首页 > 最新文献

2013 Proceedings IEEE INFOCOM最新文献

英文 中文
Optimal budget deployment strategy against power grid interdiction 电网阻断下的最优预算部署策略
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566907
Xuan Liu, K. Ren, Yanling Yuan, Zuyi Li, Qian Wang
Power network is one of the most critical infrastructures in a nation and is always a target of attackers. Recently, many schemes are proposed to protect the security of power systems. However, most of existing works did not consider the component attacking cost and ignored the relationship between the budget deployed on the component and its attacking cost. To address this problem, in this paper we introduce the concept of budget-cost function, which describes the dynamic characteristics of component attacking cost, and propose a new model to protect power grid against intentional attacks. In our model, the attackers have limited attacking capacity and aim to maximize the damage of attacks. On the other hand, the defenders aim to find the optimal strategy of the budget deployment to limit the damage to an expected level. We formulate the above problem as a nonlinear optimization problem and solve it by employing the primal-dual interior-point method. To the author's best knowledge, this is the first work which analyzes the optimal budget deployment strategy based on budget-cost function. Simulations on the IEEE 5-bus system demonstrate the correctness and effectiveness of the proposed model and algorithms. The results provide a basis of budget investment for power systems.
电力网络是一个国家最关键的基础设施之一,一直是攻击者的目标。近年来,人们提出了许多保护电力系统安全的方案。然而,现有的研究大多没有考虑组件的攻击成本,忽略了部署在组件上的预算与其攻击成本之间的关系。针对这一问题,本文引入了预算成本函数的概念,描述了组件攻击成本的动态特征,提出了一种新的保护电网免受故意攻击的模型。在我们的模型中,攻击者的攻击能力是有限的,他们的目标是使攻击造成的伤害最大化。另一方面,防御者的目标是找到预算部署的最佳策略,将损害限制在预期水平。我们将上述问题化为一个非线性优化问题,并采用原对偶内点法求解。就笔者所知,这是第一次分析基于预算-成本函数的最优预算部署策略。在ieee5总线系统上的仿真验证了所提模型和算法的正确性和有效性。研究结果为电力系统预算投资提供了依据。
{"title":"Optimal budget deployment strategy against power grid interdiction","authors":"Xuan Liu, K. Ren, Yanling Yuan, Zuyi Li, Qian Wang","doi":"10.1109/INFCOM.2013.6566907","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566907","url":null,"abstract":"Power network is one of the most critical infrastructures in a nation and is always a target of attackers. Recently, many schemes are proposed to protect the security of power systems. However, most of existing works did not consider the component attacking cost and ignored the relationship between the budget deployed on the component and its attacking cost. To address this problem, in this paper we introduce the concept of budget-cost function, which describes the dynamic characteristics of component attacking cost, and propose a new model to protect power grid against intentional attacks. In our model, the attackers have limited attacking capacity and aim to maximize the damage of attacks. On the other hand, the defenders aim to find the optimal strategy of the budget deployment to limit the damage to an expected level. We formulate the above problem as a nonlinear optimization problem and solve it by employing the primal-dual interior-point method. To the author's best knowledge, this is the first work which analyzes the optimal budget deployment strategy based on budget-cost function. Simulations on the IEEE 5-bus system demonstrate the correctness and effectiveness of the proposed model and algorithms. The results provide a basis of budget investment for power systems.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123672920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Coding Opportunity Aware Backbone metrics for broadcast in wireless networks 无线网络中广播的编码机会感知骨干网度量
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566778
Shuai Wang, Guang Tan, Yunhuai Liu, Hongbo Jiang, T. He
Reducing transmission redundancy is key to the efficiency of wireless network broadcast. A standard technique to achieve this is to create a network backbone consisting of a subset of nodes that are responsible for data forwarding, while other nodes act as passive receivers. On top of this, network coding (NC) is often used to further reduce unnecessary transmissions. The main problem with this backbone+NC approach is that the backbone construction process is blind of what is needed by NC, thus may produce a structure with little benefit to the NC algorithms. To address this problem, we propose a Coding Opportunity Aware Backbone (COAB) construction scheme, which seeks to maximally exploit coding opportunities when selecting backbone forwarders. We show that the better informed backbone construction process leads to significantly increased coding frequency, at minimal cost of localized information exchange. The highlight of our work is COAB's broad applicability and effectiveness. We integrate COAB with ten state-of-the-art broadcast algorithms, specified in eight publications [1]-[8], and evaluate it with prototype implementations with 30 MICAz nodes. The experimental results show that our design outperforms the existing schemes substantially.
