首页 > 最新文献

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.最新文献

英文 中文
Bayesian indoor positioning systems 贝叶斯室内定位系统
D. Madigan, E. Einahrawy, R. Martin, Wen-Hua Ju, P. Krishnan, A. Krishnakumar
In this paper, we introduce a new approach to location estimation where, instead of locating a single client, we simultaneously locate a set of wireless clients. We present a Bayesian hierarchical model for indoor location estimation in wireless networks. We demonstrate that our model achieves accuracy that is similar to other published models and algorithms. By harnessing prior knowledge, our model eliminates the requirement for training data as compared with existing approaches, thereby introducing the notion of a fully adaptive zero profiling approach to location estimation.
在本文中,我们介绍了一种新的位置估计方法,该方法不是定位单个客户端,而是同时定位一组无线客户端。提出了一种用于无线网络室内位置估计的贝叶斯层次模型。我们证明了我们的模型达到了与其他已发表的模型和算法相似的精度。通过利用先验知识,与现有方法相比,我们的模型消除了对训练数据的需求,从而引入了完全自适应零剖析方法的概念来进行位置估计。
{"title":"Bayesian indoor positioning systems","authors":"D. Madigan, E. Einahrawy, R. Martin, Wen-Hua Ju, P. Krishnan, A. Krishnakumar","doi":"10.1109/INFCOM.2005.1498348","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498348","url":null,"abstract":"In this paper, we introduce a new approach to location estimation where, instead of locating a single client, we simultaneously locate a set of wireless clients. We present a Bayesian hierarchical model for indoor location estimation in wireless networks. We demonstrate that our model achieves accuracy that is similar to other published models and algorithms. By harnessing prior knowledge, our model eliminates the requirement for training data as compared with existing approaches, thereby introducing the notion of a fully adaptive zero profiling approach to location estimation.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"52 56 1","pages":"1217-1227 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80414667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 421
A performance vs. cost framework for evaluating DHT design tradeoffs under churn 在客户流失情况下评估DHT设计权衡的性能与成本框架
Li, Jeremy, R. Morris, Kaashoek, Thomer, Gil
Protocols for distributed hash tables (DHTs) incorporate features to achieve low latency for lookup requests in the face of churn, continuous changes in membership. These protocol features can include a directed identifier space, parallel lookups, pro-active flooding of membership changes, and stabilization protocols for maintaining accurate routing. In addition, DHT protocols have parameters that can be tuned to achieve different tradeoffs between lookup latency and communication cost due to maintenance traffic. The relative importance of the features and parameters is not well understood, because most previous work evaluates protocols on static networks. This paper presents a performance versus cost framework (PVC) that allows designers to compare the effects of different protocol features and parameter values. PVC views a protocol as consuming a certain amount of network bandwidth in order to achieve a certain lookup latency, and helps reveal the efficiency with which protocols use additional network resources to improve latency. To demonstrate the value of PVC, this paper simulates Chord, Kademlia, Kelips, OneHop, and Tapestry under different workloads and uses PVC to understand which features are more important under churn. PVC analysis shows that the key to efficiently using additional bandwidth is for a protocol to adjust its routing table size. It also shows that routing table stabilization is wasteful and can be replaced with opportunistic learning through normal lookup traffic. These insights combined demonstrate that PVC is a valuable tool for DHT designers.
