首页 > 最新文献

2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)最新文献

英文 中文
Internet Routing with Auto-Assigned Addresses 具有自动分配地址的因特网路由
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998334
N. Shenoy, Shreyas Madapura Chandraiah, P. Willis
Key challenges faced in the Internet today can be enumerated as follows: (1) complex route discovery mechanisms (2) latency and instability during link or device failure recovery (3) inadequacy in extending routing and addressing to limited domains, (4) complex interworking of multiple routing protocols at border routers. Routing table sizes increase with increasing number of networks indicating a scalability issue. One approach to address this spiraling complexity and performance challenges is to start fresh and re-think Internet routing and addressing. The Expedited Internet Bypass protocol (EIBP) is such a clean slate approach. In the interim, EIBP works in parallel with IP and has no dependency on layer 3 protocols. We demonstrated EIBP for routing and forwarding in an Autonomous system (AS) in our earlier work. In this article, we demonstrate EIBP for inter-AS routing. We compare EIBP's inter-AS operations and performance to Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP) deployed in an intra-AS, inter-AS communications scenario with two AS.
当今互联网面临的主要挑战可以列举如下:(1)复杂的路由发现机制;(2)链路或设备故障恢复期间的延迟和不稳定性;(3)扩展路由和寻址到有限域的能力不足;(4)边界路由器上多种路由协议的复杂互连。路由表的大小随着网络数量的增加而增加,这表明存在可伸缩性问题。解决这种不断上升的复杂性和性能挑战的一种方法是重新开始并重新考虑Internet路由和寻址。快速互联网旁路协议(EIBP)就是这样一种全新的方法。在此期间,EIBP与IP并行工作,不依赖于第三层协议。我们在前面的工作中演示了用于自治系统(AS)中的路由和转发的EIBP。在本文中,我们将演示用于as间路由的EIBP。我们将EIBP的AS间操作和性能与部署在具有两个AS的AS内、AS间通信场景中的开放最短路径优先(OSPF)和边界网关协议(BGP)进行了比较。
{"title":"Internet Routing with Auto-Assigned Addresses","authors":"N. Shenoy, Shreyas Madapura Chandraiah, P. Willis","doi":"10.1109/ITNAC55475.2022.9998334","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998334","url":null,"abstract":"Key challenges faced in the Internet today can be enumerated as follows: (1) complex route discovery mechanisms (2) latency and instability during link or device failure recovery (3) inadequacy in extending routing and addressing to limited domains, (4) complex interworking of multiple routing protocols at border routers. Routing table sizes increase with increasing number of networks indicating a scalability issue. One approach to address this spiraling complexity and performance challenges is to start fresh and re-think Internet routing and addressing. The Expedited Internet Bypass protocol (EIBP) is such a clean slate approach. In the interim, EIBP works in parallel with IP and has no dependency on layer 3 protocols. We demonstrated EIBP for routing and forwarding in an Autonomous system (AS) in our earlier work. In this article, we demonstrate EIBP for inter-AS routing. We compare EIBP's inter-AS operations and performance to Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP) deployed in an intra-AS, inter-AS communications scenario with two AS.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133702859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimizing Energy Loss Decisions for Green Driving Platoon 最小化绿色驾驶排的能量损失决策
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998351
Zhiru Gu, Zhongwei Liu, Ziji Ma, Feilong Wang, Xiaogang Zhang
This paper presents the application of reinforcement learning (RL) in the vehicle communication simulation framework (Veins). Reinforcement learning methods for energy saving and greening in the field of autonomous driving have rarely been studied. Under a CACC platoon of green environmental protection, we investigate the use of reinforcement learning algorithms to train the behavior of member vehicles in the event of a serious collision in the front vehicle, so that platoon members can minimize collision damage and energy consumption from behavior which is not in line with the green theme. In terms of energy consumption metrics, the gradient policy algorithm has good convergence in computing the energy consumption problem. It is a feasible training decision planning algorithm for solving the minimization of energy consumption caused by decision behavior in platoon avoidance behavior.