减少传输冗余是提高无线网络广播效率的关键。实现这一目标的一种标准技术是创建一个由负责数据转发的节点子集组成的网络骨干,而其他节点充当被动接收方。在此基础上,网络编码(NC)通常用于进一步减少不必要的传输。这种骨干+NC方法的主要问题是骨干的构建过程忽略了NC需要什么,从而可能产生对NC算法没有什么好处的结构。为了解决这个问题,我们提出了一种编码机会感知骨干(COAB)构建方案,该方案在选择骨干转发器时寻求最大限度地利用编码机会。我们表明,更好的信息骨干建设过程导致编码频率显著增加,在最小的成本本地化信息交换。我们工作的亮点是COAB的广泛适用性和有效性。我们将COAB与八篇出版物[1]-[8]中指定的十种最先进的广播算法集成在一起,并使用30个MICAz节点的原型实现对其进行评估。实验结果表明,我们的设计大大优于现有的方案。
{"title":"Coding Opportunity Aware Backbone metrics for broadcast in wireless networks","authors":"Shuai Wang, Guang Tan, Yunhuai Liu, Hongbo Jiang, T. He","doi":"10.1109/INFCOM.2013.6566778","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566778","url":null,"abstract":"Reducing transmission redundancy is key to the efficiency of wireless network broadcast. A standard technique to achieve this is to create a network backbone consisting of a subset of nodes that are responsible for data forwarding, while other nodes act as passive receivers. On top of this, network coding (NC) is often used to further reduce unnecessary transmissions. The main problem with this backbone+NC approach is that the backbone construction process is blind of what is needed by NC, thus may produce a structure with little benefit to the NC algorithms. To address this problem, we propose a Coding Opportunity Aware Backbone (COAB) construction scheme, which seeks to maximally exploit coding opportunities when selecting backbone forwarders. We show that the better informed backbone construction process leads to significantly increased coding frequency, at minimal cost of localized information exchange. The highlight of our work is COAB's broad applicability and effectiveness. We integrate COAB with ten state-of-the-art broadcast algorithms, specified in eight publications [1]-[8], and evaluate it with prototype implementations with 30 MICAz nodes. The experimental results show that our design outperforms the existing schemes substantially.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122070925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Performance evaluation of time-critical communication networks for smart grids based on IEC 61850 基于IEC 61850的智能电网时间关键通信网络性能评估
Pub Date : 2013-04-14 DOI: 10.1109/INFCOMW.2013.6562906
H. Georg, N. Dorsch, M. Putzke, C. Wietfeld
Driven by the increasing application of Smart Grid technologies in today's power systems, communication networks are becoming more and more important for exchanging monitoring, control and protection information on local and wide area level. For communication the IEC 61850 standard is a candidate for the Smart Grid and has been introduced for Substation Automation Systems (SAS) some years ago. IEC 61850 provides interoperability among various manufactures and enables systemwide communication between intelligent components of future power systems. However, as IEC 61850 addresses Ethernet (ISO/IEC 8802-3 family) as network technology, especially high performance aspects of Ethernet have become increasingly important for time-critical communication within substation automation systems. In this paper we introduce the generic architecture of IEC 61850 and present our modelling approach for evaluating high performance and real-time capability of communication technologies for future smart grid application. First, we give a short overview of the IEC 61850 protocol and present communication flows in substation automation systems according to the standard. Here we focus on substation automation at bay level, located inside an exemplary substation node taken from the IEEE 39-bus power system network. Afterwards we demonstrate our modeling approach for communication networks based on IEC 61850. For performance evaluation we developed a simulation model along with an analytical approach on basis of Network Calculus, enabling to identify worst case boundaries for intra-substation communication. Finally results for simulative and analytical modelling are provided and cross validated for two bay level scenarios, showing the applicability of Network Calculus for real-time constrained smart grid communication.
