首页 > 最新文献

2013 Proceedings IEEE INFOCOM最新文献

英文 中文
Cooperative pipelined regeneration in distributed storage systems 分布式存储系统中的协同流水线再生
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567039
Jun Li, Xin Wang, Baochun Li
In distributed storage systems, a substantial volume of data are stored in a distributed fashion, across a large number of storage nodes. To maintain data integrity, when existing storage nodes fail, lost data are regenerated at replacement nodes. Regenerating multiple data losses in batches can reduce the consumption of bandwidth. However, existing schemes are only able to achieve lower bandwidth consumption by utilizing a large number of participating nodes. In this paper, we propose a cooperative pipelined regeneration process that regenerates multiple data losses cooperatively with much fewer participating nodes. We show that cooperative pipelined regeneration is not only able to maintain optimal data integrity, but also able to further reduce the consumption of bandwidth as well.
在分布式存储系统中,大量数据以分布式方式存储在大量存储节点上。为了保证数据的完整性,当现有存储节点出现故障时,会在替换节点上重新生成丢失的数据。批量生成多个丢失的数据可以减少带宽的消耗。然而,现有的方案只能通过利用大量参与节点来实现较低的带宽消耗。在本文中,我们提出了一种协作的流水线再生过程,该过程可以在更少的节点参与下协同再生多个数据丢失。研究表明,协作式流水线再生不仅能够保持最佳的数据完整性,而且能够进一步降低带宽消耗。
{"title":"Cooperative pipelined regeneration in distributed storage systems","authors":"Jun Li, Xin Wang, Baochun Li","doi":"10.1109/INFCOM.2013.6567039","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567039","url":null,"abstract":"In distributed storage systems, a substantial volume of data are stored in a distributed fashion, across a large number of storage nodes. To maintain data integrity, when existing storage nodes fail, lost data are regenerated at replacement nodes. Regenerating multiple data losses in batches can reduce the consumption of bandwidth. However, existing schemes are only able to achieve lower bandwidth consumption by utilizing a large number of participating nodes. In this paper, we propose a cooperative pipelined regeneration process that regenerates multiple data losses cooperatively with much fewer participating nodes. We show that cooperative pipelined regeneration is not only able to maintain optimal data integrity, but also able to further reduce the consumption of bandwidth as well.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129915904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SybilShield: An agent-aided social network-based Sybil defense among multiple communities SybilShield:在多个社区中基于代理辅助的社会网络的SybilShield防御
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566893
Lu Shi, Shucheng Yu, W. Lou, Y. T. Hou
Lacking trusted central authority, distributed systems have received serious security threats from Sybil attack, where an adversary forges identities of more than one node and attempts to control the system. By utilizing the real-world trust relationships between users, social network-based defense schemes have been proposed to mitigate the impact of Sybil attacks. These solutions are mostly built on the assumption that the social network graph can be partitioned into two loosely linked regions - a tightly connected non-Sybil region and a Sybil region. Although such an assumption may hold in certain settings, studies have shown that the real-world social connections tend to divide users into multiple inter-connected small worlds instead of a single uniformly connected large region. Given this fact, the applicability of existing schemes would be greatly undermined for inability to distinguish Sybil users from valid ones in the small non-Sybil regions. This paper addresses this problem and presents SybilShield, the first protocol that defends against Sybil attack utilizing multi-community social network structure in real world. Our scheme leverages the sociological property that the number of cutting edges between a non-Sybil community and a Sybil community, which represent human-established trust relationships, is much smaller than that among non-Sybil communities. With the help of agent nodes, SybilShield greatly reduces false positive rate of non-Sybils among multiple communities, while effectively identifying Sybil nodes. Analytical results prove the superiority of SybilShield. Our experiments on a real-world social network graph with 100,000 nodes also validate the effectiveness of SybilShield.
