首页 > 最新文献

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.最新文献

英文 中文
Packetostatics: deployment of massively dense sensor networks as an electrostatics problem 包静力学:作为静电问题的大规模密集传感器网络的部署
S. Toumpis, L. Tassiulas
We investigate the spatial distribution of wireless nodes that can transport a given volume of traffic in a sensor network, while requiring the minimum number of wireless nodes. The traffic is created at a spatially distributed set of sources, and must arrive at a spatially distributed set of sinks. Under a general assumption on the physical and medium access control (MAC) layers, the optimal distribution of nodes induces a traffic flow identical to the electrostatic field that would exist if the sources and sinks of traffic were substituted with an appropriate distribution of electric charge. This analogy between electrostatics and wireless sensor networks can be extended in a number of different ways. For example, Thomson's theorem on the distribution of electric charge on conductors gives the optimal distribution of traffic sources and sinks (that minimizes the number of nodes needed) when we have a limited degree of freedom on their initial placement. Electrostatics problems with Neumann boundary conditions and topologies with different types of dielectric materials can also be interpreted in the context of wireless sensor networks. The analogy also has important limitations. For example, if we move to a three dimensional topology, adapting our general assumption on the physical and MAC layers accordingly, or we stay in the two dimensional plane but use an alternative assumption, that is more suited to ultra wide band communication, the optimal traffic distribution is not in general irrotational, and so can not be interpreted as an electrostatic field. Finally, the analogy cannot be extended to include networks that support more than one type of traffic.
我们研究了在传感器网络中可以传输给定流量的无线节点的空间分布,同时需要最少数量的无线节点。流量是在空间分布的一组源上创建的,并且必须到达空间分布的一组汇点。在物理层和介质访问控制(MAC)层的一般假设下,节点的最优分布引起的交通流与用适当的电荷分布代替流量源和流量集时所存在的静电场相同。静电学和无线传感器网络之间的这种类比可以以许多不同的方式进行扩展。例如,关于导体上电荷分布的汤姆逊定理给出了当我们在初始位置上有有限自由度时,流量源和汇点的最佳分布(即所需节点的数量最小化)。具有诺伊曼边界条件和具有不同类型介电材料的拓扑结构的静电问题也可以在无线传感器网络的背景下解释。这种类比也有重要的局限性。例如,如果我们移动到三维拓扑,相应地调整我们对物理层和MAC层的一般假设,或者我们停留在二维平面但使用更适合超宽带通信的替代假设,则最佳流量分布通常不是无旋转的,因此不能解释为静电场。最后,这个类比不能扩展到包括支持多种类型流量的网络。
{"title":"Packetostatics: deployment of massively dense sensor networks as an electrostatics problem","authors":"S. Toumpis, L. Tassiulas","doi":"10.1109/INFCOM.2005.1498516","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498516","url":null,"abstract":"We investigate the spatial distribution of wireless nodes that can transport a given volume of traffic in a sensor network, while requiring the minimum number of wireless nodes. The traffic is created at a spatially distributed set of sources, and must arrive at a spatially distributed set of sinks. Under a general assumption on the physical and medium access control (MAC) layers, the optimal distribution of nodes induces a traffic flow identical to the electrostatic field that would exist if the sources and sinks of traffic were substituted with an appropriate distribution of electric charge. This analogy between electrostatics and wireless sensor networks can be extended in a number of different ways. For example, Thomson's theorem on the distribution of electric charge on conductors gives the optimal distribution of traffic sources and sinks (that minimizes the number of nodes needed) when we have a limited degree of freedom on their initial placement. Electrostatics problems with Neumann boundary conditions and topologies with different types of dielectric materials can also be interpreted in the context of wireless sensor networks. The analogy also has important limitations. For example, if we move to a three dimensional topology, adapting our general assumption on the physical and MAC layers accordingly, or we stay in the two dimensional plane but use an alternative assumption, that is more suited to ultra wide band communication, the optimal traffic distribution is not in general irrotational, and so can not be interpreted as an electrostatic field. Finally, the analogy cannot be extended to include networks that support more than one type of traffic.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"11 1","pages":"2290-2301 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91387121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
Time and energy complexity of distributed computation in wireless sensor networks 无线传感器网络中分布式计算的时间和能量复杂度
Nilesh Khude, Anurag Kumar, A. Karnik
We consider a scenario where a wireless sensor network is formed by randomly deploying n sensors to measure some spatial function over a field, with the objective of computing the maximum value of the measurements and communicating it to an operator station. We view the problem as one of message passing distributed computation over a geometric random graph. The network is assumed to be synchronous; at each sampling instant each sensor measures a value, and then the sensors collaboratively compute and deliver the maximum of these values to the operator station. Computation algorithms differ in the messages they need to exchange, and our formulation focuses on the problem of scheduling of the message exchanges. We do not exploit techniques such as source compression, or block coding of the computations. For this problem, we study the computation time and energy expenditure for one time maximum computation, and also the pipeline throughput. We show that, for an optimal algorithm, the computation time, energy expenditure and the achievable rate of computation scale as /spl Theta/(/spl radic/ n/log n), /spl Theta/(n) and /spl Theta/(1/log n) asymptotically (in probability) as the number of sensors n/spl rarr//spl infin/. We also analyze the performance of three specific computational algorithms, namely, the tree algorithm, multihop transmission, and the ripple algorithm, and obtain scaling laws for the computation time and energy expenditure as n/spl rarr//spl infin/. Simulation results are provided to show that our analysis indeed captures the correct scaling; the simulations also yield estimates of the constant multipliers in the scaling laws. Our analyses throughout assume a centralized scheduler and hence our results can be viewed as providing bounds for the performance with a distributed scheduler.
