首页 > 最新文献

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.最新文献

英文 中文
Maximal lifetime scheduling in sensor surveillance networks 传感器监控网络的最大生命周期调度
Hai Liu, P. Wan, Chih-Wei Yi, X. Jia, S. Makki, Pissinou Niki
This paper addresses the maximal lifetime scheduling problem in sensor surveillance networks. Given a set of sensors and targets in a Euclidean plane, a sensor can watch only one target at a time, our task is to schedule sensors to watch targets, such that the lifetime of the surveillance system is maximized, where the lifetime is the duration that all targets are watched. We propose an optimal solution to find the target watching schedule for sensors that achieves the maximal lifetime. Our solution consists of three steps: 1) computing the maximal lifetime of the surveillance system and a workload matrix by using linear programming techniques; 2) decomposing the workload matrix into a sequence of schedule matrices that can achieve the maximal lifetime; 3) obtaining a target watching timetable for each sensor based on the schedule matrices. Simulations have been conducted to study the complexity of our proposed method and to compare with the performance of a greedy method.
研究了传感器监控网络中的最大生存期调度问题。给定欧几里得平面上的一组传感器和目标,一个传感器一次只能监视一个目标,我们的任务是调度传感器监视目标,使监视系统的寿命最大化,其中寿命是监视所有目标的持续时间。我们提出了一种最优解,以确定传感器的目标监视时间表,使其达到最大的使用寿命。我们的解决方案包括三个步骤:1)利用线性规划技术计算监控系统的最大寿命和工作量矩阵;2)将工作负荷矩阵分解为能够实现最大生存期的调度矩阵序列;3)根据调度矩阵得到各传感器的目标观测时间表。通过仿真研究了所提方法的复杂度,并与贪心方法的性能进行了比较。
{"title":"Maximal lifetime scheduling in sensor surveillance networks","authors":"Hai Liu, P. Wan, Chih-Wei Yi, X. Jia, S. Makki, Pissinou Niki","doi":"10.1109/INFCOM.2005.1498533","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498533","url":null,"abstract":"This paper addresses the maximal lifetime scheduling problem in sensor surveillance networks. Given a set of sensors and targets in a Euclidean plane, a sensor can watch only one target at a time, our task is to schedule sensors to watch targets, such that the lifetime of the surveillance system is maximized, where the lifetime is the duration that all targets are watched. We propose an optimal solution to find the target watching schedule for sensors that achieves the maximal lifetime. Our solution consists of three steps: 1) computing the maximal lifetime of the surveillance system and a workload matrix by using linear programming techniques; 2) decomposing the workload matrix into a sequence of schedule matrices that can achieve the maximal lifetime; 3) obtaining a target watching timetable for each sensor based on the schedule matrices. Simulations have been conducted to study the complexity of our proposed method and to compare with the performance of a greedy method.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"10 1","pages":"2482-2491 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76386780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 136
Interference-aware routing in multihop wireless networks using directional antennas 定向天线在多跳无线网络中的干扰感知路由
Jian Tang, G. Xue, C. Chandler, Weiyi Zhang
Recent research has shown that interference can make a significant impact on the performance of multihop wireless networks. Researchers have studied interference-aware topology control recently [M. Burkhart et al., 2004]. In this paper, we study routing problems in a multihop wireless network using directional antennas with dynamic traffic. We present new definitions of link and path interference that are suitable for designing better routing algorithms. We then formulate and optimally solve two power constrained minimum interference single path routing problems. Routing along paths found by our interference-aware algorithms tends to have less channel collisions and higher network throughput. Our simulation results show that, compared with the minimum power path routing algorithm, our algorithms can reduce average path interference by 40% or more at the cost of a minor power increase. We also extend our work towards survivable routing by formulating and solving the power constrained minimum interference node-disjoint path routing problem.