由于缺乏可信的中央权威,分布式系统受到了来自Sybil攻击的严重安全威胁,攻击者伪造多个节点的身份并试图控制系统。通过利用用户之间的真实信任关系,提出了基于社交网络的防御方案来减轻Sybil攻击的影响。这些解决方案大多建立在这样的假设之上,即社交网络图可以划分为两个松散连接的区域——一个紧密连接的非西比尔区域和一个西比尔区域。尽管这种假设在某些情况下可能成立,但研究表明,现实世界的社交关系倾向于将用户划分为多个相互连接的小世界,而不是一个统一连接的大区域。鉴于这一事实,由于无法区分西比尔用户和小的非西比尔地区的有效用户,现有方案的适用性将大大受到损害。针对这一问题,本文提出了SybilShield协议,这是现实世界中第一个利用多社区社会网络结构防御Sybil攻击的协议。我们的方案利用了社会学属性,即非Sybil社区和Sybil社区之间的前沿数量,它们代表人类建立的信任关系,比非Sybil社区要小得多。在代理节点的帮助下,SybilShield在有效识别Sybil节点的同时,大大降低了多个社区中非Sybil节点的假阳性率。分析结果证明了SybilShield的优越性。我们在一个有10万个节点的真实社交网络图上的实验也验证了SybilShield的有效性。
{"title":"SybilShield: An agent-aided social network-based Sybil defense among multiple communities","authors":"Lu Shi, Shucheng Yu, W. Lou, Y. T. Hou","doi":"10.1109/INFCOM.2013.6566893","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566893","url":null,"abstract":"Lacking trusted central authority, distributed systems have received serious security threats from Sybil attack, where an adversary forges identities of more than one node and attempts to control the system. By utilizing the real-world trust relationships between users, social network-based defense schemes have been proposed to mitigate the impact of Sybil attacks. These solutions are mostly built on the assumption that the social network graph can be partitioned into two loosely linked regions - a tightly connected non-Sybil region and a Sybil region. Although such an assumption may hold in certain settings, studies have shown that the real-world social connections tend to divide users into multiple inter-connected small worlds instead of a single uniformly connected large region. Given this fact, the applicability of existing schemes would be greatly undermined for inability to distinguish Sybil users from valid ones in the small non-Sybil regions. This paper addresses this problem and presents SybilShield, the first protocol that defends against Sybil attack utilizing multi-community social network structure in real world. Our scheme leverages the sociological property that the number of cutting edges between a non-Sybil community and a Sybil community, which represent human-established trust relationships, is much smaller than that among non-Sybil communities. With the help of agent nodes, SybilShield greatly reduces false positive rate of non-Sybils among multiple communities, while effectively identifying Sybil nodes. Analytical results prove the superiority of SybilShield. Our experiments on a real-world social network graph with 100,000 nodes also validate the effectiveness of SybilShield.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126845986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Distributed approximation algorithms for maximum link scheduling and local broadcasting in the physical interference model 物理干扰模型中最大链路调度和本地广播的分布式近似算法
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566927
Guanhong Pei, A. Vullikanti
In this paper, we develop the first rigorous distributed algorithm for link scheduling in the SINR model under any length-monotone sub-linear power assignments. Our algorithms give constant factor approximation guarantees, matching the bounds of the sequential algorithms for these problems, with provable bounds on the running time in terms of the graph topology. We also study a related and fundamental problem of local broadcasting for uniform power levels, and obtain similar bounds. These problems are much more challenging in the SINR model than in the more standard graph based interference models, because of the non-locality of the SINR model. Our algorithms are randomized and crucially rely on physical carrier sensing for the distributed communication steps. We find that the specific wireless device capability of duplex/halfduplex communication significantly impacts the performance. Our main technique involves the distributed computation of affectance and a construct called a ruling, which are likely to be useful in other scheduling problems in the SINR model. We also study the empirical performance of our algorithms, and find that the performance depends on the topology, and the approximation ratio is very close to the best sequential algorithm.