本文介绍了强化学习(RL)在车辆通信仿真框架(vein)中的应用。在自动驾驶领域,针对节能和绿化的强化学习方法研究较少。在绿色环保的CACC组队中,我们研究了使用强化学习算法来训练组队车辆在前车发生严重碰撞时的行为,使组队车辆在不符合绿色主题的行为下最大限度地减少碰撞损伤和能量消耗。在能耗指标方面,梯度策略算法在计算能耗问题方面具有较好的收敛性。它是一种可行的训练决策规划算法,用于解决排回避行为中决策行为导致的能量消耗最小化问题。
{"title":"Minimizing Energy Loss Decisions for Green Driving Platoon","authors":"Zhiru Gu, Zhongwei Liu, Ziji Ma, Feilong Wang, Xiaogang Zhang","doi":"10.1109/ITNAC55475.2022.9998351","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998351","url":null,"abstract":"This paper presents the application of reinforcement learning (RL) in the vehicle communication simulation framework (Veins). Reinforcement learning methods for energy saving and greening in the field of autonomous driving have rarely been studied. Under a CACC platoon of green environmental protection, we investigate the use of reinforcement learning algorithms to train the behavior of member vehicles in the event of a serious collision in the front vehicle, so that platoon members can minimize collision damage and energy consumption from behavior which is not in line with the green theme. In terms of energy consumption metrics, the gradient policy algorithm has good convergence in computing the energy consumption problem. It is a feasible training decision planning algorithm for solving the minimization of energy consumption caused by decision behavior in platoon avoidance behavior.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134307878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TDMA Slot Allocation for UAV Formations: Minimum Superframe Lengths for Two-Dimensional Equidistant Deployments 无人机编队TDMA时隙分配:二维等距部署的最小超帧长度
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998414
Amelia Samandari, A. Willig
This paper looks at the case of mitigating col-lisions between Unmanned Aerial Vehicles (UAVs) in a formation through the use of safety beacons to relay information about UAVs that are at risk of collision due to their geographic proximity to one another. The UAVs send these safety beacons using time division multiple access (TDMA). With TDMA, UAVs can achieve collision-free transmission, thereby reducing the uncertainty of the UAVs in the formation receiving the necessary safety information. In this paper, we provide a system model for a specific regular deployment and a spatial reuse scheme for allocating UAVs to a TDMA slot that operates as follows: the regular, two-dimensional UAV deployment is partitioned into a hexagonal tiling, where all UAVs in the same tile are allocated to different TDMA slots and all UAVs in the same position in their respective tiles are allocated to the same TDMA slot. Through spatial reuse of TDMA slots, theoretical results demonstrate that our scheme can support large formations with a bounded transmission period (i.e. a bounded superframe length). We also ascertain a safety margin factor for the transmit power that can be applied to moderate the effects of interference from multiple UAVs transmitting in the same time slot.
本文研究了通过使用安全信标来传递由于地理位置接近而有碰撞风险的无人机的信息,从而减轻编队中无人机(uav)之间碰撞的情况。无人机使用时分多址(TDMA)发送这些安全信标。利用时分多址技术,无人机可以实现无碰撞传输,从而减少编队中无人机接收必要安全信息的不确定性。在本文中,我们提供了一个特定规则部署的系统模型和一个分配无人机到TDMA插槽的空间重用方案,该方案的操作如下:将规则的二维无人机部署划分为六角形块,其中同一块中的所有无人机分配到不同的TDMA插槽,在各自块中相同位置的所有无人机分配到相同的TDMA插槽。通过对TDMA时隙的空间复用,理论结果表明该方案可以支持有界传输周期(即有界超帧长度)的大编队。我们还确定了发射功率的安全裕度系数,该系数可用于缓和多架无人机在同一时隙发射的干扰影响。
{"title":"TDMA Slot Allocation for UAV Formations: Minimum Superframe Lengths for Two-Dimensional Equidistant Deployments","authors":"Amelia Samandari, A. Willig","doi":"10.1109/ITNAC55475.2022.9998414","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998414","url":null,"abstract":"This paper looks at the case of mitigating col-lisions between Unmanned Aerial Vehicles (UAVs) in a formation through the use of safety beacons to relay information about UAVs that are at risk of collision due to their geographic proximity to one another. The UAVs send these safety beacons using time division multiple access (TDMA). With TDMA, UAVs can achieve collision-free transmission, thereby reducing the uncertainty of the UAVs in the formation receiving the necessary safety information. In this paper, we provide a system model for a specific regular deployment and a spatial reuse scheme for allocating UAVs to a TDMA slot that operates as follows: the regular, two-dimensional UAV deployment is partitioned into a hexagonal tiling, where all UAVs in the same tile are allocated to different TDMA slots and all UAVs in the same position in their respective tiles are allocated to the same TDMA slot. Through spatial reuse of TDMA slots, theoretical results demonstrate that our scheme can support large formations with a bounded transmission period (i.e. a bounded superframe length). We also ascertain a safety margin factor for the transmit power that can be applied to moderate the effects of interference from multiple UAVs transmitting in the same time slot.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of the IEEE 802.11 DCF for Wireless Seismic Data Acquisition Networks 无线地震数据采集网络的IEEE 802.11 DCF分析