随着智能电网技术在当今电力系统中的应用越来越广泛,通信网络对于交换局域和广域的监测、控制和保护信息变得越来越重要。对于通信,IEC 61850标准是智能电网的候选标准,几年前已被引入变电站自动化系统(SAS)。IEC 61850提供了不同制造商之间的互操作性,并实现了未来电力系统智能组件之间的全系统通信。然而,由于IEC 61850将以太网(ISO/IEC 8802-3家族)作为网络技术,特别是以太网的高性能方面对于变电站自动化系统中的时间关键通信变得越来越重要。在本文中,我们介绍了IEC 61850的通用架构,并提出了我们的建模方法,用于评估未来智能电网应用中通信技术的高性能和实时性。首先,我们简要概述了IEC 61850协议,并根据该标准介绍了变电站自动化系统中的通信流程。在这里,我们专注于变电站自动化在海湾级,位于一个示范性变电站节点内,取自IEEE 39总线电力系统网络。随后,我们演示了基于IEC 61850的通信网络建模方法。为了进行性能评估,我们开发了一个仿真模型以及基于网络演算的分析方法,从而能够确定变电站内通信的最坏情况边界。最后给出了仿真和分析建模的结果,并对两个海湾级场景进行了交叉验证,表明了网络演算在实时约束智能电网通信中的适用性。
{"title":"Performance evaluation of time-critical communication networks for smart grids based on IEC 61850","authors":"H. Georg, N. Dorsch, M. Putzke, C. Wietfeld","doi":"10.1109/INFCOMW.2013.6562906","DOIUrl":"https://doi.org/10.1109/INFCOMW.2013.6562906","url":null,"abstract":"Driven by the increasing application of Smart Grid technologies in today's power systems, communication networks are becoming more and more important for exchanging monitoring, control and protection information on local and wide area level. For communication the IEC 61850 standard is a candidate for the Smart Grid and has been introduced for Substation Automation Systems (SAS) some years ago. IEC 61850 provides interoperability among various manufactures and enables systemwide communication between intelligent components of future power systems. However, as IEC 61850 addresses Ethernet (ISO/IEC 8802-3 family) as network technology, especially high performance aspects of Ethernet have become increasingly important for time-critical communication within substation automation systems. In this paper we introduce the generic architecture of IEC 61850 and present our modelling approach for evaluating high performance and real-time capability of communication technologies for future smart grid application. First, we give a short overview of the IEC 61850 protocol and present communication flows in substation automation systems according to the standard. Here we focus on substation automation at bay level, located inside an exemplary substation node taken from the IEEE 39-bus power system network. Afterwards we demonstrate our modeling approach for communication networks based on IEC 61850. For performance evaluation we developed a simulation model along with an analytical approach on basis of Network Calculus, enabling to identify worst case boundaries for intra-substation communication. Finally results for simulative and analytical modelling are provided and cross validated for two bay level scenarios, showing the applicability of Network Calculus for real-time constrained smart grid communication.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"221 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120860793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
When target motion matters: Doppler coverage in radar sensor networks 当目标运动重要时:雷达传感器网络中的多普勒覆盖
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566908
Xiaowen Gong, Junshan Zhang, D. Cochran
Radar sensors, which actively transmit radio waves and collect RF energy scattered by objects in the environment, offer a number of advantages over purely passive sensors. An important issue in radar is that the transmitted energy may be scattered by objects that are not of interest as well as objects of interest (e.g., targets). The detection performance of radar systems is affected by such clutter as well as noise. Further, in many applications, clutter can be substantially stronger than the signals of interest. To combat the effect of clutter, a popular method is to take advantage of the Doppler frequency shift (DFS) extracted from the echo signal due to the relative motion of a target with respect to the radar. Unfortunately, a sensor coverage model that only depends on the distance to a target would fail to capture the DFS. In this paper, we set forth the concept of Doppler coverage for a network of spatially distributed radars. Specifically, a target is said to be Doppler-covered if, regardless of its direction of motion, there exists some radar in the network whose signalto-noise ratio (SNR) is sufficiently high and the DFS at that radar is sufficiently large. Based on the Doppler coverage model, we first propose an efficient method to characterize Dopplercovered regions for arbitrarily deployed radars. Then we design an algorithm for deriving the minimum radar density required to achieve Doppler coverage in a region under any polygonal deployment pattern, and further apply it to investigate the regular triangle based deployment.