分布式哈希表(dht)的协议包含了一些特性,可以在成员不断变化的情况下实现查找请求的低延迟。这些协议特性可以包括有向标识符空间、并行查找、成员变更的主动泛洪以及用于维护准确路由的稳定协议。此外,DHT协议具有可调优的参数,以便在查找延迟和由于维护流量造成的通信成本之间实现不同的权衡。特征和参数的相对重要性还没有得到很好的理解,因为大多数先前的工作都是在静态网络上评估协议。本文提出了一个性能与成本框架(PVC),允许设计人员比较不同协议特性和参数值的影响。PVC将协议视为消耗一定数量的网络带宽以实现一定的查找延迟,并有助于揭示协议使用额外网络资源以改善延迟的效率。为了证明PVC的价值,本文在不同的工作负载下模拟了Chord, Kademlia, Kelips, OneHop和Tapestry,并使用PVC来了解在流失下哪些特性更重要。PVC分析表明,有效利用额外带宽的关键是协议调整其路由表大小。它还表明路由表稳定是浪费的,可以用通过正常查找流量的机会学习来取代。这些见解结合起来表明,PVC是DHT设计人员的一个有价值的工具。
{"title":"A performance vs. cost framework for evaluating DHT design tradeoffs under churn","authors":"Li, Jeremy, R. Morris, Kaashoek, Thomer, Gil","doi":"10.1109/INFCOM.2005.1497894","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497894","url":null,"abstract":"Protocols for distributed hash tables (DHTs) incorporate features to achieve low latency for lookup requests in the face of churn, continuous changes in membership. These protocol features can include a directed identifier space, parallel lookups, pro-active flooding of membership changes, and stabilization protocols for maintaining accurate routing. In addition, DHT protocols have parameters that can be tuned to achieve different tradeoffs between lookup latency and communication cost due to maintenance traffic. The relative importance of the features and parameters is not well understood, because most previous work evaluates protocols on static networks. This paper presents a performance versus cost framework (PVC) that allows designers to compare the effects of different protocol features and parameter values. PVC views a protocol as consuming a certain amount of network bandwidth in order to achieve a certain lookup latency, and helps reveal the efficiency with which protocols use additional network resources to improve latency. To demonstrate the value of PVC, this paper simulates Chord, Kademlia, Kelips, OneHop, and Tapestry under different workloads and uses PVC to understand which features are more important under churn. PVC analysis shows that the key to efficiently using additional bandwidth is for a protocol to adjust its routing table size. It also shows that routing table stabilization is wasteful and can be replaced with opportunistic learning through normal lookup traffic. These insights combined demonstrate that PVC is a valuable tool for DHT designers.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"6 1","pages":"225-236 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81553722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 258
Maximizing profit in overloaded networks 超负荷网络的利润最大化
M. Andrews
We consider the problem of scheduling data in overloaded networks. We wish to maximize the total profit of data that is served. We first consider a single server that has to schedule data over time-varying channels. This model is motivated by scheduling in wireless networks. Our objective is to maximize the total amount of data scheduled to user by time. In contrast to most previous work we assume that the channel conditions are defined by an adversary rather than a stationary, stochastic process. We give lower bounds on how competitive an online algorithm can be and show that the hounds are nearly matched by a simple randomized algorithm. We also consider a situation in which packets with associated profits are injected into a network of servers. We wish to schedule the packets in the network and maximize the profit of data that reaches its destination. We show that if the servers are allowed to exchange control packets that inform each other of the congestion in the network then we can approximate the optimum profit arbitrarily closely. We also show that without these control packets this is not possible. Our results are motivated by recent work on primal-dual algorithms for flow control in networks. The key difference between our approach and this previous work is that we take into account the scheduling dynamics in the network.