最近的研究表明,干扰会对多跳无线网络的性能产生重大影响。近年来,研究人员对干扰感知拓扑控制进行了研究[M]。Burkhart et al., 2004]。本文研究了具有动态流量的定向天线多跳无线网络中的路由问题。我们提出了新的链路和路径干扰的定义,适合设计更好的路由算法。然后,我们提出并最优解决了两个功率约束最小干扰单路径路由问题。沿着我们的干扰感知算法找到的路径路由往往具有更少的信道冲突和更高的网络吞吐量。仿真结果表明,与最小功率路径路由算法相比,我们的算法可以以较小的功率增加为代价,将平均路径干扰减少40%以上。我们还通过制定和解决功率约束最小干扰节点不相交路径路由问题,将我们的工作扩展到可生存路由。
{"title":"Interference-aware routing in multihop wireless networks using directional antennas","authors":"Jian Tang, G. Xue, C. Chandler, Weiyi Zhang","doi":"10.1109/INFCOM.2005.1497940","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1497940","url":null,"abstract":"Recent research has shown that interference can make a significant impact on the performance of multihop wireless networks. Researchers have studied interference-aware topology control recently [M. Burkhart et al., 2004]. In this paper, we study routing problems in a multihop wireless network using directional antennas with dynamic traffic. We present new definitions of link and path interference that are suitable for designing better routing algorithms. We then formulate and optimally solve two power constrained minimum interference single path routing problems. Routing along paths found by our interference-aware algorithms tends to have less channel collisions and higher network throughput. Our simulation results show that, compared with the minimum power path routing algorithm, our algorithms can reduce average path interference by 40% or more at the cost of a minor power increase. We also extend our work towards survivable routing by formulating and solving the power constrained minimum interference node-disjoint path routing problem.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"62 3 1","pages":"751-760 vol. 1"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77667342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Distributed rate allocation for inelastic flows: optimization frameworks, optimality conditions, and optimal algorithms 非弹性流的分布式速率分配:优化框架,最优性条件和最优算法
M. Chiang, Shengyu Zhang, P. Hande
A common assumption behind most of the recent research on network utility maximization is that traffic flows are elastic, which implies that their utility functions are concave and there are no hard limits on the rate allocated to each flow. These critical assumptions lead to tractability of the analytic models of utility maximization, but also limits applicability of the resulting rate allocation protocols. This paper focuses on inelastic flows and removes these restrictive and often invalid assumptions. We present several optimization frameworks, optimality conditions, and optimal algorithms. First, we consider nonconcave utility functions, which turn utility maximization into nonconvex, constrained optimization problems that are well-known to be difficult. We present conditions under which the current standard price-based distributed algorithm can still converge to the globally optimal rate allocation despite nonconcavity of utility functions. In particular, continuity of price-based rate allocation at all the optimal prices is a sufficient condition for global convergence of rate allocation by the standard algorithm, and continuity at at least one optimal price is a necessary condition. In the second part of the paper, we provide a general problem formulation of rate allocation among time-sensitive flows from real-time and streaming applications, as well as a decomposition into subproblems coordinated by pricing. After simplifying the subproblems by leveraging the optimization structures, we highlight the difficult issues of causality and time-scale, and propose an effective price-based heuristics for admission control and an optimal algorithm for a special case formulation.
最近大多数关于网络效用最大化的研究都有一个共同的假设,即交通流是弹性的,这意味着它们的效用函数是凹的,并且分配给每个流的速率没有硬性限制。这些关键的假设导致效用最大化分析模型的可追溯性,但也限制了所得速率分配协议的适用性。本文的重点是非弹性流动,并消除了这些限制性和往往无效的假设。我们提出了几个优化框架,最优性条件和最优算法。首先,我们考虑非凹效用函数,它将效用最大化转化为非凸约束优化问题,这是众所周知的困难问题。给出了在效用函数具有非凹性的情况下,当前标准的基于价格的分布式算法仍能收敛到全局最优费率分配的条件。其中,基于价格的费率分配在所有最优价格处的连续性是标准算法费率分配全局收敛的充分条件,且至少有一个最优价格处的连续性是必要条件。在论文的第二部分,我们提供了实时和流应用中时间敏感流的速率分配的一般问题表述,以及通过定价协调的子问题分解。在利用优化结构简化子问题之后,我们强调了因果关系和时间尺度的难题,并提出了一种有效的基于价格的入场控制启发式方法和一种特殊情况公式的最优算法。