我们考虑一个场景,其中无线传感器网络是通过随机部署n个传感器来测量一个领域的一些空间功能而形成的,其目标是计算测量的最大值并将其传达给操作站。我们把这个问题看作是在一个几何随机图上传递消息的分布式计算问题。假设网络是同步的;在每个采样时刻,每个传感器测量一个值,然后传感器协同计算并将这些值的最大值传递给操作站。计算算法需要交换的消息不同,我们的公式主要关注消息交换的调度问题。我们没有利用诸如源压缩或计算块编码之类的技术。对于这一问题,我们研究了一次最大计算的计算时间和能量消耗,以及管道吞吐量。我们证明,对于最优算法,计算时间,能量消耗和可实现的计算规模速率为/spl Theta/(/spl radial / n/log n), /spl Theta/(n)和/spl Theta/(1/log n)渐近(概率上)为传感器数量n/spl rarr//spl infin/。我们还分析了三种具体的计算算法,即树算法、多跳传输和纹波算法的性能,得到了计算时间和能量消耗为n/spl rarr//spl infin/的比例规律。仿真结果表明,我们的分析确实捕获了正确的尺度;模拟还得出了标度定律中常数乘数的估计。我们的分析自始至终都假设使用集中式调度器,因此我们的结果可以被视为使用分布式调度器提供性能界限。
{"title":"Time and energy complexity of distributed computation in wireless sensor networks","authors":"Nilesh Khude, Anurag Kumar, A. Karnik","doi":"10.1109/INFCOM.2005.1498546","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498546","url":null,"abstract":"We consider a scenario where a wireless sensor network is formed by randomly deploying n sensors to measure some spatial function over a field, with the objective of computing the maximum value of the measurements and communicating it to an operator station. We view the problem as one of message passing distributed computation over a geometric random graph. The network is assumed to be synchronous; at each sampling instant each sensor measures a value, and then the sensors collaboratively compute and deliver the maximum of these values to the operator station. Computation algorithms differ in the messages they need to exchange, and our formulation focuses on the problem of scheduling of the message exchanges. We do not exploit techniques such as source compression, or block coding of the computations. For this problem, we study the computation time and energy expenditure for one time maximum computation, and also the pipeline throughput. We show that, for an optimal algorithm, the computation time, energy expenditure and the achievable rate of computation scale as /spl Theta/(/spl radic/ n/log n), /spl Theta/(n) and /spl Theta/(1/log n) asymptotically (in probability) as the number of sensors n/spl rarr//spl infin/. We also analyze the performance of three specific computational algorithms, namely, the tree algorithm, multihop transmission, and the ripple algorithm, and obtain scaling laws for the computation time and energy expenditure as n/spl rarr//spl infin/. Simulation results are provided to show that our analysis indeed captures the correct scaling; the simulations also yield estimates of the constant multipliers in the scaling laws. Our analyses throughout assume a centralized scheduler and hence our results can be viewed as providing bounds for the performance with a distributed scheduler.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"31 1","pages":"2625-2637 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87170174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
On optimal partitioning of realtime traffic over multiple paths 多路径实时流量的最优划分
S. Mao, S. Panwar, Yiwei Thomas Hou
Multipath transport provides higher usable bandwidth for a session. It has also been shown to provide load balancing and error resilience for end-to-end multimedia sessions. Two key issues in the use of multiple paths are (1) how to minimize the end-to-end delay, which now includes the delay along the paths and the resequencing delay at the receiver, and (2) how to select paths. In this paper, we present an analytical framework for the optimal partitioning of realtime multimedia traffic that minimizes the total end-to-end delay. Specifically, we formulate optimal traffic partitioning as a constrained optimization problem using deterministic network calculus, and derive its closed form solution. Compared with previous work, our scheme is simpler to implement and enforce. This analysis also greatly simplifies the solution to the path selection problem as compared to previous efforts. Analytical results show that for a given flow and a set of paths, we can choose a minimal subset to achieve the minimum end-to-end delay with O(N) time, where N is the number of available paths. The selected path set is optimal in the sense that adding any rejected path to the set will only increase the end-to-end delay.