雷达传感器主动发射无线电波并收集环境中物体散射的射频能量,与纯被动传感器相比,它具有许多优势。雷达中的一个重要问题是,传输的能量可能被不感兴趣的物体和感兴趣的物体(例如,目标)散射。雷达系统的探测性能不仅受到杂波的影响,还受到噪声的影响。此外,在许多应用程序中,杂波可能比感兴趣的信号强得多。为了对抗杂波的影响,一种流行的方法是利用从回波信号中提取的多普勒频移(DFS),这是由于目标相对于雷达的相对运动。不幸的是,仅依赖于目标距离的传感器覆盖模型将无法捕获DFS。本文提出了空间分布雷达网络的多普勒覆盖概念。具体来说,如果网络中存在信噪比(SNR)足够高且DFS足够大的雷达,则无论其运动方向如何,目标都被称为多普勒覆盖。在多普勒覆盖模型的基础上,提出了一种对任意部署雷达的多普勒覆盖区域进行有效表征的方法。然后,我们设计了一种算法来推导在任意多边形部署模式下实现多普勒覆盖所需的最小雷达密度,并将其进一步应用于基于正三角形的部署。
{"title":"When target motion matters: Doppler coverage in radar sensor networks","authors":"Xiaowen Gong, Junshan Zhang, D. Cochran","doi":"10.1109/INFCOM.2013.6566908","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566908","url":null,"abstract":"Radar sensors, which actively transmit radio waves and collect RF energy scattered by objects in the environment, offer a number of advantages over purely passive sensors. An important issue in radar is that the transmitted energy may be scattered by objects that are not of interest as well as objects of interest (e.g., targets). The detection performance of radar systems is affected by such clutter as well as noise. Further, in many applications, clutter can be substantially stronger than the signals of interest. To combat the effect of clutter, a popular method is to take advantage of the Doppler frequency shift (DFS) extracted from the echo signal due to the relative motion of a target with respect to the radar. Unfortunately, a sensor coverage model that only depends on the distance to a target would fail to capture the DFS. In this paper, we set forth the concept of Doppler coverage for a network of spatially distributed radars. Specifically, a target is said to be Doppler-covered if, regardless of its direction of motion, there exists some radar in the network whose signalto-noise ratio (SNR) is sufficiently high and the DFS at that radar is sufficiently large. Based on the Doppler coverage model, we first propose an efficient method to characterize Dopplercovered regions for arbitrarily deployed radars. Then we design an algorithm for deriving the minimum radar density required to achieve Doppler coverage in a region under any polygonal deployment pattern, and further apply it to investigate the regular triangle based deployment.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A spectrum-sharing rewarding framework for co-channel hybrid access femtocell networks 同信道混合接入飞蜂窝网络的频谱共享奖励框架
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566836
Chien-Han Chai, Yuan-Yao Shih, Ai-Chun Pang
With the explosive growth of mobile data traffic, the femtocell technology is one of the proper solutions to enhance mobile service quality and system capacity for cellular networks. However, one of the key problems for femtocell deployment is to find appropriate access control in which mobile operators and users are willing to be involved. Among all kinds of access control modes, the hybrid access mode is considered as the most promising one, which allows femtocells to provide preferential access to femtocell owners and subscribers while other public users can access femtocells with certain restriction. Since all femtocell owners are selfish, how to provide enough incentives to the owners for sharing their femtocell resources is challenging. In this paper, we construct an economic framework for mobile operator and femtocell users by a game theoretical analysis and introduce the concept of profit sharing to provide a positive cycle to sustain the femtocell service. In this framework, a femtocell game is formulated, where the femtocell owners determine the proportion of femtocell resources shared with public users while the operator can maximize its own benefit by determining the ratio of revenue distribution to femtocell owners. The existence of the Nash equilibrium of the game is analyzed. Extensive simulations are conducted to show that the profit of the operator can be maximized while the service requirements of users can be maintained by the proposed framework.
随着移动数据流量的爆炸式增长,femtocell技术是提高蜂窝网络移动服务质量和系统容量的合适解决方案之一。然而,移动基站部署的关键问题之一是找到合适的、移动运营商和用户都愿意参与的访问控制。在各种接入控制方式中,混合接入方式被认为是最有前途的一种,它允许飞基站向飞基站所有者和用户提供优先接入,而其他公共用户可以在一定的限制下接入飞基站。由于所有的移动基站所有者都是自私的,因此如何提供足够的激励来鼓励所有者共享他们的移动基站资源是一个挑战。本文通过博弈论分析,构建了移动运营商和移动基站用户的经济框架,并引入了利润分享的概念,为移动基站业务提供了一个良性循环。在此框架中,制定了一个移动基站博弈,其中移动基站所有者决定与公共用户共享移动基站资源的比例,而运营商通过确定与移动基站所有者的收益分配比例来实现自身利益最大化。分析了博弈纳什均衡的存在性。大量的仿真结果表明,该框架能够在保证用户服务需求的同时实现运营商的利润最大化。
{"title":"A spectrum-sharing rewarding framework for co-channel hybrid access femtocell networks","authors":"Chien-Han Chai, Yuan-Yao Shih, Ai-Chun Pang","doi":"10.1109/INFCOM.2013.6566836","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566836","url":null,"abstract":"With the explosive growth of mobile data traffic, the femtocell technology is one of the proper solutions to enhance mobile service quality and system capacity for cellular networks. However, one of the key problems for femtocell deployment is to find appropriate access control in which mobile operators and users are willing to be involved. Among all kinds of access control modes, the hybrid access mode is considered as the most promising one, which allows femtocells to provide preferential access to femtocell owners and subscribers while other public users can access femtocells with certain restriction. Since all femtocell owners are selfish, how to provide enough incentives to the owners for sharing their femtocell resources is challenging. In this paper, we construct an economic framework for mobile operator and femtocell users by a game theoretical analysis and introduce the concept of profit sharing to provide a positive cycle to sustain the femtocell service. In this framework, a femtocell game is formulated, where the femtocell owners determine the proportion of femtocell resources shared with public users while the operator can maximize its own benefit by determining the ratio of revenue distribution to femtocell owners. The existence of the Nash equilibrium of the game is analyzed. Extensive simulations are conducted to show that the profit of the operator can be maximized while the service requirements of users can be maintained by the proposed framework.