{"title":"Distributed rate allocation for inelastic flows: optimization frameworks, optimality conditions, and optimal algorithms","authors":"M. Chiang, Shengyu Zhang, P. Hande","doi":"10.1109/INFCOM.2005.1498551","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498551","url":null,"abstract":"A common assumption behind most of the recent research on network utility maximization is that traffic flows are elastic, which implies that their utility functions are concave and there are no hard limits on the rate allocated to each flow. These critical assumptions lead to tractability of the analytic models of utility maximization, but also limits applicability of the resulting rate allocation protocols. This paper focuses on inelastic flows and removes these restrictive and often invalid assumptions. We present several optimization frameworks, optimality conditions, and optimal algorithms. First, we consider nonconcave utility functions, which turn utility maximization into nonconvex, constrained optimization problems that are well-known to be difficult. We present conditions under which the current standard price-based distributed algorithm can still converge to the globally optimal rate allocation despite nonconcavity of utility functions. In particular, continuity of price-based rate allocation at all the optimal prices is a sufficient condition for global convergence of rate allocation by the standard algorithm, and continuity at at least one optimal price is a necessary condition. In the second part of the paper, we provide a general problem formulation of rate allocation among time-sensitive flows from real-time and streaming applications, as well as a decomposition into subproblems coordinated by pricing. After simplifying the subproblems by leveraging the optimization structures, we highlight the difficult issues of causality and time-scale, and propose an effective price-based heuristics for admission control and an optimal algorithm for a special case formulation.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"57 1","pages":"2679-2690 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86286327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
ECHOS - enhanced capacity 802.11 hotspots ECHOS -增强容量802.11热点
Arunchandar Vasan, R. Ramjee, Thomas Y. C. Woo
The total number of hotspot users around the world is expected to grow from 9.3 million at the end of 2003 to 30 million at the end of 2004 according to researcher Gartner. Given the explosive growth in hotspot wireless usage, enhancing capacity of 802.11-based hot-spot wireless networks is an important problem. In this paper, we make two important contributions. We first present the AP-CST algorithm that dynamically adjusts the carrier sense threshold (CST) in order to allow more flows to coexist in current 802.11 architectures. We then extend the current hotspot engineering paradigm by allowing every cell and AP access to all available channels. These cells are then managed by the RNC-SC algorithm running in a centralized radio network controller. This algorithm assigns mobile stations to appropriate cells/channels and adjusts transmit power values dynamically, thereby exploiting spatial heterogeneity in distribution of users at the hotspots. Through detailed and extensive simulations, we show that the performance of 802.11-based hotspots can be improved by up to 195% per-cell and 70% overall.
据研究机构Gartner称,全球热点用户总数预计将从2003年底的930万增长到2004年底的3000万。随着热点无线使用的爆炸式增长,增强基于802.11的热点无线网络的容量是一个重要的问题。在本文中,我们做了两个重要的贡献。我们首先提出了AP-CST算法,该算法动态调整载波感知阈值(CST),以便在当前的802.11架构中允许更多的流共存。然后,我们扩展了当前的热点工程范例,允许每个小区和AP访问所有可用的信道。这些单元随后由运行在中央无线网络控制器中的RNC-SC算法进行管理。该算法将移动台分配到适当的小区/信道,并动态调整发射功率值,从而利用热点用户分布的空间异质性。通过详细和广泛的模拟,我们表明基于802.11的热点的性能可以在每个小区提高195%,整体提高70%。
{"title":"ECHOS - enhanced capacity 802.11 hotspots","authors":"Arunchandar Vasan, R. Ramjee, Thomas Y. C. Woo","doi":"10.1109/INFCOM.2005.1498439","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498439","url":null,"abstract":"The total number of hotspot users around the world is expected to grow from 9.3 million at the end of 2003 to 30 million at the end of 2004 according to researcher Gartner. Given the explosive growth in hotspot wireless usage, enhancing capacity of 802.11-based hot-spot wireless networks is an important problem. In this paper, we make two important contributions. We first present the AP-CST algorithm that dynamically adjusts the carrier sense threshold (CST) in order to allow more flows to coexist in current 802.11 architectures. We then extend the current hotspot engineering paradigm by allowing every cell and AP access to all available channels. These cells are then managed by the RNC-SC algorithm running in a centralized radio network controller. This algorithm assigns mobile stations to appropriate cells/channels and adjusts transmit power values dynamically, thereby exploiting spatial heterogeneity in distribution of users at the hotspots. Through detailed and extensive simulations, we show that the performance of 802.11-based hotspots can be improved by up to 195% per-cell and 70% overall.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"23 1","pages":"1562-1572 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85918766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