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998354
Aliyu Makama, K. Kuladinithi, A. Timm‐Giel
Owing to the nature of traffic and architecture of Wireless Seismic Data Acquisition (WSDA) networks also referred to as Wireless Geophone Networks (WGN), we propose a model that analytically investigates the performance of IEEE 802.11 protocol for single-hop ad hoc WGNs under unsaturated traffic and non-ideal channel conditions. Although several IEEE 802.11 models have been presented in literature, some inaccuracies exist with respect to modeling IEEE 802.11-based WGNs. Our model focuses primarily on singling out the inaccuracies in modeling the backoff procedure and packet drop probability as some of the deviance with the existing literature. Expressions for MAC delay, throughput, collision probability, and average duration a node spends during the backoff procedure before decrementing its counter were proposed. Furthermore, the model investigates an optimal number of geophones that could be supported within a subnetwork based on the proposed WGN architecture in [16]. The model was evaluated analytically in MATLAB and validated using simulation in OMNeT++ discrete event simulator.
由于无线地震数据采集(WSDA)网络(也称为无线检波器网络(WGN))的业务性质和架构,我们提出了一个模型来分析研究IEEE 802.11协议在不饱和业务和非理想信道条件下单跳自组网WGN的性能。尽管文献中已经提出了几种IEEE 802.11模型,但在对基于IEEE 802.11的WGNs建模方面存在一些不准确性。我们的模型主要侧重于挑出后退过程和丢包概率建模中的不准确性,作为与现有文献的一些偏差。提出了MAC延迟、吞吐量、碰撞概率和节点在退避过程中减少计数器前花费的平均持续时间的表达式。此外,该模型还研究了b[16]中基于所提出的WGN架构的子网内可支持的检波器的最佳数量。在MATLAB中对模型进行了分析评估,并在omnet++离散事件模拟器中进行了仿真验证。
{"title":"Analysis of the IEEE 802.11 DCF for Wireless Seismic Data Acquisition Networks","authors":"Aliyu Makama, K. Kuladinithi, A. Timm‐Giel","doi":"10.1109/ITNAC55475.2022.9998354","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998354","url":null,"abstract":"Owing to the nature of traffic and architecture of Wireless Seismic Data Acquisition (WSDA) networks also referred to as Wireless Geophone Networks (WGN), we propose a model that analytically investigates the performance of IEEE 802.11 protocol for single-hop ad hoc WGNs under unsaturated traffic and non-ideal channel conditions. Although several IEEE 802.11 models have been presented in literature, some inaccuracies exist with respect to modeling IEEE 802.11-based WGNs. Our model focuses primarily on singling out the inaccuracies in modeling the backoff procedure and packet drop probability as some of the deviance with the existing literature. Expressions for MAC delay, throughput, collision probability, and average duration a node spends during the backoff procedure before decrementing its counter were proposed. Furthermore, the model investigates an optimal number of geophones that could be supported within a subnetwork based on the proposed WGN architecture in [16]. The model was evaluated analytically in MATLAB and validated using simulation in OMNeT++ discrete event simulator.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Migration Strategy from C-Band Elastic Optical Network to C+L Multiband Optical Network C波段弹性光网络向C+L多波段光网络迁移策略
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998374
S. Hosseini, R. J. D. Barroso, I. de Miguel, Ó. G. De Dios, N. Merayo, J. Aguado, Edward Echeverry, P. Fernández, R. Lorenzo, E. Abril
Multi-band elastic optical network (MB-EON) is a promising technology to extend the bandwidth of the current elastic optical networks in the middle term. The migration from current networks to MB-EONs should be made carefully taking into account both the required cost and the bandwidth requirements. This paper focuses on the necessity of looking for a trade-off between the links to be upgraded during the migration from the standard C-band to the L-band and the acceptable level of capacity increase. Therefore, it makes two contributions to efficiently upgrade current elastic optical networks: firstly, a planning method to decide which fibers should be upgraded to exploit C+L band; and second, one heuristic for solving the routing, band, modulation level, and spectrum assignment (RBMLSA) problem during network operation. Simulation results demonstrate that, thanks to use of these proposals, the upgrade of a set of the fibers could be viewed as a fully convincing middle term solution by the network operators to get around the huge cost of the whole network migration to C+L line system.