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128320890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Understanding Blackholes in large-scale Cognitive Radio Networks under generic failures 了解一般故障下大规模认知无线电网络中的黑洞
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566859
Lei Sun, Wenye Wang
It has been demonstrated that in wireless networks, Blackholes, which are typically generated by isolated node failures, and augmented by failure correlations, can easily result in devastating impact on network performance. Therefore, many solutions, such as routing protocols and restoration algorithms, are proposed to deal with Blackholes by identifying alternative paths to bypass these holes such that the effect of Blackholes can be mitigated. These advancements are based on an underlying premise that there exists at least one alternative path in the network. However, such a hypothesis remains an open question. In other words, we do not know whether the network is resilient to Blackholes or whether an alternative path exists. The answer to this question can complement our understanding of designing routing protocols, as well as topology evolution in the presence of random failures. In order to address this issue, we focus on the topology of Cognitive Radio Networks (CRNs) because of their phenomenal benefits in improving spectrum efficiency through opportunistic communications. Particularly, we first define two metrics, namely the failure occurrence probability p and failure connection function g(·), to characterize node failures and their spreading properties, respectively. Then we prove that each Blackhole is exponentially bounded based on percolation theory. By mapping failure spreading using a branching process, we further derive an upper bound on the expected size of Blackholes. With the observations from our analysis, we are able to find a sufficient condition for a resilient CRN in the presence of Blackholes through analysis and simulations.
已经证明,在无线网络中,黑洞通常由孤立的节点故障产生,并由故障相关性增强,很容易对网络性能造成破坏性影响。因此,人们提出了许多解决方案,如路由协议和恢复算法,通过识别绕过这些黑洞的替代路径来处理黑洞,从而减轻黑洞的影响。这些进步是基于一个基本前提,即网络中至少存在一条替代路径。然而,这样的假设仍然是一个悬而未决的问题。换句话说,我们不知道网络是否对黑洞有弹性,或者是否存在替代路径。这个问题的答案可以补充我们对设计路由协议的理解,以及在随机故障存在下的拓扑演变。为了解决这个问题,我们将重点放在认知无线电网络(crn)的拓扑结构上,因为它们在通过机会通信提高频谱效率方面具有显著的优势。具体而言,我们首先定义了两个度量,即故障发生概率p和故障连接函数g(·),分别表征节点故障及其传播特性。然后根据渗流理论证明了每个黑洞都是指数有界的。通过使用分支过程映射故障扩展,我们进一步导出了黑洞期望大小的上界。根据我们的分析结果,通过分析和模拟,我们能够找到在黑洞存在下弹性CRN的充分条件。
{"title":"Understanding Blackholes in large-scale Cognitive Radio Networks under generic failures","authors":"Lei Sun, Wenye Wang","doi":"10.1109/INFCOM.2013.6566859","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566859","url":null,"abstract":"It has been demonstrated that in wireless networks, Blackholes, which are typically generated by isolated node failures, and augmented by failure correlations, can easily result in devastating impact on network performance. Therefore, many solutions, such as routing protocols and restoration algorithms, are proposed to deal with Blackholes by identifying alternative paths to bypass these holes such that the effect of Blackholes can be mitigated. These advancements are based on an underlying premise that there exists at least one alternative path in the network. However, such a hypothesis remains an open question. In other words, we do not know whether the network is resilient to Blackholes or whether an alternative path exists. The answer to this question can complement our understanding of designing routing protocols, as well as topology evolution in the presence of random failures. In order to address this issue, we focus on the topology of Cognitive Radio Networks (CRNs) because of their phenomenal benefits in improving spectrum efficiency through opportunistic communications. Particularly, we first define two metrics, namely the failure occurrence probability p and failure connection function g(·), to characterize node failures and their spreading properties, respectively. Then we prove that each Blackhole is exponentially bounded based on percolation theory. By mapping failure spreading using a branching process, we further derive an upper bound on the expected size of Blackholes. With the observations from our analysis, we are able to find a sufficient condition for a resilient CRN in the presence of Blackholes through analysis and simulations.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128352642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Improving ReduceTask data locality for sequential MapReduce jobs 改善顺序MapReduce作业的ReduceTask数据局部性
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566959
Jian Tan, S. Meng, Xiaoqiao Meng, Li Zhang