研究了过载网络中的数据调度问题。我们希望所提供数据的总利润最大化。我们首先考虑一个必须通过时变通道调度数据的单个服务器。该模型是由无线网络中的调度驱动的。我们的目标是最大化按时间分配给用户的数据总量。与大多数以前的工作相反,我们假设通道条件是由对手定义的,而不是一个平稳的随机过程。我们给出了在线算法竞争力的下界,并表明猎犬几乎可以通过简单的随机算法匹配。我们还考虑了一种情况,其中带有相关利润的数据包被注入到服务器网络中。我们希望对网络中的数据包进行调度,并使到达目的地的数据的利润最大化。我们表明,如果允许服务器交换控制数据包,通知彼此网络中的拥塞情况,那么我们可以任意接近最优利润。我们还表明,如果没有这些控制包,这是不可能的。我们的研究结果受到了网络中流量控制的原始对偶算法的启发。我们的方法与之前的工作的关键区别在于我们考虑了网络中的调度动态。
{"title":"Maximizing profit in overloaded networks","authors":"M. Andrews","doi":"10.1109/INFCOM.2005.1497893","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497893","url":null,"abstract":"We consider the problem of scheduling data in overloaded networks. We wish to maximize the total profit of data that is served. We first consider a single server that has to schedule data over time-varying channels. This model is motivated by scheduling in wireless networks. Our objective is to maximize the total amount of data scheduled to user by time. In contrast to most previous work we assume that the channel conditions are defined by an adversary rather than a stationary, stochastic process. We give lower bounds on how competitive an online algorithm can be and show that the hounds are nearly matched by a simple randomized algorithm. We also consider a situation in which packets with associated profits are injected into a network of servers. We wish to schedule the packets in the network and maximize the profit of data that reaches its destination. We show that if the servers are allowed to exchange control packets that inform each other of the congestion in the network then we can approximate the optimum profit arbitrarily closely. We also show that without these control packets this is not possible. Our results are motivated by recent work on primal-dual algorithms for flow control in networks. The key difference between our approach and this previous work is that we take into account the scheduling dynamics in the network.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"44 1","pages":"217-224 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82556828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Localized fault-tolerant event boundary detection in sensor networks 传感器网络中的局部容错事件边界检测
Min Ding, Dechang Chen, Kai Xing, Xiuzhen Cheng
This paper targets the identification of faulty sensors and detection of the reach of events in sensor networks with faulty sensors. Typical applications include the detection of the transportation front line of a contamination and the diagnosis of network health. We propose and analyze two novel algorithms for faulty sensor identification and fault-tolerant event boundary detection. These algorithms are purely localized and thus scale well to large sensor networks. Their computational overhead is low, since only simple numerical operations are involved. Simulation results indicate that these algorithms can clearly detect the event boundary and can identify faulty sensors with a high accuracy and a low false alarm rate when as many as 20% sensors become faulty. Our work is exploratory in that the proposed algorithms can accept any kind of scalar values as inputs, a dramatic improvement over existing works that take only 0/1 decision predicates. Therefore, our algorithms are generic. They can be applied as long as the "events" can be modelled by numerical numbers. Though designed for sensor networks, our algorithms can be applied to the outlier detection and regional data analysis in spatial data mining.
本文主要研究故障传感器的识别和故障传感器网络中事件到达的检测问题。典型的应用包括运输前线的污染检测和网络健康诊断。提出并分析了故障传感器识别和容错事件边界检测两种新算法。这些算法是完全局部化的,因此可以很好地扩展到大型传感器网络。它们的计算开销很低,因为只涉及简单的数值运算。仿真结果表明,该算法能够清晰地检测到事件边界,在高达20%的传感器故障情况下,能够以较高的准确率和较低的虚警率识别出故障传感器。我们的工作是探索性的,因为所提出的算法可以接受任何类型的标量值作为输入,这是对仅采用0/1决策谓词的现有工作的巨大改进。因此,我们的算法是通用的。只要“事件”可以用数字来模拟,它们就可以应用。虽然我们的算法是为传感器网络设计的,但我们的算法可以应用于空间数据挖掘中的离群点检测和区域数据分析。
{"title":"Localized fault-tolerant event boundary detection in sensor networks","authors":"Min Ding, Dechang Chen, Kai Xing, Xiuzhen Cheng","doi":"10.1109/INFCOM.2005.1498320","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498320","url":null,"abstract":"This paper targets the identification of faulty sensors and detection of the reach of events in sensor networks with faulty sensors. Typical applications include the detection of the transportation front line of a contamination and the diagnosis of network health. We propose and analyze two novel algorithms for faulty sensor identification and fault-tolerant event boundary detection. These algorithms are purely localized and thus scale well to large sensor networks. Their computational overhead is low, since only simple numerical operations are involved. Simulation results indicate that these algorithms can clearly detect the event boundary and can identify faulty sensors with a high accuracy and a low false alarm rate when as many as 20% sensors become faulty. Our work is exploratory in that the proposed algorithms can accept any kind of scalar values as inputs, a dramatic improvement over existing works that take only 0/1 decision predicates. Therefore, our algorithms are generic. They can be applied as long as the \"events\" can be modelled by numerical numbers. Though designed for sensor networks, our algorithms can be applied to the outlier detection and regional data analysis in spatial data mining.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"1 1","pages":"902-913 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90856256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 451
