等点子集和下载速率。在本文中,我们研究了P2P下载和P2P流媒体中的一些自然对等选择问题。对于下载,我们得到了在预算约束下下载延迟最小化的最优解,以及相应的纳什均衡。对于流问题,我们获得了一个解决方案,该解决方案可以在允许一个或多个服务器在流过程中失败的情况下,使连续播放的成本最小化。本文提出的方法适用于各种P2P资源经济问题。
{"title":"Optimal peer selection for P2P downloading and streaming","authors":"M. Adler, Rakesh Kumar, K. Ross, D. Rubenstein, Torsten Suel, D. Yao","doi":"10.1109/INFCOM.2005.1498437","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498437","url":null,"abstract":"In a P2P system, a client peer may select one or more server peers to download a specific file. In a P2P resource economy, the server peers charge the client for the downloading. A server peer's price would naturally depend on the specific object being downloaded, the duration of the download, and the rate at which the download is to occur. The optimal peer selection problem is to select, from the set of peers that have the desired object, the subset of peers and download rates that minimizes cost. In this paper we examine a number of natural peer selection problems for both P2P downloading and P2P streaming. For downloading, we obtain the optimal solution for minimizing the download delay subject to a budget constraint, as well as the corresponding Nash equilibrium. For the streaming problem, we obtain a solution that minimizes cost subject to continuous playback while allowing for one or more server peers to fail during the streaming process. The methodologies developed in this paper are applicable to a variety of P2P resource economy problems.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"13 1","pages":"1538-1549 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87343387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 128
A dynamic adaptive acknowledgment strategy for TCP over multihop wireless networks 基于多跳无线网络的TCP动态自适应确认策略
R. Oliveira, T. Braun
Multihop wireless networks based on the IEEE 802.11 MAC protocol are promising for ad hoc networks in small scale today. The 802.11 protocol minimizes the well-known hidden node problem but does not eliminate it completely. Consequently, the end-to-end bandwidth utilization may be quite poor if the involved protocols do not interact smoothly. In particular, the TCP protocol does not manage to obtain efficient bandwidth utilization because its congestion control mechanism is not tailored to such a complex environment. The main problems with TCP in such networks are the excessive amount of both spurious retransmissions and contention between data and acknowledgment (ACK) packets for the transmission medium. In this paper, we propose a dynamic adaptive strategy for minimizing the number of ACK packets in transit and mitigating spurious retransmissions. Using this strategy, the receiver adjusts itself to the wireless channel condition by delaying more ACK packets when the channel is in good condition and less otherwise. Our technique not only improves bandwidth utilization but also reduces power consumption by retransmitting much less than a regular TCP does. Extensive simulation evaluations show that our scheme provides very good enhancements in a variety of scenarios.
基于IEEE 802.11 MAC协议的多跳无线网络在目前的小规模自组织网络中很有前景。802.11协议最小化了众所周知的隐藏节点问题,但并没有完全消除它。因此,如果所涉及的协议不能顺利交互,端到端带宽利用率可能会很低。特别是,TCP协议无法获得有效的带宽利用,因为它的拥塞控制机制不适合这种复杂的环境。在这种网络中,TCP的主要问题是大量的虚假重传以及传输介质的数据和确认(ACK)数据包之间的争用。在本文中,我们提出了一种动态自适应策略,以减少传输中的ACK数据包数量和减少虚假重传。使用这种策略,当信道处于良好状态时,接收方通过延迟更多的ACK数据包来调整自己以适应无线信道条件,否则延迟更少的ACK数据包。我们的技术不仅提高了带宽利用率,而且通过比常规TCP更少的重传减少了功耗。大量的仿真评估表明,我们的方案在各种场景下提供了非常好的增强。