本文提出了SINR模型中任意长度单调次线性功率分配下链路调度的第一个严格分布式算法。我们的算法给出了常数因子近似保证,与这些问题的顺序算法的边界相匹配,并且在图拓扑的运行时间上具有可证明的边界。我们还研究了局部广播中一个相关的基本问题,并得到了类似的边界。由于SINR模型的非局部性,这些问题在SINR模型中比在更标准的基于图的干扰模型中更具挑战性。我们的算法是随机的,并且关键地依赖于物理载波感知来进行分布式通信步骤。我们发现双工/半双工通信的特定无线设备性能显著影响性能。我们的主要技术涉及影响的分布式计算和一个称为规则的结构,这可能对SINR模型中的其他调度问题有用。我们还研究了算法的经验性能,发现性能依赖于拓扑结构,逼近比非常接近最佳顺序算法。
{"title":"Distributed approximation algorithms for maximum link scheduling and local broadcasting in the physical interference model","authors":"Guanhong Pei, A. Vullikanti","doi":"10.1109/INFCOM.2013.6566927","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566927","url":null,"abstract":"In this paper, we develop the first rigorous distributed algorithm for link scheduling in the SINR model under any length-monotone sub-linear power assignments. Our algorithms give constant factor approximation guarantees, matching the bounds of the sequential algorithms for these problems, with provable bounds on the running time in terms of the graph topology. We also study a related and fundamental problem of local broadcasting for uniform power levels, and obtain similar bounds. These problems are much more challenging in the SINR model than in the more standard graph based interference models, because of the non-locality of the SINR model. Our algorithms are randomized and crucially rely on physical carrier sensing for the distributed communication steps. We find that the specific wireless device capability of duplex/halfduplex communication significantly impacts the performance. Our main technique involves the distributed computation of affectance and a construct called a ruling, which are likely to be useful in other scheduling problems in the SINR model. We also study the empirical performance of our algorithms, and find that the performance depends on the topology, and the approximation ratio is very close to the best sequential algorithm.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127041158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources D2Taint:针对众多数据源的智能手机差异化动态信息流跟踪
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566866
Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion, Zhezhe Chen, Feng Qin, D. Xuan
With smartphones' meteoric growth in recent years, leaking sensitive information from them has become an increasingly critical issue. Such sensitive information can originate from smartphones themselves (e.g., location information) or from many Internet sources (e.g., bank accounts, emails). While prior work has demonstrated information flow tracking's (IFT's) effectiveness at detecting information leakage from smartphones, it can only handle a limited number of sensitive information sources. This paper presents a novel IFT tagging strategy using differentiated and dynamic tagging. We partition information sources into differentiated classes and store them in fixed-length tags. We adjust tag structure based on time-varying received information sources. Our tagging strategy enables us to track at runtime numerous information sources in multiple classes and rapidly detect information leakage from any of these sources. We design and implement D2Taint, an IFT system using our tagging strategy on real-world smartphones. We experimentally evaluate D2Taint's effectiveness with 84 real-world applications downloaded from Google Play. D2Taint reports that over 80% of them leak data to third-party destinations; 14% leak highly sensitive data. Our experimental evaluation using a standard benchmark tool illustrates D2Taint's effectiveness at handling many information sources on smartphones with moderate runtime and space overhead.
随着近年来智能手机的飞速发展,从智能手机泄露敏感信息已成为一个日益严重的问题。这些敏感信息可能来自智能手机本身(例如,位置信息),也可能来自许多互联网来源(例如,银行账户、电子邮件)。虽然之前的工作已经证明了信息流跟踪(IFT)在检测智能手机信息泄露方面的有效性,但它只能处理有限数量的敏感信息源。本文提出了一种基于差异化和动态标注的IFT标注策略。我们将信息源划分为不同的类,并将它们存储在固定长度的标签中。我们根据时变的接收信息源调整标签结构。我们的标记策略使我们能够在运行时跟踪多个类中的众多信息源,并快速检测来自这些信息源的信息泄漏。我们在现实世界的智能手机上使用我们的标签策略设计并实现了d2tint,这是一个IFT系统。我们用从b谷歌Play下载的84个实际应用程序实验评估了D2Taint的有效性。D2Taint报告称,其中超过80%的人将数据泄露给第三方目的地;14%泄露高度敏感数据。我们使用标准基准测试工具进行的实验评估说明了D2Taint在智能手机上处理许多信息源时的有效性,并且运行时和空间开销适中。
{"title":"D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources","authors":"Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion, Zhezhe Chen, Feng Qin, D. Xuan","doi":"10.1109/INFCOM.2013.6566866","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566866","url":null,"abstract":"With smartphones' meteoric growth in recent years, leaking sensitive information from them has become an increasingly critical issue. Such sensitive information can originate from smartphones themselves (e.g., location information) or from many Internet sources (e.g., bank accounts, emails). While prior work has demonstrated information flow tracking's (IFT's) effectiveness at detecting information leakage from smartphones, it can only handle a limited number of sensitive information sources. This paper presents a novel IFT tagging strategy using differentiated and dynamic tagging. We partition information sources into differentiated classes and store them in fixed-length tags. We adjust tag structure based on time-varying received information sources. Our tagging strategy enables us to track at runtime numerous information sources in multiple classes and rapidly detect information leakage from any of these sources. We design and implement D2Taint, an IFT system using our tagging strategy on real-world smartphones. We experimentally evaluate D2Taint's effectiveness with 84 real-world applications downloaded from Google Play. D2Taint reports that over 80% of them leak data to third-party destinations; 14% leak highly sensitive data. Our experimental evaluation using a standard benchmark tool illustrates D2Taint's effectiveness at handling many information sources on smartphones with moderate runtime and space overhead.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Detecting encrypted botnet traffic 检测加密的僵尸网络流量
Pub Date : 2013-04-14 DOI: 10.1109/INFCOMW.2013.6562912
Han Zhang, C. Papadopoulos, D. Massey
Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases entropy. This paper investigates whether adding highentropy detectors to an existing bot detection tool that uses DPI can restore some of the bot visibility. We present two high-entropy classifiers, and use one of them to enhance BotHunter. Our results show that while BotHunter misses about 50% of the bots when they employ encryption, our high-entropy classifier restores most of its ability to detect bots, even when they use encryption.