An efficient reservation MAC protocol with preallocation for high-speed WDM passive optical networks 高速WDM无源光网络中一种高效的预分配预约MAC协议
C. Xiao, B. Bing, G. Chang
Wavelength division multiplexing passive optical networks (WDM PONs) can dynamically offer each end user a unique optical wavelength for data transmission as well as the possibility of wavelength reuse and aggregation, thereby ensuring scalability in bandwidth assignment. In this paper, we propose a new byte size clock (BSC) reservation MAC scheme that not only arbitrates upstream transmission and prevents optical collisions, but also varies bandwidth according to demand and priority, reduces request delay using pre-allocation and delta compression, and handles the addition/reconfiguration of network nodes efficiently. The new access scheme exploits both WDM and TDM to cater for both light and heavy bandwidth requirements and supports both Ethernet and ATM packets without segmenting or aggregating them. Our proposed protocol is not only backward compatible with APON and EPON, but also provides a better utilization of the access link in terms of the throughput and delay. In addition, the amount of pre-allocated bandwidth can be minimized using delta compression, which in turns reduces the latency due to the request and grant mechanism. We analyzed, evaluated, and simulated the performance and practicality of the proposed scheme.
波分复用无源光网络(WDM pon)可以动态地为每个终端用户提供唯一的光波长进行数据传输,并具有波长复用和聚合的可能性,从而保证了带宽分配的可扩展性。本文提出了一种新的BSC (byte size clock)预留MAC方案,该方案不仅可以仲裁上行传输和防止光冲突,还可以根据需求和优先级改变带宽,利用预分配和增量压缩减少请求延迟,并有效地处理网络节点的添加/重新配置。新的接入方案利用WDM和TDM来满足轻型和重型带宽需求,并支持以太网和ATM数据包,而不需要对它们进行分段或聚合。我们提出的协议不仅向后兼容APON和EPON,而且在吞吐量和延迟方面更好地利用了接入链路。此外,可以使用增量压缩最小化预分配带宽的数量,这反过来又减少了由于请求和授予机制造成的延迟。我们对所提出方案的性能和实用性进行了分析、评估和仿真。
{"title":"An efficient reservation MAC protocol with preallocation for high-speed WDM passive optical networks","authors":"C. Xiao, B. Bing, G. Chang","doi":"10.1109/INFCOM.2005.1497913","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497913","url":null,"abstract":"Wavelength division multiplexing passive optical networks (WDM PONs) can dynamically offer each end user a unique optical wavelength for data transmission as well as the possibility of wavelength reuse and aggregation, thereby ensuring scalability in bandwidth assignment. In this paper, we propose a new byte size clock (BSC) reservation MAC scheme that not only arbitrates upstream transmission and prevents optical collisions, but also varies bandwidth according to demand and priority, reduces request delay using pre-allocation and delta compression, and handles the addition/reconfiguration of network nodes efficiently. The new access scheme exploits both WDM and TDM to cater for both light and heavy bandwidth requirements and supports both Ethernet and ATM packets without segmenting or aggregating them. Our proposed protocol is not only backward compatible with APON and EPON, but also provides a better utilization of the access link in terms of the throughput and delay. In addition, the amount of pre-allocated bandwidth can be minimized using delta compression, which in turns reduces the latency due to the request and grant mechanism. We analyzed, evaluated, and simulated the performance and practicality of the proposed scheme.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"1 1","pages":"444-454 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89343500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Analysis of the competition between wired, DSL and wireless users in an access network 接入网中有线、DSL和无线用户之间的竞争分析
F. Baccelli, Ki Beak Kim, D. D. Vleeschauwer
This paper analyzes the performance of a large population composed of several classes of long lived TCP flows experiencing packet losses due to random transmission errors and to congestion created by the sharing of a common tail-drop or RED bottleneck router. Each class has a different transmission error rate. This setting is used to analyze the competition between wired and wireless users in an access network, where one class (the wired class) has no or small (like BER in DSL) transmission error losses whereas the other class has higher transmission error losses, or the competition between DSL flows using different coding schemes. We propose a natural and simple model for the joint throughput evolution of several classes of TCP flows under such a mix of losses. Two types of random transmission error losses are considered: one where losses are Poisson and independent of the rate of the flow, and one where the losses are still Poisson but with an intensity that is proportional to the rate of the source. We show that the large population model where the population tends to infinity has a threshold (given in closed form) below which there are no congestion losses at all in steady state, and above which there is a stationary limiting regime in which we can compute both the mean value and the distribution of the rate obtained by each class of flow. We also show that the maximum mean value for the aggregated rate is achieved at the threshold.