Improving data locality for MapReduce jobs is critical for the performance of large-scale Hadoop clusters, embodying the principle of moving computation close to data for big data platforms. Scheduling tasks in the vicinity of stored data can significantly diminish network traffic, which is crucial for system stability and efficiency. Though the issue on data locality has been investigated extensively for MapTasks, most of the existing schedulers ignore data locality for ReduceTasks when fetching the intermediate data, causing performance degradation. This problem of reducing the fetching cost for ReduceTasks has been identified recently. However, the proposed solutions are exclusively based on a greedy approach, relying on the intuition to place ReduceTasks to the slots that are closest to the majority of the already generated intermediate data. The consequence is that, in presence of job arrivals and departures, assigning the ReduceTasks of the current job to the nodes with the lowest fetching cost can prevent a subsequent job with even better match of data locality from being launched on the already taken slots. To this end, we formulate a stochastic optimization framework to improve the data locality for ReduceTasks, with the optimal placement policy exhibiting a threshold-based structure. In order to ease the implementation, we further propose a receding horizon control policy based on the optimal solution under restricted conditions. The improved performance is further validated through simulation experiments and real performance tests on our testbed.
改善MapReduce作业的数据局部性对于大规模Hadoop集群的性能至关重要,体现了大数据平台将计算移向数据的原则。在存储数据附近调度任务可以显著减少网络流量,这对系统的稳定性和效率至关重要。尽管MapTasks的数据局部性问题已经得到了广泛的研究,但是大多数现有的调度器在获取中间数据时忽略了reducetask的数据局部性,从而导致性能下降。减少ReduceTasks获取成本的问题最近被发现了。然而,建议的解决方案完全基于贪婪方法,依靠直觉将reducetask放置到最接近大多数已经生成的中间数据的槽中。其结果是,在存在作业到达和离开的情况下,将当前作业的reducetask分配给获取成本最低的节点,可以防止在已经占用的槽上启动具有更好的数据位置匹配的后续作业。为此,我们制定了一个随机优化框架来改善reducetask的数据局部性,其中最优放置策略表现出基于阈值的结构。为了便于实施,我们进一步提出了一种基于受限条件下最优解的后退地平线控制策略。通过仿真实验和实际性能测试,进一步验证了改进后的性能。
{"title":"Improving ReduceTask data locality for sequential MapReduce jobs","authors":"Jian Tan, S. Meng, Xiaoqiao Meng, Li Zhang","doi":"10.1109/INFCOM.2013.6566959","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566959","url":null,"abstract":"Improving data locality for MapReduce jobs is critical for the performance of large-scale Hadoop clusters, embodying the principle of moving computation close to data for big data platforms. Scheduling tasks in the vicinity of stored data can significantly diminish network traffic, which is crucial for system stability and efficiency. Though the issue on data locality has been investigated extensively for MapTasks, most of the existing schedulers ignore data locality for ReduceTasks when fetching the intermediate data, causing performance degradation. This problem of reducing the fetching cost for ReduceTasks has been identified recently. However, the proposed solutions are exclusively based on a greedy approach, relying on the intuition to place ReduceTasks to the slots that are closest to the majority of the already generated intermediate data. The consequence is that, in presence of job arrivals and departures, assigning the ReduceTasks of the current job to the nodes with the lowest fetching cost can prevent a subsequent job with even better match of data locality from being launched on the already taken slots. To this end, we formulate a stochastic optimization framework to improve the data locality for ReduceTasks, with the optimal placement policy exhibiting a threshold-based structure. In order to ease the implementation, we further propose a receding horizon control policy based on the optimal solution under restricted conditions. The improved performance is further validated through simulation experiments and real performance tests on our testbed.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128390701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Ego networks in Twitter: An experimental analysis Twitter中的自我网络:一个实验分析
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6567181
V. Arnaboldi, M. Conti, A. Passarella, F. Pezzoni
Online Social Networks are amongst the most important platforms for maintaining social relationships online, supporting content generation and exchange between users. They are therefore natural candidate to be the basis of future humancentric networks and data exchange systems, in addition to novel forms of Internet services exploiting the properties of human social relationships. Understanding the structural properties of OSN and how they are influenced by human behaviour is thus fundamental to design such human-centred systems. In this paper we analyse a real Twitter data set to investigate whether well known structures of human social networks identified in “offline” environments can also be identified in the social networks maintained by users on Twitter. According to the well known model proposed by Dunbar, offline social networks are formed of circles of relationships having different social characteristics (e.g., intimacy, contact frequency and size). These circles can be directly ascribed to cognitive constraints of human brain, that impose limits on the number of social relationships maintainable at different levels of emotional closeness. Our results indicate that a similar structure can also be found in the Twitter users' social networks. This suggests that the structure of social networks also in online environments are controlled by the same cognitive properties of human brain that operate offline.