多路径传输为会话提供了更高的可用带宽。它还被证明可以为端到端多媒体会话提供负载平衡和错误恢复能力。使用多路径的两个关键问题是(1)如何最小化端到端延迟,现在包括沿路径的延迟和接收器的重排序延迟,以及(2)如何选择路径。在本文中,我们提出了一个分析框架,用于实时多媒体流量的最佳划分,以最小化端到端总延迟。具体来说,我们利用确定性网络演算将最优流量划分问题表述为一个约束优化问题,并推导出其封闭形式解。与以往的工作相比,我们的方案更容易实现和执行。与之前的工作相比,这种分析也大大简化了路径选择问题的解决方案。分析结果表明,对于给定的流和一组路径,我们可以选择一个最小子集,在O(N)时间内实现最小的端到端延迟,其中N为可用路径的数量。所选路径集是最优的,因为将任何被拒绝的路径添加到该集只会增加端到端延迟。
{"title":"On optimal partitioning of realtime traffic over multiple paths","authors":"S. Mao, S. Panwar, Yiwei Thomas Hou","doi":"10.1109/INFCOM.2005.1498519","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498519","url":null,"abstract":"Multipath transport provides higher usable bandwidth for a session. It has also been shown to provide load balancing and error resilience for end-to-end multimedia sessions. Two key issues in the use of multiple paths are (1) how to minimize the end-to-end delay, which now includes the delay along the paths and the resequencing delay at the receiver, and (2) how to select paths. In this paper, we present an analytical framework for the optimal partitioning of realtime multimedia traffic that minimizes the total end-to-end delay. Specifically, we formulate optimal traffic partitioning as a constrained optimization problem using deterministic network calculus, and derive its closed form solution. Compared with previous work, our scheme is simpler to implement and enforce. This analysis also greatly simplifies the solution to the path selection problem as compared to previous efforts. Analytical results show that for a given flow and a set of paths, we can choose a minimal subset to achieve the minimum end-to-end delay with O(N) time, where N is the number of available paths. The selected path set is optimal in the sense that adding any rejected path to the set will only increase the end-to-end delay.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"75 1","pages":"2325-2336 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85987770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Multipath routing for multiple description video in wireless ad hoc networks 无线自组织网络中多描述视频的多路径路由
S. Mao, Yiwei Thomas Hou, Xiaolin Cheng, H. Sherali, S. Midkiff
As developments in wireless ad hoc networks continue, there is an increasing expectation with regard to supporting content-rich multimedia communications (e.g., video) in such networks, in addition to simple data communications. The recent advances in multiple description (MD) video coding have made it highly suitable for multimedia applications in such networks. In this paper, we study the important problem of multipath routing for MD video in wireless ad hoc networks. We follow an application-centric cross-layer approach and formulate an optimal routing problem that minimizes the application layer video distortion. We show that the optimization problem has a highly complex objective function and an exact analytic solution is not obtainable. However, we find that a meta-heuristic approach such as genetic algorithms (GAs) is eminently effective in addressing this type of complex cross-layer optimization problems. We provide a detailed solution procedure for the GA-based approach, as well as a tight lower bound for video distortion. We use numerical results to demonstrate the superior performance of the GA-based approach and compare it to several other approaches. Our efforts in this work provide an important methodology for addressing complex cross-layer optimization problems, particularly those involving application and network layers.