本文分析了由几类长寿命TCP流组成的大量人口的性能,这些流由于随机传输错误和共享一个共同的tail-drop或RED瓶颈路由器所产生的拥塞而经历包丢失。每个类都有不同的传输错误率。该设置用于分析接入网中有线和无线用户之间的竞争,其中一类(有线类)没有或很小(如DSL中的BER)传输错误损失,而另一类则有更高的传输错误损失,或者使用不同编码方案的DSL流之间的竞争。我们提出了一个自然而简单的模型,用于几种TCP流在这种混合损失下的联合吞吐量演化。考虑了两种类型的随机传输误差损失:一种是泊松损失,与流的速率无关;另一种仍然是泊松损失,但强度与源的速率成正比。我们表明,人口趋于无穷大的大人口模型具有一个阈值(以封闭形式给出),低于该阈值,在稳态下根本没有拥塞损失,高于该阈值,存在一个平稳的限制区域,在该区域中我们可以计算每一类流获得的平均值和速率分布。我们还表明,聚合速率的最大平均值是在阈值处实现的。
{"title":"Analysis of the competition between wired, DSL and wireless users in an access network","authors":"F. Baccelli, Ki Beak Kim, D. D. Vleeschauwer","doi":"10.1109/INFCOM.2005.1497906","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497906","url":null,"abstract":"This paper analyzes the performance of a large population composed of several classes of long lived TCP flows experiencing packet losses due to random transmission errors and to congestion created by the sharing of a common tail-drop or RED bottleneck router. Each class has a different transmission error rate. This setting is used to analyze the competition between wired and wireless users in an access network, where one class (the wired class) has no or small (like BER in DSL) transmission error losses whereas the other class has higher transmission error losses, or the competition between DSL flows using different coding schemes. We propose a natural and simple model for the joint throughput evolution of several classes of TCP flows under such a mix of losses. Two types of random transmission error losses are considered: one where losses are Poisson and independent of the rate of the flow, and one where the losses are still Poisson but with an intensity that is proportional to the rate of the source. We show that the large population model where the population tends to infinity has a threshold (given in closed form) below which there are no congestion losses at all in steady state, and above which there is a stationary limiting regime in which we can compute both the mean value and the distribution of the rate obtained by each class of flow. We also show that the maximum mean value for the aggregated rate is achieved at the threshold.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"5 1","pages":"362-373 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86404349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Asymptotically optimal power-aware routing for multihop wireless networks with renewable energy sources 可再生能源多跳无线网络的渐近最优功率感知路由
Xiaojun Lin, N. Shroff, R. Srikant
In this paper, we model and characterize the performance of multihop radio networks in the presence of energy constraints and design routing algorithms to optimally utilize the available energy. The energy model allows vastly different energy sources in heterogeneous environments. The proposed algorithm is shown to achieve a competitive ratio (i.e., the ratio of the performance of any off-line algorithm that has knowledge of all past and future packet arrivals to the performance of our online algorithm) that is asymptotically optimal with respect to the number of nodes in the network. The algorithm assumes no statistical information on packet arrivals and can easily be incorporated into existing routing frameworks (e.g., proactive or on-demand methodologies) in a distributed fashion. Simulation results confirm that the algorithm performs very well in terms of maximizing the throughput of an energy-constrained network. Further, a new threshold-based scheme is proposed to reduce the routing overhead while incurring only minimum performance degradation.