多波段弹性光网络(MB-EON)是目前弹性光网络带宽的中期扩展技术。从当前网络迁移到mb - eon时,应仔细考虑所需的成本和带宽要求。本文重点讨论了在从标准c波段向l波段迁移过程中,在需要升级的链路和可接受的容量增加水平之间寻找权衡的必要性。因此,该研究为当前弹性光网络的有效升级做出了两方面的贡献:一是提出了一种规划方法,确定哪些光纤需要升级以利用C+L频段;第二,一种启发式方法用于解决网络运行中的路由、频带、调制水平和频谱分配(RBMLSA)问题。仿真结果表明,由于采用了这些建议,网络运营商可以将一组光纤的升级视为一个完全令人信服的中期解决方案,以避免全网迁移到C+L线路系统的巨大成本。
{"title":"Migration Strategy from C-Band Elastic Optical Network to C+L Multiband Optical Network","authors":"S. Hosseini, R. J. D. Barroso, I. de Miguel, Ó. G. De Dios, N. Merayo, J. Aguado, Edward Echeverry, P. Fernández, R. Lorenzo, E. Abril","doi":"10.1109/ITNAC55475.2022.9998374","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998374","url":null,"abstract":"Multi-band elastic optical network (MB-EON) is a promising technology to extend the bandwidth of the current elastic optical networks in the middle term. The migration from current networks to MB-EONs should be made carefully taking into account both the required cost and the bandwidth requirements. This paper focuses on the necessity of looking for a trade-off between the links to be upgraded during the migration from the standard C-band to the L-band and the acceptable level of capacity increase. Therefore, it makes two contributions to efficiently upgrade current elastic optical networks: firstly, a planning method to decide which fibers should be upgraded to exploit C+L band; and second, one heuristic for solving the routing, band, modulation level, and spectrum assignment (RBMLSA) problem during network operation. Simulation results demonstrate that, thanks to use of these proposals, the upgrade of a set of the fibers could be viewed as a fully convincing middle term solution by the network operators to get around the huge cost of the whole network migration to C+L line system.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129239205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of OTFS Modulation over Rician Channels in Airborne Communication Networks 机载通信网络中高信道OTFS调制性能研究
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998395
T. Chu, H. Zepernick, Anders Höök, Alexander Westerhagen, B. Granbom
In this paper, we consider airborne communication networks with directed air data links between high-mobility airborne platforms. Orthogonal time frequency space (OTFS) modulation is used to overcome the effects of the high Doppler shifts induced by the high relative speeds among airborne platforms which can be in excess of 1200 m/s. The performance of the considered system is assessed using the Rician channel to model the directed air data links accounting for the ratio of the signal power in the line-of-sight path to the signal power in the scattered paths. The numerical results reveal significant bit error rate (BER) improvements with increased Rician K-factor, illustrate the trade-offs between BER and bits per symbol offered by different modulation schemes, and show the independence of the BER from the relative speeds among airborne platforms. Further, it is shown that the BER of a single path directed air data link approaches that of a two-ray channel for a sufficiently large Rician K-factor.