随着无线特设网络的继续发展,除了简单的数据通信外,人们越来越期望在这种网络中支持内容丰富的多媒体通信(例如视频)。多描述(MD)视频编码技术的最新进展使其非常适合此类网络中的多媒体应用。本文研究了无线自组织网络中MD视频的多径路由问题。我们遵循以应用为中心的跨层方法,并制定了一个最佳路由问题,以最大限度地减少应用层视频失真。结果表明,该优化问题具有高度复杂的目标函数,无法得到精确的解析解。然而,我们发现诸如遗传算法(GAs)之类的元启发式方法在解决这类复杂的跨层优化问题方面非常有效。我们提供了基于遗传算法的方法的详细解决程序,以及视频失真的严格下界。我们使用数值结果来证明基于遗传算法的方法的优越性能,并将其与其他几种方法进行比较。我们在这项工作中的努力为解决复杂的跨层优化问题提供了一个重要的方法,特别是那些涉及应用程序和网络层的问题。
{"title":"Multipath routing for multiple description video in wireless ad hoc networks","authors":"S. Mao, Yiwei Thomas Hou, Xiaolin Cheng, H. Sherali, S. Midkiff","doi":"10.1109/INFCOM.2005.1497939","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497939","url":null,"abstract":"As developments in wireless ad hoc networks continue, there is an increasing expectation with regard to supporting content-rich multimedia communications (e.g., video) in such networks, in addition to simple data communications. The recent advances in multiple description (MD) video coding have made it highly suitable for multimedia applications in such networks. In this paper, we study the important problem of multipath routing for MD video in wireless ad hoc networks. We follow an application-centric cross-layer approach and formulate an optimal routing problem that minimizes the application layer video distortion. We show that the optimization problem has a highly complex objective function and an exact analytic solution is not obtainable. However, we find that a meta-heuristic approach such as genetic algorithms (GAs) is eminently effective in addressing this type of complex cross-layer optimization problems. We provide a detailed solution procedure for the GA-based approach, as well as a tight lower bound for video distortion. We use numerical results to demonstrate the superior performance of the GA-based approach and compare it to several other approaches. Our efforts in this work provide an important methodology for addressing complex cross-layer optimization problems, particularly those involving application and network layers.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"18 1","pages":"740-750 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81328243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
A novel analytical model for electronic and optical switches with shared buffer 一种新的共享缓冲器电子光开关解析模型
Zhenghao Zhang, Yuanyuan Yang
Switches with shared buffer have lower packet loss probabilities than other types of switches when the sizes of the buffers are the same. In the past, the performance analysis for electronic shared buffer switches has been carried out extensively. However, due to the strong dependencies of the output queues in the buffer, it is very difficult to find a good analytical model. Existing models are either accurate but have exponential complexities or not very accurate. In this paper, we propose a novel analytical model called the aggregation model for switches with shared buffer. This model can be used for analyzing both electronic and optical switches, and has perfect accuracies under all tested conditions and has polynomial time complexity. It is based on the idea of induction: first find the behavior of 2 queues, then aggregate them into one block; then find the behavior of 3 queues while regarding 2 of the queues as one block, then aggregate the 3 queues into one block; then aggregate 4 queues and so on. When a sufficient number of queues have been aggregated, the behavior of the entire switch is found. We believe that the new model represents the best analytical model for shared buffer switches so far.
在缓冲区大小相同的情况下,具有共享缓冲区的交换机比其他类型的交换机丢包概率更低。过去,对电子共享缓冲开关的性能分析进行了大量的研究。然而,由于缓冲区中输出队列的强依赖性,很难找到一个好的分析模型。现有的模型要么是准确的,但具有指数复杂性,要么不是很准确。本文提出了一种新的具有共享缓冲器的交换器的聚合分析模型。该模型可用于分析电子和光开关,在所有测试条件下都具有良好的精度和多项式时间复杂度。它基于归纳的思想:首先找到2个队列的行为,然后将它们聚合成一个块;然后找出3个队列的行为,其中2个队列作为一个块,然后将3个队列聚合成一个块;然后聚合4个队列,以此类推。当聚合了足够数量的队列时,就可以找到整个交换机的行为。我们相信新模型代表了迄今为止共享缓冲开关的最佳分析模型。
{"title":"A novel analytical model for electronic and optical switches with shared buffer","authors":"Zhenghao Zhang, Yuanyuan Yang","doi":"10.1109/INFCOM.2005.1497911","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497911","url":null,"abstract":"Switches with shared buffer have lower packet loss probabilities than other types of switches when the sizes of the buffers are the same. In the past, the performance analysis for electronic shared buffer switches has been carried out extensively. However, due to the strong dependencies of the output queues in the buffer, it is very difficult to find a good analytical model. Existing models are either accurate but have exponential complexities or not very accurate. In this paper, we propose a novel analytical model called the aggregation model for switches with shared buffer. This model can be used for analyzing both electronic and optical switches, and has perfect accuracies under all tested conditions and has polynomial time complexity. It is based on the idea of induction: first find the behavior of 2 queues, then aggregate them into one block; then find the behavior of 3 queues while regarding 2 of the queues as one block, then aggregate the 3 queues into one block; then aggregate 4 queues and so on. When a sufficient number of queues have been aggregated, the behavior of the entire switch is found. We believe that the new model represents the best analytical model for shared buffer switches so far.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"128 1","pages":"420-431 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88344306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Compact neighbor discovery: a bandwidth defense through bandwidth optimization 紧凑邻居发现:通过带宽优化实现带宽防御
Pars Mutaf, C. Castelluccia
We present a stateless defense against the neighbor discovery denial-of-service (ND-DoS) attack in IPv6. The ND-DoS attack consists of remotely flooding a target subnet with bogus packets destined for random interface identifiers; a different one for each malicious packet. The 128-bit IPv6 address reserves its 64 low-order bits for the interface ID. Consequently, the malicious packets are very likely to fall on previously unresolved addresses and the target access router (or leaf router) is obligated to resolve these addresses by sending neighbor solicitation packets. Neighbor solicitation packets are link layer multicast (or broadcast), and hence also forwarded by bridges. As a consequence, the attack may consume important bandwidth in subnets with wireless bridges, or access points. This problem is particularly important in the presence of mobile IPv6 devices that expect incoming sessions from the Internet. In this case, address resolution is crucial for the access router to reliably deliver incoming sessions to idle mobile devices with unknown MAC addresses. We propose a novel neighbor solicitation technique using Bloom filters. Multiple IPv6 addresses (bogus or real) that are waiting in the access router's address resolution queue are compactly represented using a Bloom filter. By broadcasting a single neighbor solicitation message that carries the Bloom filter, multiple IPv6 addresses are concurrently solicited. Legitimate neighbor solicitation triggering packets are not denied service. An on-link host can detect its address in the received Bloom filter and return its MAC address to the access router. A bandwidth gain around 40 can be achieved in all cells of the target subnet. This approach that we call compact neighbor discovery (CND) is the first bandwidth DoS defense that we are aware of to employ a bandwidth optimization.