{"title":"A dynamic adaptive acknowledgment strategy for TCP over multihop wireless networks","authors":"R. Oliveira, T. Braun","doi":"10.1109/INFCOM.2005.1498465","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498465","url":null,"abstract":"Multihop wireless networks based on the IEEE 802.11 MAC protocol are promising for ad hoc networks in small scale today. The 802.11 protocol minimizes the well-known hidden node problem but does not eliminate it completely. Consequently, the end-to-end bandwidth utilization may be quite poor if the involved protocols do not interact smoothly. In particular, the TCP protocol does not manage to obtain efficient bandwidth utilization because its congestion control mechanism is not tailored to such a complex environment. The main problems with TCP in such networks are the excessive amount of both spurious retransmissions and contention between data and acknowledgment (ACK) packets for the transmission medium. In this paper, we propose a dynamic adaptive strategy for minimizing the number of ACK packets in transit and mitigating spurious retransmissions. Using this strategy, the receiver adjusts itself to the wireless channel condition by delaying more ACK packets when the channel is in good condition and less otherwise. Our technique not only improves bandwidth utilization but also reduces power consumption by retransmitting much less than a regular TCP does. Extensive simulation evaluations show that our scheme provides very good enhancements in a variety of scenarios.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"16 1","pages":"1863-1874 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90632399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
BARD: Bayesian-assisted resource discovery in sensor networks 传感器网络中的贝叶斯辅助资源发现
Fred Stann, J. Heidemann
Data dissemination in sensor networks requires four components: resource discovery, route establishment, packet forwarding, and route maintenance. Resource discovery can be the most costly aspect if meta-data does not exist to guide the search. Geographic routing can minimize search cost when resources are defined by location, and hash-based techniques like data-centric storage can make searching more efficient, subject to increased storage cost. In general, however, flooding is required to locate all resources matching a specification. In this paper, we propose BARD, Bayesian-assisted resource discovery, an approach that optimizes resource discovery in sensor networks by modeling search and routing as a stochastic process. BARD exploits the attribute structure of diffusion and prior routing history to avoid flooding for similar queries. BARD models attributes as random variables and finds routes to arbitrary value sets via Bayesian estimation. Results of occasional flooded queries establish a baseline probability distribution, which is used to focus additional queries. Since this process is probabilistic and approximate, even partial matches from prior searches can still reduce the scope of search. We evaluate the benefits of BARD by extending directed diffusion and examining control overhead with and without our Bayesian filter. These simulations demonstrate a 28% to 73% reduction in control traffic, depending on the number and locations of sources and sinks.
传感器网络中的数据传播需要四个部分:资源发现、路由建立、报文转发和路由维护。如果不存在元数据来指导搜索,资源发现可能是成本最高的方面。当资源按位置定义时,地理路由可以最大限度地减少搜索成本,而基于散列的技术(如以数据为中心的存储)可以提高搜索效率,但会增加存储成本。但是,通常需要进行泛洪来定位符合规格的所有资源。在本文中,我们提出了BARD,即贝叶斯辅助资源发现,这是一种通过将搜索和路由建模为随机过程来优化传感器网络资源发现的方法。BARD利用扩散的属性结构和先验路由历史来避免类似查询的泛滥。BARD将属性建模为随机变量,并通过贝叶斯估计找到通往任意值集的路径。偶尔泛滥查询的结果建立基线概率分布,用于关注其他查询。由于这个过程是概率性的和近似的,即使是先前搜索的部分匹配仍然可以缩小搜索范围。我们通过扩展定向扩散和检查使用和不使用贝叶斯滤波器的控制开销来评估BARD的好处。这些模拟表明,根据源和汇的数量和位置,控制流量减少了28%至73%。
{"title":"BARD: Bayesian-assisted resource discovery in sensor networks","authors":"Fred Stann, J. Heidemann","doi":"10.1109/INFCOM.2005.1498317","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498317","url":null,"abstract":"Data dissemination in sensor networks requires four components: resource discovery, route establishment, packet forwarding, and route maintenance. Resource discovery can be the most costly aspect if meta-data does not exist to guide the search. Geographic routing can minimize search cost when resources are defined by location, and hash-based techniques like data-centric storage can make searching more efficient, subject to increased storage cost. In general, however, flooding is required to locate all resources matching a specification. In this paper, we propose BARD, Bayesian-assisted resource discovery, an approach that optimizes resource discovery in sensor networks