依赖于深度包检测(DPI)的Bot检测方法可以通过加密来阻止。然而,加密会增加熵。本文研究了将高熵检测器添加到使用DPI的现有机器人检测工具中是否可以恢复一些机器人可见性。我们提出了两个高熵分类器,并使用其中一个来增强BotHunter。我们的结果表明,虽然BotHunter在使用加密时错过了大约50%的机器人,但我们的高熵分类器恢复了大部分检测机器人的能力,即使它们使用加密。
{"title":"Detecting encrypted botnet traffic","authors":"Han Zhang, C. Papadopoulos, D. Massey","doi":"10.1109/INFCOMW.2013.6562912","DOIUrl":"https://doi.org/10.1109/INFCOMW.2013.6562912","url":null,"abstract":"Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases entropy. This paper investigates whether adding highentropy detectors to an existing bot detection tool that uses DPI can restore some of the bot visibility. We present two high-entropy classifiers, and use one of them to enhance BotHunter. Our results show that while BotHunter misses about 50% of the bots when they employ encryption, our high-entropy classifier restores most of its ability to detect bots, even when they use encryption.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Gaining insight into AS-level outages through analysis of Internet background radiation 通过分析互联网背景辐射,深入了解应用系统级别的中断情况
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567183
K. Benson, A. Dainotti, K. Claffy, E. Aben
Internet Background Radiation (IBR) is unsolicited network traffic mostly generated by malicious software, e.g., worms, scans. In previous work, we extracted a signal from IBR traffic arriving at a large (/8) segment of unassigned IPv4 address space to identify large-scale disruptions of connectivity at an Autonomous System (AS) granularity, and used our technique to study episodes of government censorship and natural disasters [1]. Here we explore other IBR-derived metrics that may provide insights into the causes of macroscopic connectivity disruptions. We propose metrics indicating packet loss (e.g., due to link congestion) along a path from a specific AS to our observation point. We use three case studies to illustrate how our metrics can help identify packet loss characteristics of an outage. These metrics could be used in the diagnostic component of a semiautomated system for detecting and characterizing large-scale outages.