我们提出了一种针对IPv6邻居发现拒绝服务(ND-DoS)攻击的无状态防御。ND-DoS攻击包括远程淹没目标子网,向随机接口标识发送虚假数据包;每个恶意数据包使用不同的一个。128位IPv6地址为接口ID保留64位低阶位。因此,恶意数据包很可能落在以前未解析的地址上,目标访问路由器(或叶子路由器)有义务通过发送邻居请求数据包来解析这些地址。邻居请求报文是链路层组播(或广播),因此也通过网桥转发。因此,攻击可能会消耗具有无线网桥或接入点的子网中的重要带宽。在移动IPv6设备的存在下,这个问题尤其重要,因为这些设备期望从Internet传入会话。在这种情况下,地址解析对于接入路由器可靠地将传入会话发送到MAC地址未知的空闲移动设备至关重要。我们提出了一种新的邻居请求技术,使用布隆过滤器。在访问路由器的地址解析队列中等待的多个IPv6地址(虚假或真实)使用Bloom过滤器紧凑地表示。通过广播携带Bloom过滤器的单个邻居请求消息,可以同时请求多个IPv6地址。合法邻居请求触发报文不被拒绝服务。链路上的主机可以在收到的Bloom过滤器中检测到它的地址,并将它的MAC地址返回给访问路由器。在目标子网的所有单元中可以实现40左右的带宽增益。我们称之为紧凑邻居发现(CND)的这种方法是我们所知道的第一个带宽DoS防御,采用带宽优化。
{"title":"Compact neighbor discovery: a bandwidth defense through bandwidth optimization","authors":"Pars Mutaf, C. Castelluccia","doi":"10.1109/INFCOM.2005.1498554","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498554","url":null,"abstract":"We present a stateless defense against the neighbor discovery denial-of-service (ND-DoS) attack in IPv6. The ND-DoS attack consists of remotely flooding a target subnet with bogus packets destined for random interface identifiers; a different one for each malicious packet. The 128-bit IPv6 address reserves its 64 low-order bits for the interface ID. Consequently, the malicious packets are very likely to fall on previously unresolved addresses and the target access router (or leaf router) is obligated to resolve these addresses by sending neighbor solicitation packets. Neighbor solicitation packets are link layer multicast (or broadcast), and hence also forwarded by bridges. As a consequence, the attack may consume important bandwidth in subnets with wireless bridges, or access points. This problem is particularly important in the presence of mobile IPv6 devices that expect incoming sessions from the Internet. In this case, address resolution is crucial for the access router to reliably deliver incoming sessions to idle mobile devices with unknown MAC addresses. We propose a novel neighbor solicitation technique using Bloom filters. Multiple IPv6 addresses (bogus or real) that are waiting in the access router's address resolution queue are compactly represented using a Bloom filter. By broadcasting a single neighbor solicitation message that carries the Bloom filter, multiple IPv6 addresses are concurrently solicited. Legitimate neighbor solicitation triggering packets are not denied service. An on-link host can detect its address in the received Bloom filter and return its MAC address to the access router. A bandwidth gain around 40 can be achieved in all cells of the target subnet. This approach that we call compact neighbor discovery (CND) is the first bandwidth DoS defense that we are aware of to employ a bandwidth optimization.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"24 1","pages":"2711-2719 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86687343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Gossip algorithms: design, analysis and applications 八卦算法:设计、分析和应用
Stephen P. Boyd, Arpita Ghosh, B. Prabhakar, D. Shah
Motivated by applications to sensor, peer-to-peer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and information exchange in an arbitrarily connected network of nodes. Nodes in such networks operate under limited computational, communication and energy resources. These constraints naturally give rise to "gossip" algorithms: schemes which distribute the computational burden and in which a node communicates with a randomly chosen neighbor. We analyze the averaging problem under the gossip constraint for arbitrary network, and find that the averaging time of a gossip algorithm depends on the second largest eigenvalue of a doubly stochastic matrix characterizing the algorithm. Using recent results of Boyd, Diaconis and Xiao (2003), we show that minimizing this quantity to design the fastest averaging algorithm on the network is a semi-definite program (SDP). In general, SDPs cannot be solved distributedly; however, exploiting problem structure, we propose a subgradient method that distributedly solves the optimization problem over the network. The relation of averaging time to the second largest eigenvalue naturally relates it to the mixing time of a random walk with transition probabilities that are derived from the gossip algorithm. We use this connection to study the performance of gossip algorithm on two popular networks: wireless sensor networks, which are modeled as geometric random graphs, and the Internet graph under the so-called preferential connectivity model.