在本文中,我们考虑了高机动性机载平台之间具有定向空中数据链路的机载通信网络。采用正交时频空间(OTFS)调制,克服了机载平台间相对速度超过1200m /s的高多普勒频移的影响。考虑系统的性能,使用专家信道对定向空气数据链进行建模,考虑视距路径中的信号功率与散射路径中的信号功率之比。数值结果表明,误码率(BER)随k系数的增加而显著提高,说明了不同调制方案所提供的误码率和每码位之间的权衡,并表明误码率与机载平台之间的相对速度无关。此外,研究表明,对于足够大的医师k因子,单路径定向空中数据链的误码率接近双射线通道的误码率。
{"title":"Performance of OTFS Modulation over Rician Channels in Airborne Communication Networks","authors":"T. Chu, H. Zepernick, Anders Höök, Alexander Westerhagen, B. Granbom","doi":"10.1109/ITNAC55475.2022.9998395","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998395","url":null,"abstract":"In this paper, we consider airborne communication networks with directed air data links between high-mobility airborne platforms. Orthogonal time frequency space (OTFS) modulation is used to overcome the effects of the high Doppler shifts induced by the high relative speeds among airborne platforms which can be in excess of 1200 m/s. The performance of the considered system is assessed using the Rician channel to model the directed air data links accounting for the ratio of the signal power in the line-of-sight path to the signal power in the scattered paths. The numerical results reveal significant bit error rate (BER) improvements with increased Rician K-factor, illustrate the trade-offs between BER and bits per symbol offered by different modulation schemes, and show the independence of the BER from the relative speeds among airborne platforms. Further, it is shown that the BER of a single path directed air data link approaches that of a two-ray channel for a sufficiently large Rician K-factor.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128187207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Auxiliary Factor Method for Nyquist Filters with Reduced Complexity and Delay 降低复杂度和延迟的奈奎斯特滤波器辅助因子法
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998372
Zijian Zhou, Dongsheng Zheng, Lifeng Lin, B. Jiao
The Nyquist first condition promises data transmission without intersymbol interference (ISI). However, the implementation using any finite impulse response (FIR) filter cannot get rid of the ISI completely because the window's length truncates the Fourier transform, thus, preventing calculations from reaching the intended approximation in the frequency domain. Our previous work introduced an auxiliary factor (AF) method that uses the AFs to compensate the truncated Fourier transform and eliminates the ISI in practice. In this paper, we propose a decomposition solution to further reduce the computational complexity and system delay caused by the AF method. In consequence, an efficient algorithm is exploited to calculate the AFs and numerical results confirm the effectiveness of the proposed solution.
奈奎斯特第一条件保证数据传输无码间干扰(ISI)。然而,使用任何有限脉冲响应(FIR)滤波器的实现都不能完全消除ISI,因为窗口的长度会截断傅里叶变换,从而阻止计算在频域中达到预期的近似。我们之前的工作介绍了一种辅助因子(AF)方法,该方法使用AF来补偿截断的傅里叶变换并在实践中消除ISI。在本文中,我们提出了一种分解方案,以进一步降低AF方法带来的计算复杂度和系统延迟。因此,利用一种有效的算法来计算AFs,数值结果证实了该方法的有效性。
{"title":"Auxiliary Factor Method for Nyquist Filters with Reduced Complexity and Delay","authors":"Zijian Zhou, Dongsheng Zheng, Lifeng Lin, B. Jiao","doi":"10.1109/ITNAC55475.2022.9998372","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998372","url":null,"abstract":"The Nyquist first condition promises data transmission without intersymbol interference (ISI). However, the implementation using any finite impulse response (FIR) filter cannot get rid of the ISI completely because the window's length truncates the Fourier transform, thus, preventing calculations from reaching the intended approximation in the frequency domain. Our previous work introduced an auxiliary factor (AF) method that uses the AFs to compensate the truncated Fourier transform and eliminates the ISI in practice. In this paper, we propose a decomposition solution to further reduce the computational complexity and system delay caused by the AF method. In consequence, an efficient algorithm is exploited to calculate the AFs and numerical results confirm the effectiveness of the proposed solution.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116920571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Vehicle-Ranking Approach for Online Virtual Network Embedding in Internet of Vehicles 车联网虚拟网络嵌入的动态车辆排序方法
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998424
Khoa T. D. Nguyen, Wei Shi, M. St-Hilaire
Internet of Vehicles (IoV), a special domain of Internet of Things (IoT), has become an indispensable platform for the success of future intelligent transportation. Virtual Network Embedding (VNE), enabling flexible, cost-effective and on-demand deployments of multiple network service requests on a shared physical infrastructure, has become a technological breakthrough in IoV. Typical VNE problems have been well studied in the data center infrastructure where the physical topology is always static. Recently, researchers have investigated the VNE problem in data center networks while considering IoV demands. However, the VNE problem in IoV environments in which connected moving vehicles serve as substrate nodes to process service requests is still in its infancy. This paper proposes a novel heuristic algorithm for solving the online VNE problem in IoV by efficiently and rapidly ranking available vehicles based upon network attributes, and the knowledge of the preceding mappings. Extensive evaluation results indicate that the proposed solution not only outperforms several existing algorithms, but is also highly practical due to its fast execution time.