Internet背景辐射(IBR)是一种未经请求的网络流量,主要由恶意软件(如蠕虫、扫描)产生。在之前的工作中,我们从IBR流量中提取了一个信号,该信号到达一个大(/8)段未分配的IPv4地址空间,以识别自治系统(AS)粒度的大规模连接中断,并使用我们的技术来研究政府审查和自然灾害的事件[1]。本文探讨了国际复兴开发银行衍生的其他指标,这些指标可能有助于深入了解宏观连通性中断的原因。我们提出了指示数据包丢失的指标(例如,由于链路拥塞)沿着从特定AS到我们观察点的路径。我们使用三个案例研究来说明我们的指标如何帮助识别停机的数据包丢失特征。这些指标可用于半自动系统的诊断组件,用于检测和描述大规模停机。
{"title":"Gaining insight into AS-level outages through analysis of Internet background radiation","authors":"K. Benson, A. Dainotti, K. Claffy, E. Aben","doi":"10.1109/INFCOM.2013.6567183","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567183","url":null,"abstract":"Internet Background Radiation (IBR) is unsolicited network traffic mostly generated by malicious software, e.g., worms, scans. In previous work, we extracted a signal from IBR traffic arriving at a large (/8) segment of unassigned IPv4 address space to identify large-scale disruptions of connectivity at an Autonomous System (AS) granularity, and used our technique to study episodes of government censorship and natural disasters [1]. Here we explore other IBR-derived metrics that may provide insights into the causes of macroscopic connectivity disruptions. We propose metrics indicating packet loss (e.g., due to link congestion) along a path from a specific AS to our observation point. We use three case studies to illustrate how our metrics can help identify packet loss characteristics of an outage. These metrics could be used in the diagnostic component of a semiautomated system for detecting and characterizing large-scale outages.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116479157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Offering supplementary wireless technologies: Adoption behavior and offloading benefits 提供补充无线技术:采用行为和卸载好处
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566896
Carlee Joe-Wong, S. Sen, Sangtae Ha
To alleviate the congestion caused by rapid growth in demand for mobile data, ISPs have begun encouraging users to offload some of their traffic onto a supplementary, better quality network technology, e.g., offloading from 3G or 4G to WiFi and femtocells. With the growing popularity of such offerings, a deeper understanding of the underlying economic principles and their impact on technology adoption is necessary. To this end, we develop a model for user adoption of a base wireless technology and a bundle of the base plus a supplementary technology. In our model, individual users make their adoption decisions based on several factors, including the technologies' intrinsic qualities, throughput degradation due to congestion externalities from other subscribers, and the flat access rates that an ISP charges. We study the adoption dynamics and show that they converge to a unique equilibrium for a given set of exogenously determined system parameters. In particular, we characterize the occurrence of interesting adoption behaviors, including a possible decrease in the adoption of the supplementary technology as its coverage increases. Similar behaviors occur at an ISP's profit-maximizing prices and the optimal coverage area for the supplementary technology. To account for the potential benefits from offloading in practice, we collect 3G and WiFi usage and location data from twenty mobile users. We then use this data to numerically investigate the profit-maximizing adoption levels when an ISP accounts for its cost of deploying the supplemental technology and savings from offloading traffic onto this technology.
为了缓解移动数据需求快速增长所造成的拥塞,互联网服务提供商已经开始鼓励用户将部分流量转移到补充的、质量更好的网络技术上,例如,从3G或4G转移到WiFi和femtocell。随着此类产品的日益普及,有必要更深入地了解潜在的经济原则及其对技术采用的影响。为此,我们开发了一种用户采用基础无线技术的模型,并将基础无线技术和附加技术捆绑在一起。在我们的模型中,个人用户根据几个因素做出采用决定,包括技术的内在质量,由于其他用户的拥塞外部性而导致的吞吐量下降,以及ISP收取的固定接入费率。我们研究了采用动力学,并证明了它们收敛于给定的一组外源确定的系统参数的唯一均衡。特别地,我们描述了有趣的采用行为的发生,包括随着其覆盖范围的增加而采用补充技术的可能减少。类似的行为发生在网络服务提供商利润最大化的价格和补充技术的最优覆盖区域。为了说明在实践中卸载的潜在好处,我们收集了20个移动用户的3G和WiFi使用情况和位置数据。然后,我们使用这些数据来数值研究当ISP考虑部署补充技术的成本和将流量卸载到该技术上的节省时,利润最大化的采用水平。
{"title":"Offering supplementary wireless technologies: Adoption behavior and offloading benefits","authors":"Carlee Joe-Wong, S. Sen, Sangtae Ha","doi":"10.1109/INFCOM.2013.6566896","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566896","url":null,"abstract":"To alleviate the congestion caused by rapid growth in demand for mobile data, ISPs have begun encouraging users to offload some of their traffic onto a supplementary, better quality network technology, e.g., offloading from 3G or 4G to WiFi and femtocells. With the growing popularity of such offerings, a deeper understanding of the underlying economic principles and their impact on technology adoption is necessary. To this end, we develop a model for user adoption of a base wireless technology and a bundle of the base plus a supplementary technology. In our model, individual users make their adoption decisions based on several factors, including the technologies' intrinsic qualities, throughput degradation due to congestion externalities from other subscribers, and the flat access rates that an ISP charges. We study the adoption dynamics and show that they converge to a unique equilibrium for a given set of exogenously determined system parameters. In particular, we characterize the occurrence of interesting adoption behaviors, including a possible decrease in the adoption of the supplementary technology as its coverage increases. Similar behaviors occur at an ISP's profit-maximizing prices and the optimal coverage area for the supplementary technology. To account for the potential benefits from offloading in practice, we collect 3G and WiFi usage and location data from twenty mobile users. We then use this data to numerically investigate the profit-maximizing adoption levels when an ISP accounts for its cost of deploying the supplemental technology and savings from offloading traffic onto this technology.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