受传感器、点对点和自组织网络应用的启发,我们研究了分布式异步算法,也称为八卦算法,用于在任意连接的节点网络中进行计算和信息交换。这种网络中的节点在有限的计算、通信和能源资源下运行。这些约束自然产生了“八卦”算法:分配计算负担的方案,其中节点与随机选择的邻居通信。分析了任意网络在八卦约束下的平均问题,发现八卦算法的平均时间取决于描述该算法的双随机矩阵的第二大特征值。利用Boyd, Diaconis和Xiao(2003)的最新结果,我们表明最小化该数量以设计网络上最快的平均算法是一个半确定程序(SDP)。一般情况下,sdp不能分布式求解;然而,利用问题结构,我们提出了一种亚梯度方法,在网络上分布式地解决优化问题。平均时间与第二大特征值的关系自然地将其与随机游走的混合时间联系起来,该混合时间具有由八卦算法导出的转移概率。我们使用这种连接来研究两种流行网络上的流言算法的性能:无线传感器网络,它被建模为几何随机图,以及所谓的优先连接模型下的互联网图。
{"title":"Gossip algorithms: design, analysis and applications","authors":"Stephen P. Boyd, Arpita Ghosh, B. Prabhakar, D. Shah","doi":"10.1109/INFCOM.2005.1498447","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498447","url":null,"abstract":"Motivated by applications to sensor, peer-to-peer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and information exchange in an arbitrarily connected network of nodes. Nodes in such networks operate under limited computational, communication and energy resources. These constraints naturally give rise to \"gossip\" algorithms: schemes which distribute the computational burden and in which a node communicates with a randomly chosen neighbor. We analyze the averaging problem under the gossip constraint for arbitrary network, and find that the averaging time of a gossip algorithm depends on the second largest eigenvalue of a doubly stochastic matrix characterizing the algorithm. Using recent results of Boyd, Diaconis and Xiao (2003), we show that minimizing this quantity to design the fastest averaging algorithm on the network is a semi-definite program (SDP). In general, SDPs cannot be solved distributedly; however, exploiting problem structure, we propose a subgradient method that distributedly solves the optimization problem over the network. The relation of averaging time to the second largest eigenvalue naturally relates it to the mixing time of a random walk with transition probabilities that are derived from the gossip algorithm. We use this connection to study the performance of gossip algorithm on two popular networks: wireless sensor networks, which are modeled as geometric random graphs, and the Internet graph under the so-called preferential connectivity model.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"44 1","pages":"1653-1664 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86528283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 596
Minimum energy accumulative routing in wireless networks 无线网络中的最小能量累积路由
Jiangzhuo Chen, L. Jia, Xin Liu, G. Noubir, Ravi Sundaram
In this paper, we propose to address the energy efficient routing problem in multi-hop wireless networks with accumulative relay. In the accumulative relay model, partially overheard signals of previous transmissions for the same packet are used to decode it using a maximal ratio combiner technique [J.G. Proakis, 2001]. Therefore, additional energy saving can be achieved over traditional energy efficient routing. The idea of accumulative relay originates from the study of relay channel in information theory with a main focus on network capacity. It has been independently applied to minimum-energy broadcasting in L.G. Manish Agrawal et al. (2004), I. Maric and R. Yates (2002). We formulate the minimum energy accumulative routing problem (MEAR) and study it. We obtain hardness of approximation results counterbalanced with good heuristic solutions which we validate using simulations. Without energy accumulation, the classic shortest path (SP) algorithm finds the minimum energy path for a source-destination pair. However, we show that with energy accumulation, the SP can be arbitrarily bad. We turn our attention to heuristics and show that any optimal solution of MEAR can be converted to a canonical form - wave path. Armed with this insight, we develop a polynomial time heuristic to efficiently search over the space of all wavepaths. Simulation results show that our heuristic can provide more than 30% energy saving over minimum energy routing without accumulative relay. We also discuss the implementation issues of such a scheme.