车联网(IoV)是物联网(IoT)的一个特殊领域,已成为未来智能交通成功不可或缺的平台。虚拟网络嵌入(VNE)技术能够在共享的物理基础设施上灵活、经济、按需地部署多个网络服务请求,已成为车联网的技术突破。在物理拓扑始终是静态的数据中心基础设施中,典型的VNE问题已经得到了很好的研究。最近,研究人员在考虑物联网需求的同时,对数据中心网络中的VNE问题进行了研究。然而,在物联网环境中,连接的移动车辆作为底层节点来处理服务请求的VNE问题仍处于起步阶段。本文提出了一种基于网络属性和先验映射知识对可用车辆进行高效快速排序的启发式算法,用于解决车联网中的在线VNE问题。大量的评估结果表明,该方案不仅优于现有的几种算法,而且由于其快速的执行时间而具有很高的实用性。
{"title":"A Dynamic Vehicle-Ranking Approach for Online Virtual Network Embedding in Internet of Vehicles","authors":"Khoa T. D. Nguyen, Wei Shi, M. St-Hilaire","doi":"10.1109/ITNAC55475.2022.9998424","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998424","url":null,"abstract":"Internet of Vehicles (IoV), a special domain of Internet of Things (IoT), has become an indispensable platform for the success of future intelligent transportation. Virtual Network Embedding (VNE), enabling flexible, cost-effective and on-demand deployments of multiple network service requests on a shared physical infrastructure, has become a technological breakthrough in IoV. Typical VNE problems have been well studied in the data center infrastructure where the physical topology is always static. Recently, researchers have investigated the VNE problem in data center networks while considering IoV demands. However, the VNE problem in IoV environments in which connected moving vehicles serve as substrate nodes to process service requests is still in its infancy. This paper proposes a novel heuristic algorithm for solving the online VNE problem in IoV by efficiently and rapidly ranking available vehicles based upon network attributes, and the knowledge of the preceding mappings. Extensive evaluation results indicate that the proposed solution not only outperforms several existing algorithms, but is also highly practical due to its fast execution time.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Online VNF Placement with Different Protection Schemes in a MEC Environment MEC环境下不同保护方案的动态在线VNF放置
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998347
Maryam Masoumi, I. de Miguel, R. J. D. Barroso, L. Ruiz, Fabrizio Brasca, Gianluca Rizzi, N. Merayo, J. Aguado, P. Fernández, R. Lorenzo, E. Abril
The Multi-access Edge Computing (MEC) architecture is made up of geographically distributed edge servers so that computing capabilities are provisioned at the network edge, close to the end users. Network Function Virtualization (NFV), when combined with MEC, provides network services in the form of Service Function Chains (SFC) with low latency. In the design of NFV-based 5G networks, the trade-off between the cost of resource deployment and the effective provisioning of services must be considered. In this work, we analyze the impact of having different MEC locations when considering the provision of SFCs in a dynamic scenario (and thus also address VNF placement). In order to deal with infrastructure failures, it is of great importance to employ robust and resilient network strategies. To safeguard SFCs against failures, various protection techniques can be applied. We use two protection methods, namely, dedicated VNF protection and shared VNF protection, under the assumption of single network failures. The operational performances of different approaches are evaluated in terms of blocking ratio and end-to-end delay, both for the whole network and for different services, and we analyze whether it is better to distribute computing servers among a few MEC sites or among a higher number.