by modeling search and routing as a stochastic process. BARD exploits the attribute structure of diffusion and prior routing history to avoid flooding for similar queries. BARD models attributes as random variables and finds routes to arbitrary value sets via Bayesian estimation. Results of occasional flooded queries establish a baseline probability distribution, which is used to focus additional queries. Since this process is probabilistic and approximate, even partial matches from prior searches can still reduce the scope of search. We evaluate the benefits of BARD by extending directed diffusion and examining control overhead with and without our Bayesian filter. These simulations demonstrate a 28% to 73% reduction in control traffic, depending on the number and locations of sources and sinks.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"15 1","pages":"866-877 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90687501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Non-pipelined relay improves throughput performance of wireless ad-hoc networks 非流水线中继提高了无线自组织网络的吞吐量性能
Aravind Velayutham, K. Sundaresan, Raghupathy Sivakumar
The communication model typically assumed in wireless ad-hoc networks is based on a traditional "pipelined relay" (PR} strategy. In PR, an end-to-end flow has multiple outstanding packets (or data units) along the path from the source to the destination. In this paper, we argue that due to several unique properties of wireless ad-hoc networks, PR can be fundamentally improved upon. We present a new non-pipelined relay (nPR) strategy, where end-to-end flows have exactly one outstanding packet (or data unit) along the end-to-end path. We show that nPR has the following properties: (i) under idealized network conditions, it provides performance improvement, in terms of end-to-end throughput capacity and network transport capacity over PR, and achieves proportional fairness; and (ii) under practical network conditions, it further increases the above performance improvements, both in terms of the throughput achieved, and in terms of the fairness between flows. Finally, we present a forwarding protocol that practically realizes nPR. Through analysis and ns2 based packet level simulations, we evaluate the performance of the proposed strategy, and that of the forwarding protocol.
无线自组织网络中典型的通信模型是基于传统的“流水线中继”(PR)策略。在PR中,端到端流在从源到目的地的路径上有多个未完成的数据包(或数据单元)。在本文中,我们认为由于无线自组织网络的几个独特属性,PR可以从根本上得到改进。我们提出了一种新的非流水线中继(nPR)策略,其中端到端流沿着端到端路径只有一个未完成的数据包(或数据单元)。我们发现,在理想的网络条件下,nPR提供了性能改进,在端到端吞吐量和网络传输容量方面优于PR,并实现了比例公平;(ii)在实际网络条件下,无论是在实现的吞吐量方面,还是在流之间的公平性方面,都进一步提高了上述性能改进。最后,提出了一种实际实现nPR的转发协议。通过分析和基于ns2的分组级仿真,我们评估了所提出策略的性能,以及转发协议的性能。
{"title":"Non-pipelined relay improves throughput performance of wireless ad-hoc networks","authors":"Aravind Velayutham, K. Sundaresan, Raghupathy Sivakumar","doi":"10.1109/infcom.2005.1497916","DOIUrl":"https://doi.org/10.1109/infcom.2005.1497916","url":null,"abstract":"The communication model typically assumed in wireless ad-hoc networks is based on a traditional \"pipelined relay\" (PR} strategy. In PR, an end-to-end flow has multiple outstanding packets (or data units) along the path from the source to the destination. In this paper, we argue that due to several unique properties of wireless ad-hoc networks, PR can be fundamentally improved upon. We present a new non-pipelined relay (nPR) strategy, where end-to-end flows have exactly one outstanding packet (or data unit) along the end-to-end path. We show that nPR has the following properties: (i) under idealized network conditions, it provides performance improvement, in terms of end-to-end throughput capacity and network transport capacity over PR, and achieves proportional fairness; and (ii) under practical network conditions, it further increases the above performance improvements, both in terms of the throughput achieved, and in terms of the fairness between flows. Finally, we present a forwarding protocol that practically realizes nPR. Through analysis and ns2 based packet level simulations, we evaluate the performance of the proposed strategy, and that of the forwarding protocol.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"89 2 1","pages":"477-490 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90976786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach 在传感器网络中过滤虚假数据的组重键:一种基于预分布和本地协作的方法