在本文中,我们对存在能量约束的多跳无线网络的性能进行建模和表征,并设计路由算法以最佳地利用可用能量。能源模型允许在异质环境中使用大量不同的能源。所提出的算法被证明实现了一个竞争比(即,任何具有所有过去和未来数据包到达知识的离线算法的性能与我们的在线算法的性能的比率),该比率相对于网络中的节点数量是渐近最优的。该算法假定没有数据包到达的统计信息,并且可以很容易地以分布式方式合并到现有的路由框架中(例如,主动或按需方法)。仿真结果表明,该算法在能量受限网络的吞吐量最大化方面表现良好。此外,提出了一种新的基于阈值的方案,以减少路由开销,同时只产生最小的性能下降。
{"title":"Asymptotically optimal power-aware routing for multihop wireless networks with renewable energy sources","authors":"Xiaojun Lin, N. Shroff, R. Srikant","doi":"10.1109/INFCOM.2005.1498352","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498352","url":null,"abstract":"In this paper, we model and characterize the performance of multihop radio networks in the presence of energy constraints and design routing algorithms to optimally utilize the available energy. The energy model allows vastly different energy sources in heterogeneous environments. The proposed algorithm is shown to achieve a competitive ratio (i.e., the ratio of the performance of any off-line algorithm that has knowledge of all past and future packet arrivals to the performance of our online algorithm) that is asymptotically optimal with respect to the number of nodes in the network. The algorithm assumes no statistical information on packet arrivals and can easily be incorporated into existing routing frameworks (e.g., proactive or on-demand methodologies) in a distributed fashion. Simulation results confirm that the algorithm performs very well in terms of maximizing the throughput of an energy-constrained network. Further, a new threshold-based scheme is proposed to reduce the routing overhead while incurring only minimum performance degradation.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"32 1","pages":"1262-1272 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77095557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
On the maximal throughput of networks with finite buffers and its application to buffered crossbars 有限缓冲区网络的最大吞吐量及其在缓冲横杆中的应用
P. Giaccone, Emilio Leonardi, D. Shah
The advent of packet networks has motivated many researchers to study the performance of networks of queues in the last decade or two. However, most of the previous work assumes the availability of infinite queue-size. Instead, in this paper, we study the maximal achievable throughput in a flow-controlled lossless network with finite-queue size. In such networks, throughput depends on the packet scheduling policy utilized. As the main of this paper, we obtain a dynamic scheduling policy that achieves the maximal throughput (equal to the maximal throughput in the presence of infinite queue-size) with a minimal finite queue-size at the internal nodes of the network. Though the performance of the policy is ideal, it is quite complex and hence difficult to implement. This leads us to a design of simpler and possibly implementable policy. We obtain a natural trade-off between throughput and queue-size for this policy. We apply our results to the packet switches with buffered crossbar architecture. We propose a simple, implementable, distributed scheduling policy which provides high throughput in the presence of minimal internal buffer. We also obtain a natural trade-off between throughput, internal speedup and buffer-size providing a switch designer with a gamut of designs. To the best of authors' knowledge, this is one of the first attempts to study the throughput for general networks with finite queue-size. We believe that our methods are general and can be useful in other contexts.