On-line search for mobile users 移动用户在线搜索
Z. Naor
The problem of searching for mobile users in cellular networks is addressed in this study. Previous studies addressing this issue have focused on the problem of searching for a single user. The underlying assumption for this approach is that some straightforward strategy of searching for multiple users can be easily derived from a single user search strategy. Unfortunately, this assumption is violated very often in practice. As it is shown in this study, the problem of maximizing the expected rate of successful searches under delay and bandwidth constraints is NP-hard. Given the conditions that each search for a single user must be over during a pre-defined time period, and that the bandwidth available for search operations is bounded from above by a pre-defined constant, when the potential locations of different users overlap, the derivation of an optimal concurrent search for many independent users from a set of optimal single user searches is NP-hard. Unfortunately, very often the potential locations of different users overlap. In reality, a cellular network has to serve many competing search requests sharing a limited bandwidth. Since the problem of maximizing the expected rate of successful searches under delay and bandwidth constraints is NP-hard, this study proposes an approximation algorithm, that is optimal for most probable cases, and nearly optimal for the worst case condition. Even under the worst case condition, the proposed method can potentially increase the expected rate of successful searches by 100%. Moreover, the proposed search strategy outperforms a greedy search strategy, that considers only the users' location probabilities and ignores their deadline constraints. Under certain conditions, the expected rate of successful searches generated by the proposed method is twice the equivalent rate generated by the greedy search strategy. In addition, the proposed search strategy outperforms a heuristic algorithm that searches around the user last known location.
本研究解决了蜂窝网络中移动用户的搜索问题。先前解决这个问题的研究主要集中在搜索单个用户的问题上。这种方法的基本假设是,可以很容易地从单个用户搜索策略派生出搜索多个用户的直接策略。不幸的是,这个假设在实践中经常被违背。正如本研究所示,在延迟和带宽约束下最大化期望成功搜索率的问题是np困难的。考虑到对单个用户的每次搜索必须在预定义的时间段内结束,并且搜索操作的可用带宽由预定义的常数限定,当不同用户的潜在位置重叠时,从一组最优单个用户搜索中推导出对许多独立用户的最优并发搜索是np困难的。不幸的是,不同用户的潜在位置经常重叠。实际上,蜂窝网络必须为共享有限带宽的许多相互竞争的搜索请求提供服务。由于在延迟和带宽约束下最大化期望成功搜索率的问题是np困难的,因此本研究提出了一种近似算法,该算法对大多数可能情况是最优的,对最坏情况是接近最优的。即使在最坏的情况下,所提出的方法也可以潜在地将预期的成功搜索率提高100%。此外,所提出的搜索策略优于贪婪搜索策略,贪婪搜索策略只考虑用户的位置概率,而忽略用户的截止日期约束。在一定条件下,该方法产生的期望成功搜索率是贪婪搜索策略产生的等效成功率的两倍。此外,所提出的搜索策略优于围绕用户最后已知位置搜索的启发式算法。
{"title":"On-line search for mobile users","authors":"Z. Naor","doi":"10.1109/INFCOM.2005.1498345","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498345","url":null,"abstract":"The problem of searching for mobile users in cellular networks is addressed in this study. Previous studies addressing this issue have focused on the problem of searching for a single user. The underlying assumption for this approach is that some straightforward strategy of searching for multiple users can be easily derived from a single user search strategy. Unfortunately, this assumption is violated very often in practice. As it is shown in this study, the problem of maximizing the expected rate of successful searches under delay and bandwidth constraints is NP-hard. Given the conditions that each search for a single user must be over during a pre-defined time period, and that the bandwidth available for search operations is bounded from above by a pre-defined constant, when the potential locations of different users overlap, the derivation of an optimal concurrent search for many independent users from a set of optimal single user searches is NP-hard. Unfortunately, very often the potential locations of different users overlap. In reality, a cellular network has to serve many competing search requests sharing a limited bandwidth. Since the problem of maximizing the expected rate of successful searches under delay and bandwidth constraints is NP-hard, this study proposes an approximation algorithm, that is optimal for most probable cases, and nearly optimal for the worst case condition. Even under the worst case condition, the proposed method can potentially increase the expected rate of successful searches by 100%. Moreover, the proposed search strategy outperforms a greedy search strategy, that considers only the users' location probabilities and ignores their deadline constraints. Under certain conditions, the expected rate of successful searches generated by the proposed method is twice the equivalent rate generated by the greedy search strategy. In addition, the proposed search strategy outperforms a heuristic algorithm that searches around the user last known location.