To stay or to switch: Multiuser dynamic channel access 停留或切换:多用户动态通道访问
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566917
Yang Liu, M. Liu
In this paper we study opportunistic spectrum access (OSA) policies in a multiuser multichannel random access setting, where users perform channel probing and switching in order to obtain better channel condition or higher instantaneous transmission quality. However, unlikely many prior works in this area, including channel probing and switching policies for a single user to exploit spectral diversity, and probing and access policies for multiple users over a single channel to exploit temporal and multiuser diversity, in this study we consider the collective switching of multiple users over multiple channels. In addition, we consider finite arrivals, i.e., users are not assumed to always have data to send and demand for channel follow a certain arrival process. Under such a scenario, the users' ability to opportunistically exploit temporal diversity (the temporal variation in channel quality over a single channel) and spectral diversity (quality variation across multiple channels at a give time) is greatly affected by the level of congestion in the system. We investigate the optimal decision process in this case, and evaluate the extent to which congestion affects potential gains from opportunistic dynamic channel switching.
本文研究了多用户多信道随机接入环境下的机会频谱接入策略,在这种环境下,用户为了获得更好的信道条件或更高的瞬时传输质量而进行信道探测和交换。然而,不太可能在这一领域的许多先前的工作,包括单个用户利用频谱分集的信道探测和切换策略,以及单个信道上多个用户利用时间和多用户分集的探测和访问策略,在本研究中,我们考虑了多个用户在多个信道上的集体交换。此外,我们考虑有限到达,即用户不假设总是有数据发送和通道需求遵循一定的到达过程。在这种情况下,用户投机地利用时间分集(单个信道上信道质量的时间变化)和频谱分集(给定时间跨多个信道的质量变化)的能力受到系统中拥塞程度的极大影响。我们研究了这种情况下的最优决策过程,并评估了拥塞对机会动态信道交换的潜在收益的影响程度。
{"title":"To stay or to switch: Multiuser dynamic channel access","authors":"Yang Liu, M. Liu","doi":"10.1109/INFCOM.2013.6566917","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566917","url":null,"abstract":"In this paper we study opportunistic spectrum access (OSA) policies in a multiuser multichannel random access setting, where users perform channel probing and switching in order to obtain better channel condition or higher instantaneous transmission quality. However, unlikely many prior works in this area, including channel probing and switching policies for a single user to exploit spectral diversity, and probing and access policies for multiple users over a single channel to exploit temporal and multiuser diversity, in this study we consider the collective switching of multiple users over multiple channels. In addition, we consider finite arrivals, i.e., users are not assumed to always have data to send and demand for channel follow a certain arrival process. Under such a scenario, the users' ability to opportunistically exploit temporal diversity (the temporal variation in channel quality over a single channel) and spectral diversity (quality variation across multiple channels at a give time) is greatly affected by the level of congestion in the system. We investigate the optimal decision process in this case, and evaluate the extent to which congestion affects potential gains from opportunistic dynamic channel switching.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114689154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
αRoute: A name based routing scheme for Information Centric Networks α路由:一种基于名称的信息中心网络路由方案
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566741
Reaz Ahmed, Md. Faizul Bari, S. R. Chowdhury, M. G. Rabbani, R. Boutaba, B. Mathieu
One of the crucial building blocks for Information Centric Networking (ICN) is a name based routing scheme that can route directly on content names instead of IP addresses. However, moving the address space from IP addresses to content names brings scalability issues to a whole new level, due to two reasons. First, name aggregation is not as trivial a task as the IP address aggregation in BGP routing. Second, the number of addressable contents in the Internet is several orders of magnitude higher than the number of IP addresses. With the current size of the Internet, name based, anycast routing is very challenging specially when routing efficiency is of prime importance. We propose a novel name-based routing scheme (αRoute) for ICN that offers efficient bandwidth usage, guaranteed content lookup and scalable routing table size.