Wensheng Zhang, G. Cao
When a sensor network is deployed in hostile environments, the adversary may compromise some sensor nodes, and use the compromised nodes to inject false sensing reports or modify the reports sent by other nodes. In order to defend against the attacks with low cost, researchers have proposed symmetric group key-based en-route filtering schemes, such as SEF [F. Ye et al., March 2004] and I-LHAP [S. Zhu et al., 2004]. However, if the adversary has compromised a large number of nodes, many group keys can be captured, and the filtering schemes may become ineffective or even useless. To deal with node compromise, the compromised nodes should be identified and the innocent nodes should update their group keys. Some existing intruder identification schemes can be used to identify the compromised nodes, but most existing group rekeying schemes are not suitable for sensor networks since they have large overhead and are not scalable. To address the problem, we propose a family of predistribution and local collaboration-based group rekeying (PCGR) schemes. These schemes are designed based on the ideas that future group keys can be preloaded to the sensor nodes before deployment, and neighbors can collaborate to protect and appropriately use the preloaded keys. Extensive analyses and simulations are conducted to evaluate the proposed schemes, and the results show that the proposed schemes can achieve a good level of security, outperform most previous group rekeying schemes, and significantly improve the effectiveness of filtering false data.
当传感器网络部署在敌对环境中时,攻击者可能会入侵某些传感器节点,并利用这些节点注入虚假的感知报告或修改其他节点发送的报告。为了以低成本防御攻击,研究人员提出了基于对称组密钥的路由过滤方案,如SEF [F]。Ye et al., March 2004]和I-LHAP [S。Zhu等,2004]。但是,如果攻击者已经破坏了大量节点,则可以捕获许多组密钥,并且过滤方案可能变得无效甚至无用。为了处理节点泄露,应该识别被泄露的节点,而无辜的节点应该更新它们的组密钥。现有的一些入侵者识别方案可用于识别被入侵的节点,但大多数现有的组密钥更新方案由于开销大且不可扩展而不适合传感器网络。为了解决这个问题,我们提出了一系列基于预分发和本地协作的组密钥更新(PCGR)方案。这些方案的设计思想是,未来的组密钥可以在部署前预加载到传感器节点,并且邻居可以协作保护和适当使用预加载的密钥。通过大量的分析和仿真对所提出的方案进行了评价,结果表明所提出的方案具有良好的安全性,优于大多数先前的组密钥更新方案,并显著提高了过滤虚假数据的有效性。
{"title":"Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach","authors":"Wensheng Zhang, G. Cao","doi":"10.1109/INFCOM.2005.1497918","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497918","url":null,"abstract":"When a sensor network is deployed in hostile environments, the adversary may compromise some sensor nodes, and use the compromised nodes to inject false sensing reports or modify the reports sent by other nodes. In order to defend against the attacks with low cost, researchers have proposed symmetric group key-based en-route filtering schemes, such as SEF [F. Ye et al., March 2004] and I-LHAP [S. Zhu et al., 2004]. However, if the adversary has compromised a large number of nodes, many group keys can be captured, and the filtering schemes may become ineffective or even useless. To deal with node compromise, the compromised nodes should be identified and the innocent nodes should update their group keys. Some existing intruder identification schemes can be used to identify the compromised nodes, but most existing group rekeying schemes are not suitable for sensor networks since they have large overhead and are not scalable. To address the problem, we propose a family of predistribution and local collaboration-based group rekeying (PCGR) schemes. These schemes are designed based on the ideas that future group keys can be preloaded to the sensor nodes before deployment, and neighbors can collaborate to protect and appropriately use the preloaded keys. Extensive analyses and simulations are conducted to evaluate the proposed schemes, and the results show that the proposed schemes can achieve a good level of security, outperform most previous group rekeying schemes, and significantly improve the effectiveness of filtering false data.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"23 1","pages":"503-514 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91365459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 181