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"125 1","pages":"1186-1195 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85401582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of network puzzles 网络拼图的设计与实现
W. Feng, E. Kaiser, Wu-chi Feng, A. Luu
Client puzzles have been proposed in a number of protocols as a mechanism for mitigating the effects of distributed denial of service (DDoS) attacks. In order to provide protection against simultaneous attacks across a wide range of applications and protocols, however, such puzzles must be placed at a layer common to all of them; the network layer. Placing puzzles at the IP layer fundamentally changes the service paradigm of the Internet, allowing any device within the network to push load back onto those it is servicing. An advantage of network layer puzzles over previous puzzle mechanisms is that they can be applied to all traffic from malicious clients, making it possible to defend against arbitrary attacks as well as making previously voluntary mechanisms mandatory. In this paper, we outline goals which must be met for puzzles to be deployed effectively at the network layer. We then describe the design, implementation, and evaluation of a system that meets these goals by supporting efficient, fine-grained control of puzzles at the network layer. In particular, we describe modifications to existing puzzle protocols that allow them to work at the network layer, a hint-based hash-reversal puzzle that allows for the generation and verification of fine-grained puzzles at line speed in the fast path of high-speed routers, and an iptables implementation that supports transparent deployment at arbitrary locations in the network.
客户端谜题已经在许多协议中提出,作为一种减轻分布式拒绝服务(DDoS)攻击影响的机制。然而,为了提供针对跨广泛应用程序和协议的同时攻击的保护,这些谜题必须放置在所有这些应用程序和协议共同的层上;网络层。在IP层放置谜题从根本上改变了Internet的服务范式,允许网络中的任何设备将负载推回到它所服务的设备上。与以前的谜题机制相比,网络层谜题的一个优点是,它们可以应用于来自恶意客户端的所有流量,从而可以防御任意攻击,并使以前的自愿机制成为强制性的。在本文中,我们概述了谜题在网络层有效部署必须满足的目标。然后,我们描述了一个系统的设计、实现和评估,该系统通过在网络层支持对谜题的有效、细粒度控制来满足这些目标。特别是,我们描述了对现有谜题协议的修改,允许它们在网络层工作,基于提示的哈希反转谜题,允许在高速路由器的快速路径中以线速生成和验证细粒度谜题,以及支持在网络中任意位置透明部署的iptables实现。
{"title":"Design and implementation of network puzzles","authors":"W. Feng, E. Kaiser, Wu-chi Feng, A. Luu","doi":"10.1109/INFCOM.2005.1498523","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498523","url":null,"abstract":"Client puzzles have been proposed in a number of protocols as a mechanism for mitigating the effects of distributed denial of service (DDoS) attacks. In order to provide protection against simultaneous attacks across a wide range of applications and protocols, however, such puzzles must be placed at a layer common to all of them; the network layer. Placing puzzles at the IP layer fundamentally changes the service paradigm of the Internet, allowing any device within the network to push load back onto those it is servicing. An advantage of network layer puzzles over previous puzzle mechanisms is that they can be applied to all traffic from malicious clients, making it possible to defend against arbitrary attacks as well as making previously voluntary mechanisms mandatory. In this paper, we outline goals which must be met for puzzles to be deployed effectively at the network layer. We then describe the design, implementation, and evaluation of a system that meets these goals by supporting efficient, fine-grained control of puzzles at the network layer. In particular, we describe modifications to existing puzzle protocols that allow them to work at the network layer, a hint-based hash-reversal puzzle that allows for the generation and verification of fine-grained puzzles at line speed in the fast path of high-speed routers, and an iptables implementation that supports transparent deployment at arbitrary locations in the network.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"63 1","pages":"2372-2382 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90265475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
Reduction of quality (RoQ) attacks on Internet end-systems 减少对互联网终端系统的质量攻击