本文提出了一种基于累积中继的多跳无线网络节能路由问题。在累积中继模型中,使用最大比组合技术对同一数据包的先前传输的部分偷听信号进行解码[j]Proakis, 2001]。因此,可以在传统的节能路由上实现额外的节能。累加中继的思想起源于信息论中对中继信道的研究,主要关注网络容量。L.G. Manish Agrawal等人(2004)、I. Maric和R. Yates(2002)分别将其独立应用于最小能量广播。提出了最小能量累积路由问题,并对其进行了研究。我们得到了与良好的启发式解相平衡的近似结果的硬度,我们用模拟验证了这一点。经典的最短路径(SP)算法在没有能量积累的情况下,寻找源-目标对的最小能量路径。然而,我们表明,随着能量的积累,SP可以任意坏。我们将注意力转向启发式方法,并证明了MEAR的任何最优解都可以转换为规范形式-波路径。有了这个见解,我们开发了一个多项式时间启发式来有效地搜索所有波路径的空间。仿真结果表明,该算法比无累积继电器的最小能量路由节能30%以上。我们还讨论了该方案的实施问题。
{"title":"Minimum energy accumulative routing in wireless networks","authors":"Jiangzhuo Chen, L. Jia, Xin Liu, G. Noubir, Ravi Sundaram","doi":"10.1109/INFCOM.2005.1498466","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498466","url":null,"abstract":"In this paper, we propose to address the energy efficient routing problem in multi-hop wireless networks with accumulative relay. In the accumulative relay model, partially overheard signals of previous transmissions for the same packet are used to decode it using a maximal ratio combiner technique [J.G. Proakis, 2001]. Therefore, additional energy saving can be achieved over traditional energy efficient routing. The idea of accumulative relay originates from the study of relay channel in information theory with a main focus on network capacity. It has been independently applied to minimum-energy broadcasting in L.G. Manish Agrawal et al. (2004), I. Maric and R. Yates (2002). We formulate the minimum energy accumulative routing problem (MEAR) and study it. We obtain hardness of approximation results counterbalanced with good heuristic solutions which we validate using simulations. Without energy accumulation, the classic shortest path (SP) algorithm finds the minimum energy path for a source-destination pair. However, we show that with energy accumulation, the SP can be arbitrarily bad. We turn our attention to heuristics and show that any optimal solution of MEAR can be converted to a canonical form - wave path. Armed with this insight, we develop a polynomial time heuristic to efficiently search over the space of all wavepaths. Simulation results show that our heuristic can provide more than 30% energy saving over minimum energy routing without accumulative relay. We also discuss the implementation issues of such a scheme.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"24 1","pages":"1875-1886 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84364941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Improving VoIP quality through path switching 通过路径交换提高VoIP质量
S. Tao, Kuai Xu, A. Estepa, Teng Fei, Lixin Gao, R. Guérin, J. Kurose, D. Towsley, Zhi-Li Zhang
The current best-effort Internet cannot readily provide the service guarantees that VoIP applications often require. Path switching can potentially address this problem without requiring new network mechanisms, simply by leveraging the robustness to performance variations available from connectivity options such as multi-homing and overlays. In this paper, we evaluate the effectiveness and benefits of path switching in improving the quality of VoIP applications, and demonstrate its feasibility through the design and implementation of a prototype gateway. We argue for an application-driven path switching system that accounts for both network path characteristics and application-specific factors (e.g., codec algorithms, playout buffering schemes). We also develop an application path quality estimator based on the ITU-T E-model for voice quality assessment, and an application-driven path switching algorithm that dynamically adapts the time scales over which path switching decisions are made to maximize voice quality. Through network emulation and experiments over a wide-area multi-homed test bed, we show that, with sufficient path diversity, path switching can yield meaningful improvements in voice quality. Hence by exploiting the inherent path diversity of the Internet, application-driven path switching is a viable option in providing quality-of-service to applications.