在线社交网络是维持在线社交关系的最重要平台之一,支持用户之间的内容生成和交换。因此,它们是未来以人为中心的网络和数据交换系统的自然候选基础,此外还有利用人类社会关系属性的新型互联网服务。因此,了解OSN的结构特性以及它们如何受到人类行为的影响是设计这种以人为中心的系统的基础。在本文中,我们分析了一个真实的Twitter数据集,以调查在“离线”环境中识别的已知人类社交网络结构是否也可以在Twitter用户维护的社交网络中识别。根据邓巴提出的著名模型,线下社交网络是由具有不同社会特征(如亲密度、联系频率和规模)的关系圈组成的。这些圈子可以直接归因于人类大脑的认知约束,这限制了在不同情感亲密程度上维持的社会关系的数量。我们的研究结果表明,在Twitter用户的社交网络中也可以发现类似的结构。这表明,在线环境中的社交网络结构也受到人类大脑在线下运作时相同的认知特性的控制。
{"title":"Ego networks in Twitter: An experimental analysis","authors":"V. Arnaboldi, M. Conti, A. Passarella, F. Pezzoni","doi":"10.1109/INFCOM.2013.6567181","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6567181","url":null,"abstract":"Online Social Networks are amongst the most important platforms for maintaining social relationships online, supporting content generation and exchange between users. They are therefore natural candidate to be the basis of future humancentric networks and data exchange systems, in addition to novel forms of Internet services exploiting the properties of human social relationships. Understanding the structural properties of OSN and how they are influenced by human behaviour is thus fundamental to design such human-centred systems. In this paper we analyse a real Twitter data set to investigate whether well known structures of human social networks identified in “offline” environments can also be identified in the social networks maintained by users on Twitter. According to the well known model proposed by Dunbar, offline social networks are formed of circles of relationships having different social characteristics (e.g., intimacy, contact frequency and size). These circles can be directly ascribed to cognitive constraints of human brain, that impose limits on the number of social relationships maintainable at different levels of emotional closeness. Our results indicate that a similar structure can also be found in the Twitter users' social networks. This suggests that the structure of social networks also in online environments are controlled by the same cognitive properties of human brain that operate offline.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128156067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Cooperative multi-hop relaying via network formation games in cognitive radio networks 认知无线网络中基于网络编队博弈的多跳协同中继
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566886
Wei Li, Xiuzhen Cheng, Tao Jing, Xiaoshuang Xing
The cooperation between the primary and the secondary users has attracted a lot of attention in cognitive radio networks. However, most existing research mainly focuses on the single-hop relay selection for a primary transmitter-receiver pair, which might not be able to fully explore the benefit brought by cooperative transmissions. In this paper, we study the problem of multi-hop relay selection by applying the network formation game. In order to mitigate interference and reduce delay, we propose a cooperation framework FTCO by considering the spectrum sharing in both the time and the frequency domain. Then we formulate the multi-hop relay selection problem as a network formation game, in which the multi-hop relay path is computed via performing the primary player's strategies in the form of link operations. We also devise a distributed dynamic algorithm PRADA to obtain a global-path stable network. Finally, we conduct extensive numerical experiments and our results indicate that cooperative multi-hop relaying can significantly benefit both the primary and the secondary network, and that the network graph resulted from our PRADA algorithm can achieve the global-path stability.