Capacity of packetized voice services over time-shared wireless packet data channels 分时无线分组数据信道上的分组话音业务容量
Patrick Hosein
In traditional CDMA wireless networks, real-time services, such as circuit-switched voice, are transported over the air via synchronous channels because of their stringent delay requirements. In the third generation networks (3G), IxEV-DV [A.Soong et al., 2003] and HSDPA [E. Dahlman et al., 1998], an additional time shared channel was introduced on the forward link to support data services for which delay requirements are less stringent. The IxEV-DO [P. Bender et al., 2000] standard provides a single time-shared forward link channel and no synchronous channels since it was designed primarily for data services. It has recently been suggested that certain voice services (e.g.. Voice over IP (VoIP) and push-to-talk (PTT)), can be efficiently transported over such time-shared channels since they have less stringent delay requirements compared to circuit-switched voice. In this paper we investigate the capacity of VoIP users over these time-shared channels and investigate the sensitivity to various base station (BS) and mobile station (MS) design parameters, algorithms and features. Note that detailed simulations of each standard is not provided but rather a comparative approach is used whereby we investigate specific features of each standard. Our focus is on the forward channel since code division multiplexing is performed in the reverse link and hence comparable user capacities are achieved.
在传统的CDMA无线网络中,实时业务,如电路交换语音,由于其严格的延迟要求,通过同步信道在空中传输。在第三代网络(3G)中,IxEV-DV [A]。[j]。Dahlman et al., 1998],在转发链路上引入了一个额外的时间共享通道,以支持延迟要求不那么严格的数据服务。IxEV-DO [P]Bender等人,2000]标准提供了一个单一的分时转发链路通道,没有同步通道,因为它主要是为数据服务设计的。最近有人建议某些语音服务(例如……IP语音(VoIP)和一键通(PTT)可以在这种分时信道上有效地传输,因为与电路交换语音相比,它们对延迟的要求不那么严格。在本文中,我们研究了VoIP用户在这些分时信道上的容量,并研究了对各种基站(BS)和移动站(MS)设计参数、算法和特征的敏感性。请注意,没有提供每个标准的详细模拟,而是使用比较方法来研究每个标准的具体特征。我们的重点是前向信道,因为在反向链路上执行码分复用,因此实现了相当的用户容量。
{"title":"Capacity of packetized voice services over time-shared wireless packet data channels","authors":"Patrick Hosein","doi":"10.1109/INFCOM.2005.1498480","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498480","url":null,"abstract":"In traditional CDMA wireless networks, real-time services, such as circuit-switched voice, are transported over the air via synchronous channels because of their stringent delay requirements. In the third generation networks (3G), IxEV-DV [A.Soong et al., 2003] and HSDPA [E. Dahlman et al., 1998], an additional time shared channel was introduced on the forward link to support data services for which delay requirements are less stringent. The IxEV-DO [P. Bender et al., 2000] standard provides a single time-shared forward link channel and no synchronous channels since it was designed primarily for data services. It has recently been suggested that certain voice services (e.g.. Voice over IP (VoIP) and push-to-talk (PTT)), can be efficiently transported over such time-shared channels since they have less stringent delay requirements compared to circuit-switched voice. In this paper we investigate the capacity of VoIP users over these time-shared channels and investigate the sensitivity to various base station (BS) and mobile station (MS) design parameters, algorithms and features. Note that detailed simulations of each standard is not provided but rather a comparative approach is used whereby we investigate specific features of each standard. Our focus is on the forward channel since code division multiplexing is performed in the reverse link and hence comparable user capacities are achieved.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"9 1","pages":"2032-2043 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80527983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1