多访问边缘计算(MEC)架构由地理上分布的边缘服务器组成,以便在靠近最终用户的网络边缘提供计算能力。NFV (Network Function Virtualization)与MEC技术相结合,以SFC (Service Function Chains)的形式提供低时延的网络服务。在基于nfv的5G网络设计中,必须考虑资源部署成本与业务有效提供之间的权衡。在这项工作中,我们分析了在动态场景中考虑提供sfc时拥有不同MEC位置的影响(从而也解决了VNF的放置问题)。为了处理基础设施故障,采用鲁棒性和弹性的网络策略是非常重要的。为了防止sfc发生故障,可以采用各种保护技术。在单网络故障的假设下,我们采用专用VNF保护和共享VNF保护两种保护方式。从阻塞率和端到端延迟两个方面对不同方法的运行性能进行了评估,无论是对于整个网络还是不同的服务,我们分析了在几个MEC站点之间分配计算服务器更好还是在更多的MEC站点之间更好。
{"title":"Dynamic Online VNF Placement with Different Protection Schemes in a MEC Environment","authors":"Maryam Masoumi, I. de Miguel, R. J. D. Barroso, L. Ruiz, Fabrizio Brasca, Gianluca Rizzi, N. Merayo, J. Aguado, P. Fernández, R. Lorenzo, E. Abril","doi":"10.1109/ITNAC55475.2022.9998347","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998347","url":null,"abstract":"The Multi-access Edge Computing (MEC) architecture is made up of geographically distributed edge servers so that computing capabilities are provisioned at the network edge, close to the end users. Network Function Virtualization (NFV), when combined with MEC, provides network services in the form of Service Function Chains (SFC) with low latency. In the design of NFV-based 5G networks, the trade-off between the cost of resource deployment and the effective provisioning of services must be considered. In this work, we analyze the impact of having different MEC locations when considering the provision of SFCs in a dynamic scenario (and thus also address VNF placement). In order to deal with infrastructure failures, it is of great importance to employ robust and resilient network strategies. To safeguard SFCs against failures, various protection techniques can be applied. We use two protection methods, namely, dedicated VNF protection and shared VNF protection, under the assumption of single network failures. The operational performances of different approaches are evaluated in terms of blocking ratio and end-to-end delay, both for the whole network and for different services, and we analyze whether it is better to distribute computing servers among a few MEC sites or among a higher number.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128953462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Through the Window: On the exploitability of Xtensa's Register Window Overflow 通过窗口:Xtensa的寄存器窗口溢出的利用
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998407
Kai Lehniger, P. Langendörfer
While the name Xtensa is still mostly unknown to the public, the architecture plays a big role in the field of Internet of Things (IoT), be it in the form of custom designs or broadly used microcontrollers such as the ESP32 used inside millions of devices. This paper describes a newly discovered vulnerability that uses the window overflow exception handlers of an Xtensa LX processor to leak and manipulate data. To show its severity, an exploit is demonstrated that allows to disable Stack Canaries, a common protection against stack buffer overflows. Requirements and potential possibilities to escalate the vulnerability, including code-reuse attacks to completely compromise the attacked device. Finally, a countermeasure is introduced with a <0.5% runtime overhead in our worst-case scenario.
虽然Xtensa这个名字在大多数情况下仍然不为公众所知,但该架构在物联网(IoT)领域发挥着重要作用,无论是以定制设计的形式还是广泛使用的微控制器(如数百万设备中使用的ESP32)。本文描述了一个新发现的漏洞,该漏洞使用Xtensa LX处理器的窗口溢出异常处理程序来泄漏和操纵数据。为了显示其严重性,演示了一个允许禁用堆栈金丝雀的漏洞利用,栈金丝雀是防止堆栈缓冲区溢出的常用保护。升级漏洞的需求和潜在可能性,包括代码重用攻击以完全破坏被攻击设备。最后,在最坏的情况下,引入了一个运行时开销小于0.5%的对策。
{"title":"Through the Window: On the exploitability of Xtensa's Register Window Overflow","authors":"Kai Lehniger, P. Langendörfer","doi":"10.1109/ITNAC55475.2022.9998407","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998407","url":null,"abstract":"While the name Xtensa is still mostly unknown to the public, the architecture plays a big role in the field of Internet of Things (IoT), be it in the form of custom designs or broadly used microcontrollers such as the ESP32 used inside millions of devices. This paper describes a newly discovered vulnerability that uses the window overflow exception handlers of an Xtensa LX processor to leak and manipulate data. To show its severity, an exploit is demonstrated that allows to disable Stack Canaries, a common protection against stack buffer overflows. Requirements and potential possibilities to escalate the vulnerability, including code-reuse attacks to completely compromise the attacked device. Finally, a countermeasure is introduced with a <0.5% runtime overhead in our worst-case scenario.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121130100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1