Mina Guirguis, Azer Bestavros, I. Matta, Y. Zhang
Current computing systems depend on adaptation mechanisms to ensure that they remain in quiescent operating regions. These regions are often defined using efficiency, fairness, and stability properties. To that end, traditional research works in scalable server architectures and protocols have focused on promoting these properties by proposing even more sophisticated adaptation mechanisms, without the proper attention to security implications. In this paper, we exemplify such security implications by exposing the vulnerabilities of admission control mechanisms that are widely deployed in Internet end systems to reduction of quality (RoQ) attacks. RoQ attacks target the transients of a system's adaptive behavior as opposed to its limited steady-state capacity. We show that a well orchestrated RoQ attack on an end-system admission control policy could introduce significant inefficiencies that could potentially deprive an Internet end-system from much of its capacity, or significantly reduce its service quality, while evading detection by consuming an unsuspicious, small fraction of that system's hijacked capacity. We develop a control theoretic model for assessing the impact of RoQ attacks on an end-system's admission controller. We quantify the damage inflicted by an attacker through deriving appropriate metrics. We validate our findings through real Internet experiments performed in our lab.
当前的计算系统依赖于自适应机制来确保它们保持在静态操作区域。这些区域通常使用效率、公平性和稳定性属性来定义。为此,在可扩展服务器架构和协议方面的传统研究工作主要集中在通过提出更复杂的适应机制来促进这些特性,而没有适当地关注安全含义。在本文中,我们通过暴露广泛部署在互联网终端系统中的准入控制机制的漏洞来减少质量(RoQ)攻击,从而举例说明了这种安全含义。RoQ攻击的目标是系统自适应行为的瞬态,而不是其有限的稳态容量。我们表明,对终端系统准入控制策略的精心策划的RoQ攻击可能会引入显著的低效率,这可能会潜在地剥夺互联网终端系统的大部分容量,或显着降低其服务质量,同时通过消耗该系统被劫持容量的一小部分而逃避检测。我们开发了一个控制理论模型来评估RoQ攻击对终端系统接纳控制器的影响。我们通过推导适当的度量来量化攻击者造成的损害。我们通过在实验室进行的真实互联网实验验证了我们的发现。
{"title":"Reduction of quality (RoQ) attacks on Internet end-systems","authors":"Mina Guirguis, Azer Bestavros, I. Matta, Y. Zhang","doi":"10.1109/INFCOM.2005.1498361","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498361","url":null,"abstract":"Current computing systems depend on adaptation mechanisms to ensure that they remain in quiescent operating regions. These regions are often defined using efficiency, fairness, and stability properties. To that end, traditional research works in scalable server architectures and protocols have focused on promoting these properties by proposing even more sophisticated adaptation mechanisms, without the proper attention to security implications. In this paper, we exemplify such security implications by exposing the vulnerabilities of admission control mechanisms that are widely deployed in Internet end systems to reduction of quality (RoQ) attacks. RoQ attacks target the transients of a system's adaptive behavior as opposed to its limited steady-state capacity. We show that a well orchestrated RoQ attack on an end-system admission control policy could introduce significant inefficiencies that could potentially deprive an Internet end-system from much of its capacity, or significantly reduce its service quality, while evading detection by consuming an unsuspicious, small fraction of that system's hijacked capacity. We develop a control theoretic model for assessing the impact of RoQ attacks on an end-system's admission controller. We quantify the damage inflicted by an attacker through deriving appropriate metrics. We validate our findings through real Internet experiments performed in our lab.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"42 1","pages":"1362-1372 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76832149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 147
Performance analysis and stochastic stability of congestion control protocols 拥塞控制协议的性能分析与随机稳定性
E. Altman, Konstantin Avrachenkov, A. Kherani, B. Prabhu
We study an adaptive window protocol (AWP) with a general increase and decrease profile in the presence of window dependent random losses. We derive a steady-state Kolmogorov equation and obtain its solution in analytic form. We obtain some stochastic ordering relations for a protocol with different bounds on window. A closed form necessary and sufficient stability condition using the stochastic ordering for the window process is established. Finally, we apply the general results to particular TCP versions such as NEW Reno TCP, scalable TCP and Highspeed TCP. We observe that Highspeed TCP can be used to approximate almost any kind of window behavior by varying only one design parameter.