在过去的一二十年里,分组网络的出现激发了许多研究者对队列网络性能的研究。然而,前面的大部分工作都假定队列大小是无限的。相反,在本文中,我们研究了有限队列大小的流控无损网络的最大可实现吞吐量。在这种网络中,吞吐量取决于所使用的数据包调度策略。作为本文的主要内容,我们得到了一种动态调度策略,该策略在网络内部节点上以最小的有限队列大小实现最大吞吐量(等于无限队列大小时的最大吞吐量)。虽然该政策的表现是理想的,但它非常复杂,因此难以实施。这将引导我们设计更简单且可能实现的策略。对于此策略,我们在吞吐量和队列大小之间获得了一种自然的权衡。将研究结果应用于具有缓冲交叉条结构的分组交换机。我们提出了一个简单的,可实现的,分布式调度策略,在最小的内部缓冲区存在的情况下提供高吞吐量。我们还获得了吞吐量,内部加速和缓冲区大小之间的自然权衡,为交换机设计人员提供了一系列设计。据作者所知,这是研究具有有限队列大小的一般网络的吞吐量的第一次尝试之一。我们相信我们的方法是通用的,可以在其他环境中使用。
{"title":"On the maximal throughput of networks with finite buffers and its application to buffered crossbars","authors":"P. Giaccone, Emilio Leonardi, D. Shah","doi":"10.1109/INFCOM.2005.1498326","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498326","url":null,"abstract":"The advent of packet networks has motivated many researchers to study the performance of networks of queues in the last decade or two. However, most of the previous work assumes the availability of infinite queue-size. Instead, in this paper, we study the maximal achievable throughput in a flow-controlled lossless network with finite-queue size. In such networks, throughput depends on the packet scheduling policy utilized. As the main of this paper, we obtain a dynamic scheduling policy that achieves the maximal throughput (equal to the maximal throughput in the presence of infinite queue-size) with a minimal finite queue-size at the internal nodes of the network. Though the performance of the policy is ideal, it is quite complex and hence difficult to implement. This leads us to a design of simpler and possibly implementable policy. We obtain a natural trade-off between throughput and queue-size for this policy. We apply our results to the packet switches with buffered crossbar architecture. We propose a simple, implementable, distributed scheduling policy which provides high throughput in the presence of minimal internal buffer. We also obtain a natural trade-off between throughput, internal speedup and buffer-size providing a switch designer with a gamut of designs. To the best of authors' knowledge, this is one of the first attempts to study the throughput for general networks with finite queue-size. We believe that our methods are general and can be useful in other contexts.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"16 1","pages":"971-980 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76461852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Connection admission control for flow level QoS in bufferless models 无缓冲模型中流级QoS的连接允许控制
Sándor Rácz, Tamás Jakabfy, J. Farkas, Csaba Antal
Admission control algorithms used in access networks for multiplexed voice sources are typically based on aggregated system characteristics, such as aggregate loss probability. Even though the relation of these aggregate performance measures to the performance of specific flows is not trivial, it has gained limited attention so far. We propose an admission control method that provides flow level QoS guarantees. The proposed method is based on Gaussian approximation applied for the bufferless multiplexing model. We show that the flow level packet loss violation probability can be approximated as the quantile of a normal distribution and we give a method to calculate its mean and variance. The obtained admission control formula includes the moments of the activity factor distribution.