信息中心网络(ICN)的关键构建模块之一是基于名称的路由方案,该方案可以直接根据内容名称而不是IP地址进行路由。然而,由于两个原因,将地址空间从IP地址移动到内容名称将可伸缩性问题提升到了一个全新的水平。首先,在BGP路由中,名称聚合不像IP地址聚合那样简单。其次,互联网中可寻址内容的数量比IP地址的数量高出几个数量级。在当前Internet的规模下,基于名称的任意播路由非常具有挑战性,特别是在路由效率非常重要的情况下。我们提出了一种新的基于名称的ICN路由方案(αRoute),它提供了有效的带宽使用,保证内容查找和可扩展的路由表大小。
{"title":"αRoute: A name based routing scheme for Information Centric Networks","authors":"Reaz Ahmed, Md. Faizul Bari, S. R. Chowdhury, M. G. Rabbani, R. Boutaba, B. Mathieu","doi":"10.1109/INFCOM.2013.6566741","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566741","url":null,"abstract":"One of the crucial building blocks for Information Centric Networking (ICN) is a name based routing scheme that can route directly on content names instead of IP addresses. However, moving the address space from IP addresses to content names brings scalability issues to a whole new level, due to two reasons. First, name aggregation is not as trivial a task as the IP address aggregation in BGP routing. Second, the number of addressable contents in the Internet is several orders of magnitude higher than the number of IP addresses. With the current size of the Internet, name based, anycast routing is very challenging specially when routing efficiency is of prime importance. We propose a novel name-based routing scheme (αRoute) for ICN that offers efficient bandwidth usage, guaranteed content lookup and scalable routing table size.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114817173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Exploring venue popularity in Foursquare 在Foursquare上探索地点的受欢迎程度
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567164
Yanhua Li, Moritz Steiner, Limin Wang, Zhi-Li Zhang, Jie Bao
In this paper, we provide a detailed analysis on the venue popularity in Foursquare, a leading location-based social network. By collecting 2.4 million venues from 14 geographic regions all over the world, we study the common characteristics of popular venues, and make the following observations. First, venues with more complete profile information are more likely to be popular. Second, venues in the Food category attract the most (43%) public tips (comments) by users, and the Travel & Transport category is the most popular category with the highest per venue check-ins, i.e., each venue in this category attracts on average 376 check-ins. Moreover, the stickiness of users checking in venues in the residence, office, and school categories is higher than in other categories. Last but not least, in general, old venues created at the early stage of Foursquare are more popular than new venues. Our results help to understand the factors that cause venues to become popular, and have applications in venue recommendations and advertisement in location based social networks.
在本文中,我们详细分析了Foursquare(一个领先的基于位置的社交网络)的场所受欢迎程度。通过收集全球14个地理区域的240万个场馆,我们研究了热门场馆的共同特征,并得出以下观察结果。首先,个人资料更完整的场所更有可能受到欢迎。其次,餐饮类的场馆吸引了最多(43%)用户的公共提示(评论),旅游和交通类是最受欢迎的类别,每个场馆的签到次数最高,即该类别的每个场馆平均吸引了376次签到。此外,在住宅、办公和学校类别中,用户签到场所的粘性高于其他类别。最后但并非最不重要的是,一般来说,在Foursquare早期创建的老场所比新场所更受欢迎。我们的研究结果有助于理解导致场馆变得受欢迎的因素,并在基于位置的社交网络的场馆推荐和广告中得到应用。
{"title":"Exploring venue popularity in Foursquare","authors":"Yanhua Li, Moritz Steiner, Limin Wang, Zhi-Li Zhang, Jie Bao","doi":"10.1109/INFCOM.2013.6567164","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567164","url":null,"abstract":"In this paper, we provide a detailed analysis on the venue popularity in Foursquare, a leading location-based social network. By collecting 2.4 million venues from 14 geographic regions all over the world, we study the common characteristics of popular venues, and make the following observations. First, venues with more complete profile information are more likely to be popular. Second, venues in the Food category attract the most (43%) public tips (comments) by users, and the Travel & Transport category is the most popular category with the highest per venue check-ins, i.e., each venue in this category attracts on average 376 check-ins. Moreover, the stickiness of users checking in venues in the residence, office, and school categories is higher than in other categories. Last but not least, in general, old venues created at the early stage of Foursquare are more popular than new venues. Our results help to understand the factors that cause venues to become popular, and have applications in venue recommendations and advertisement in location based social networks.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124364572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
期刊
2013 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1