我们研究了一种自适应窗口协议(AWP),该协议在存在窗口相关随机损失的情况下具有一般的增减特征。导出了一个稳态Kolmogorov方程,并得到了它的解析解。得到了具有不同窗口界的协议的一些随机序关系。利用随机排序建立了窗口过程的封闭形式的充分必要稳定条件。最后,我们将一般结果应用于特定的TCP版本,如NEW Reno TCP、可扩展TCP和高速TCP。我们观察到高速TCP可以通过改变一个设计参数来近似几乎任何类型的窗口行为。
{"title":"Performance analysis and stochastic stability of congestion control protocols","authors":"E. Altman, Konstantin Avrachenkov, A. Kherani, B. Prabhu","doi":"10.1109/INFCOM.2005.1498357","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498357","url":null,"abstract":"We study an adaptive window protocol (AWP) with a general increase and decrease profile in the presence of window dependent random losses. We derive a steady-state Kolmogorov equation and obtain its solution in analytic form. We obtain some stochastic ordering relations for a protocol with different bounds on window. A closed form necessary and sufficient stability condition using the stochastic ordering for the window process is established. Finally, we apply the general results to particular TCP versions such as NEW Reno TCP, scalable TCP and Highspeed TCP. We observe that Highspeed TCP can be used to approximate almost any kind of window behavior by varying only one design parameter.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"17 1","pages":"1316-1327 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79741292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
On physical carrier sensing in wireless ad hoc networks 无线自组织网络中的物理载波感知
Xue Yang, N. Vaidya
The aggregate throughput of a wireless ad hoc network depends on the channel capacity, channel utilization (i.e., the fraction of channel capacity used for generating good put), and the concurrent transmissions allowed in the network. While channel utilization is determined by MAC overhead, physical carrier sense has been used as an effective way to avoid interference and exploit spatial reuse. Prior research has attempted to identify the optimal carrier sense range that can maximize the aggregate throughput. However, the impact of MAC overhead has been ignored. In this paper, we use both an analytical model and simulation results to show that MAC overhead has significant impact on the choice of optimal carrier sense range. If MAC overhead is not taken into account properly in determining the optimal carrier sense range, the aggregate throughput can suffer a significant loss.
无线自组织网络的总吞吐量取决于信道容量、信道利用率(即,用于生成良好消息的信道容量的百分比)和网络中允许的并发传输。信道利用率由MAC开销决定,物理载波感知是避免干扰和利用空间复用的有效方法。先前的研究试图找出能使总吞吐量最大化的最佳载波检测范围。然而,MAC开销的影响被忽略了。本文利用分析模型和仿真结果表明,MAC开销对最优载波探测范围的选择有显著影响。如果在确定最佳载波检测范围时没有适当考虑MAC开销,则总吞吐量可能会遭受重大损失。
{"title":"On physical carrier sensing in wireless ad hoc networks","authors":"Xue Yang, N. Vaidya","doi":"10.1109/INFCOM.2005.1498537","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498537","url":null,"abstract":"The aggregate throughput of a wireless ad hoc network depends on the channel capacity, channel utilization (i.e., the fraction of channel capacity used for generating good put), and the concurrent transmissions allowed in the network. While channel utilization is determined by MAC overhead, physical carrier sense has been used as an effective way to avoid interference and exploit spatial reuse. Prior research has attempted to identify the optimal carrier sense range that can maximize the aggregate throughput. However, the impact of MAC overhead has been ignored. In this paper, we use both an analytical model and simulation results to show that MAC overhead has significant impact on the choice of optimal carrier sense range. If MAC overhead is not taken into account properly in determining the optimal carrier sense range, the aggregate throughput can suffer a significant loss.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"16 1","pages":"2525-2535 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84441965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 237
An implementation and experimental study of the explicit control protocol (XCP) 显式控制协议(XCP)的实现与实验研究
Yongguang Zhang, T. Henderson