用于多路语音源的接入网中的准入控制算法通常基于聚合系统特征,例如聚合丢失概率。尽管这些综合性能指标与特定流量的性能之间的关系并非微不足道,但迄今为止,它得到的关注有限。我们提出了一种提供流级QoS保证的接纳控制方法。该方法基于高斯近似,应用于无缓冲复用模型。我们证明了流级丢包违反概率可以近似为正态分布的分位数,并给出了其均值和方差的计算方法。所得的进气控制公式包含了活度因子分布的矩。
{"title":"Connection admission control for flow level QoS in bufferless models","authors":"Sándor Rácz, Tamás Jakabfy, J. Farkas, Csaba Antal","doi":"10.1109/INFCOM.2005.1498353","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498353","url":null,"abstract":"Admission control algorithms used in access networks for multiplexed voice sources are typically based on aggregated system characteristics, such as aggregate loss probability. Even though the relation of these aggregate performance measures to the performance of specific flows is not trivial, it has gained limited attention so far. We propose an admission control method that provides flow level QoS guarantees. The proposed method is based on Gaussian approximation applied for the bufferless multiplexing model. We show that the flow level packet loss violation probability can be approximated as the quantile of a normal distribution and we give a method to calculate its mean and variance. The obtained admission control formula includes the moments of the activity factor distribution.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"55 1","pages":"1273-1282 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88401696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network 基于IEEE 802.11的多通道无线网状网络的体系结构和算法
Ashish Raniwala, T. Chiueh
Even though multiple non-overlapped channels exist in the 2.4 GHz and 5 GHz spectrum, most IEEE 802.11-based multi-hop ad hoc networks today use only a single channel. As a result, these networks rarely can fully exploit the aggregate bandwidth available in the radio spectrum provisioned by the standards. This prevents them from being used as an ISP's wireless last-mile access network or as a wireless enterprise backbone network. In this paper, we propose a multi-channel wireless mesh network (WMN) architecture (called Hyacinth) that equips each mesh network node with multiple 802.11 network interface cards (NICs). The central design issues of this multi-channel WMN architecture are channel assignment and routing. We show that intelligent channel assignment is critical to Hyacinth's performance, present distributed algorithms that utilize only local traffic load information to dynamically assign channels and to route packets, and compare their performance against a centralized algorithm that performs the same functions. Through an extensive simulation study, we show that even with just 2 NICs on each node, it is possible to improve the network throughput by a factor of 6 to 7 when compared with the conventional single-channel ad hoc network architecture. We also describe and evaluate a 9-node Hyacinth prototype that Is built using commodity PCs each equipped with two 802.11a NICs.
尽管在2.4 GHz和5 GHz频谱中存在多个非重叠信道,但大多数基于IEEE 802.11的多跳自组织网络目前只使用单个信道。因此,这些网络很少能够充分利用标准提供的无线电频谱中可用的总带宽。这阻止了它们被用作ISP的无线最后一英里接入网或作为无线企业骨干网。在本文中,我们提出了一种多通道无线网状网络(WMN)架构(称为Hyacinth),该架构为每个网状网络节点配备多个802.11网络接口卡(nic)。这种多信道WMN体系结构的核心设计问题是信道分配和路由。我们展示了智能通道分配对Hyacinth的性能至关重要,提出了仅利用本地流量负载信息动态分配通道和路由数据包的分布式算法,并将其性能与执行相同功能的集中式算法进行了比较。通过广泛的模拟研究,我们表明,即使在每个节点上只有2个网卡,与传统的单通道自组织网络架构相比,也有可能将网络吞吐量提高6到7倍。我们还描述和评估了一个9节点的Hyacinth原型,该原型使用配备两个802.11a网卡的商用pc构建。
{"title":"Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network","authors":"Ashish Raniwala, T. Chiueh","doi":"10.1109/INFCOM.2005.1498497","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498497","url":null,"abstract":"Even though multiple non-overlapped channels exist in the 2.4 GHz and 5 GHz spectrum, most IEEE 802.11-based multi-hop ad hoc networks today use only a single channel. As a result, these networks rarely can fully exploit the aggregate bandwidth available in the radio spectrum provisioned by the standards. This prevents them from being used as an ISP's wireless last-mile access network or as a wireless enterprise backbone network. In this paper, we propose a multi-channel wireless mesh network (WMN) architecture (called Hyacinth) that equips each mesh network node with multiple 802.11 network interface cards (NICs). The central design issues of this multi-channel WMN architecture are channel assignment and routing. We show that intelligent channel assignment is critical to Hyacinth's performance, present distributed algorithms that utilize only local traffic load information to dynamically assign channels and to route packets, and compare their performance against a centralized algorithm that performs the same functions. Through an extensive simulation study, we show that even with just 2 NICs on each node, it is possible to improve the network throughput by a factor of 6 to 7 when compared with the conventional single-channel ad hoc network architecture. We also describe and evaluate a 9-node Hyacinth prototype that Is built using commodity PCs each equipped with two 802.11a NICs.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"73 1","pages":"2223-2234 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91377081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1766
期刊
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1