目前最努力的互联网不能轻易提供VoIP应用程序经常需要的服务保证。路径交换可以潜在地解决这个问题,而不需要新的网络机制,只需利用多宿主和覆盖等连接选项提供的性能变化的健壮性。在本文中,我们评估了路径交换在提高VoIP应用质量方面的有效性和好处,并通过原型网关的设计和实现证明了其可行性。我们主张应用程序驱动的路径交换系统,该系统考虑了网络路径特征和应用程序特定因素(例如,编解码器算法,播放缓冲方案)。我们还开发了一种基于ITU-T e模型的应用路径质量估计器,用于语音质量评估,以及一种应用驱动的路径交换算法,该算法可动态调整做出路径交换决策的时间尺度,以最大限度地提高语音质量。通过网络仿真和广域多归属测试平台上的实验,我们表明,在足够的路径分集下,路径交换可以显著提高语音质量。因此,通过利用Internet固有的路径多样性,应用程序驱动的路径交换是向应用程序提供服务质量的可行选择。
{"title":"Improving VoIP quality through path switching","authors":"S. Tao, Kuai Xu, A. Estepa, Teng Fei, Lixin Gao, R. Guérin, J. Kurose, D. Towsley, Zhi-Li Zhang","doi":"10.1109/INFCOM.2005.1498514","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498514","url":null,"abstract":"The current best-effort Internet cannot readily provide the service guarantees that VoIP applications often require. Path switching can potentially address this problem without requiring new network mechanisms, simply by leveraging the robustness to performance variations available from connectivity options such as multi-homing and overlays. In this paper, we evaluate the effectiveness and benefits of path switching in improving the quality of VoIP applications, and demonstrate its feasibility through the design and implementation of a prototype gateway. We argue for an application-driven path switching system that accounts for both network path characteristics and application-specific factors (e.g., codec algorithms, playout buffering schemes). We also develop an application path quality estimator based on the ITU-T E-model for voice quality assessment, and an application-driven path switching algorithm that dynamically adapts the time scales over which path switching decisions are made to maximize voice quality. Through network emulation and experiments over a wide-area multi-homed test bed, we show that, with sufficient path diversity, path switching can yield meaningful improvements in voice quality. Hence by exploiting the inherent path diversity of the Internet, application-driven path switching is a viable option in providing quality-of-service to applications.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"38 1","pages":"2268-2278 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82585583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
Spatial-temporal analysis of passive TCP measurements 被动TCP测量的时空分析
E. Brosh, Galit Lubetzky-Sharon, Y. Shavitt
In this paper we look at TCP data which was passively collected from an edge ISP, and analyze it to obtain some new results and deeper understanding of TCP loss process. The focus of our study is to identify the 'root cause' links, i.e., the links that are responsible for the majority of the losses or reorders found on the end-to-end TCP connection. We suggest a new root cause criterion and a cost-effective algorithm to identify the root cause links. The algorithm incorporates a new out-of-sequence packet classification technique which is interesting by itself. We test our algorithm on the collected and simulated data and analytically justify its correctness. The simulation results show that the algorithm has a 95% detection rate with 10% false detection rate. We also analyze TCP temporal loss process, and found that the burst loss size is geometrically distributed. We analyze the TCP time-out loss indication under the Bernoulli loss model, which is the simplest model that can cause a geometric distribution, and show that the behavior of the TCP loss process is not different than when tail drop is assumed.
本文对从边缘ISP被动采集的TCP数据进行了分析,得到了一些新的结果,对TCP丢失过程有了更深入的认识。我们研究的重点是确定“根本原因”链接,即对端到端TCP连接上发现的大部分损失或重排序负责的链接。我们建议一个新的根本原因标准和一个经济有效的算法来识别根本原因链接。该算法结合了一种新的乱序包分类技术,该技术本身就很有趣。我们在收集和模拟的数据上测试了我们的算法,并分析证明了它的正确性。仿真结果表明,该算法的检测率为95%,误检率为10%。分析了TCP的时间损耗过程,发现突发损耗大小呈几何分布。本文分析了能引起几何分布的最简单的伯努利损耗模型下的TCP超时损耗指示,并表明TCP损耗过程的行为与假设尾部下降时的行为没有什么不同。
{"title":"Spatial-temporal analysis of passive TCP measurements","authors":"E. Brosh, Galit Lubetzky-Sharon, Y. Shavitt","doi":"10.1109/INFCOM.2005.1498324","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498324","url":null,"abstract":"In this paper we look at TCP data which was passively collected from an edge ISP, and analyze it to obtain some new results and deeper understanding of TCP loss process. The focus of our study is to identify the 'root cause' links, i.e., the links that are responsible for the majority of the losses or reorders found on the end-to-end TCP connection. We suggest a new root cause criterion and a cost-effective algorithm to identify the root cause links. The algorithm incorporates a new out-of-sequence packet classification technique which is interesting by itself. We test our algorithm on the collected and simulated data and analytically justify its correctness. The simulation results show that the algorithm has a 95% detection rate with 10% false detection rate. We also analyze TCP temporal loss process, and found that the burst loss size is geometrically distributed. We analyze the TCP time-out loss indication under the Bernoulli loss model, which is the simplest model that can cause a geometric distribution, and show that the behavior of the TCP loss process is not different than when tail drop is assumed.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"17 1","pages":"949-959 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82571651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1