The explicit control protocol (XCP) has been proposed as a multi-level network feedback mechanism for congestion control of Internet transport protocols. Theoretical and simulation results have suggested that the protocol is stable and efficient over high bandwidth-delay product paths, while being more scalable to deploy than mechanisms that require per-flow state in routers. However, there is little operational experience with the approach. Since the deployment of XCP would require changes to both the end hosts and routers, it is important to study the implications of this new architecture before advocating such wide scale changes to Internets. This paper presents the results of an experimental study of XCP. We first implemented XCP in the Linux kernel and solved various systems issues. After validating previously reported simulation results, we studied the sensitivity of XCP's performance to various environmental factors, and discovered issues with TCP/IP configuration, capacity misestimation due to link sharing, handling of non-congestion losses, and the partial deployment of XCP queues in the network. These sensitivities can significantly reduce XCP's ability to control congestion and achieve fairness. Our contributions are twofold. First, through implementation we have revealed the challenges in platforms that lack large native data types or floating point arithmetic, and the need to keep fractions in the XCP protocol header. Second, through experiment and analysis we have identified several possibilities for XCP to enter into incorrect feedback control loops and adversely affect the performance. The challenges identified are deployment challenges intrinsic to the XCP design, and they suggest that the current proposal requires additional development and extension.
显式控制协议(XCP)作为一种多级网络反馈机制,被提出用于互联网传输协议的拥塞控制。理论和仿真结果表明,该协议在高带宽延迟产品路径上是稳定和高效的,同时比路由器中需要逐流状态的机制更具可扩展性。然而,这种方法的操作经验很少。由于XCP的部署需要对终端主机和路由器进行更改,因此在提倡对internet进行如此大规模的更改之前,研究这种新体系结构的含义是很重要的。本文介绍了XCP的实验研究结果。我们首先在Linux内核中实现XCP,并解决了各种系统问题。在验证了先前报告的仿真结果之后,我们研究了XCP的性能对各种环境因素的敏感性,并发现了TCP/IP配置、由于链路共享导致的容量错误估计、处理非拥塞损失以及XCP队列在网络中的部分部署等问题。这些敏感性会大大降低XCP控制拥塞和实现公平性的能力。我们的贡献是双重的。首先,通过实现,我们揭示了缺乏大型原生数据类型或浮点运算的平台所面临的挑战,以及在XCP协议头中保留分数的需要。其次,通过实验和分析,我们确定了XCP进入不正确的反馈控制回路并对性能产生不利影响的几种可能性。所确定的挑战是XCP设计固有的部署挑战,它们表明当前提案需要额外的开发和扩展。
{"title":"An implementation and experimental study of the explicit control protocol (XCP)","authors":"Yongguang Zhang, T. Henderson","doi":"10.1109/INFCOM.2005.1498332","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498332","url":null,"abstract":"The explicit control protocol (XCP) has been proposed as a multi-level network feedback mechanism for congestion control of Internet transport protocols. Theoretical and simulation results have suggested that the protocol is stable and efficient over high bandwidth-delay product paths, while being more scalable to deploy than mechanisms that require per-flow state in routers. However, there is little operational experience with the approach. Since the deployment of XCP would require changes to both the end hosts and routers, it is important to study the implications of this new architecture before advocating such wide scale changes to Internets. This paper presents the results of an experimental study of XCP. We first implemented XCP in the Linux kernel and solved various systems issues. After validating previously reported simulation results, we studied the sensitivity of XCP's performance to various environmental factors, and discovered issues with TCP/IP configuration, capacity misestimation due to link sharing, handling of non-congestion losses, and the partial deployment of XCP queues in the network. These sensitivities can significantly reduce XCP's ability to control congestion and achieve fairness. Our contributions are twofold. First, through implementation we have revealed the challenges in platforms that lack large native data types or floating point arithmetic, and the need to keep fractions in the XCP protocol header. Second, through experiment and analysis we have identified several possibilities for XCP to enter into incorrect feedback control loops and adversely affect the performance. The challenges identified are deployment challenges intrinsic to the XCP design, and they suggest that the current proposal requires additional development and extension.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"58 1","pages":"1037-1048 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77213735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
期刊
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1