在认知无线网络中,主从用户之间的协作一直是人们关注的焦点。然而,现有的研究大多集中在主收发对的单跳中继选择上,可能无法充分挖掘合作传输带来的效益。本文利用网络编队博弈理论研究了多跳中继选择问题。为了减少干扰和延迟,我们提出了一种考虑时域和频域频谱共享的合作框架FTCO。然后将多跳中继选择问题表述为网络形成博弈,其中通过执行主参与者的链路操作策略来计算多跳中继路径。我们还设计了一种分布式动态算法PRADA,以获得全局路径稳定的网络。最后,我们进行了大量的数值实验,结果表明,合作多跳中继对主网络和从网络都有显著的好处,并且我们的PRADA算法得到的网络图可以实现全局路径稳定性。
{"title":"Cooperative multi-hop relaying via network formation games in cognitive radio networks","authors":"Wei Li, Xiuzhen Cheng, Tao Jing, Xiaoshuang Xing","doi":"10.1109/INFCOM.2013.6566886","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566886","url":null,"abstract":"The cooperation between the primary and the secondary users has attracted a lot of attention in cognitive radio networks. However, most existing research mainly focuses on the single-hop relay selection for a primary transmitter-receiver pair, which might not be able to fully explore the benefit brought by cooperative transmissions. In this paper, we study the problem of multi-hop relay selection by applying the network formation game. In order to mitigate interference and reduce delay, we propose a cooperation framework FTCO by considering the spectrum sharing in both the time and the frequency domain. Then we formulate the multi-hop relay selection problem as a network formation game, in which the multi-hop relay path is computed via performing the primary player's strategies in the form of link operations. We also devise a distributed dynamic algorithm PRADA to obtain a global-path stable network. Finally, we conduct extensive numerical experiments and our results indicate that cooperative multi-hop relaying can significantly benefit both the primary and the secondary network, and that the network graph resulted from our PRADA algorithm can achieve the global-path stability.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Scaling network-based spectrum analyzer with constant communication cost 基于恒通信成本的缩放网络频谱分析仪
Pub Date : 2013-04-14 DOI: 10.1109/INFCOM.2013.6566860
Youngjune Gwon, H. T. Kung
We propose a spectrum analyzer that leverages many networked commodity sensor nodes, each of which samples its portion in a wideband spectrum. The sensors operate in parallel and transmit their measurements over a wireless network without performing any significant computations such as FFT. The measurements are forwarded to the backend of the system where spectrum analysis takes place. In particular, we propose a solution that compresses the raw measurements in a simple random linear projection and combines the compressed measurements from multiple sensors in-network. As a result, we achieve a substantial reduction in the network bandwidth requirement to operate the proposed system. We discover that the overall communication cost can be independent of the number of sensors and is affected only by sparsity of discretized spectrum under analysis. This principle founds the basis for a claim that our network-based spectrum analyzer can scale up the number of sensor nodes to process a very wide spectrum block potentially having a GHz bandwidth. We devise a novel recovery algorithm that systematically undoes compressive encoding and in-network combining done to the raw measurements, incorporating the least squares and I1-minimization decoding used in compressive sensing, and demonstrate that the algorithm can effectively restore an accurate estimate of the original data suitable for finegrained spectrum analysis. We present mathematical analysis and empirical evaluation of the system with software-defined radios.
我们提出了一种利用许多联网商品传感器节点的频谱分析仪,每个节点在宽带频谱中采样其部分。传感器并行工作,并通过无线网络传输其测量结果,而无需执行任何重要的计算,如FFT。测量结果被转发到进行频谱分析的系统后端。特别是,我们提出了一种解决方案,将原始测量压缩到一个简单的随机线性投影中,并将来自网络中多个传感器的压缩测量组合在一起。因此,我们大大降低了运行所建议系统的网络带宽需求。我们发现总体通信成本与传感器数量无关,只受分析下离散频谱的稀疏度影响。这一原则为我们的基于网络的频谱分析仪可以扩展传感器节点的数量来处理可能具有GHz带宽的非常宽的频谱块奠定了基础。我们设计了一种新的恢复算法,该算法系统地取消了对原始测量进行的压缩编码和网络内组合,结合了压缩感知中使用的最小二乘和i -最小化解码,并证明该算法可以有效地恢复适合细粒度频谱分析的原始数据的准确估计。我们用软件定义无线电对系统进行了数学分析和经验评估。
{"title":"Scaling network-based spectrum analyzer with constant communication cost","authors":"Youngjune Gwon, H. T. Kung","doi":"10.1109/INFCOM.2013.6566860","DOIUrl":"https://doi.org/10.1109/INFCOM.2013.6566860","url":null,"abstract":"We propose a spectrum analyzer that leverages many networked commodity sensor nodes, each of which samples its portion in a wideband spectrum. The sensors operate in parallel and transmit their measurements over a wireless network without performing any significant computations such as FFT. The measurements are forwarded to the backend of the system where spectrum analysis takes place. In particular, we propose a solution that compresses the raw measurements in a simple random linear projection and combines the compressed measurements from multiple sensors in-network. As a result, we achieve a substantial reduction in the network bandwidth requirement to operate the proposed system. We discover that the overall communication cost can be independent of the number of sensors and is affected only by sparsity of discretized spectrum under analysis. This principle founds the basis for a claim that our network-based spectrum analyzer can scale up the number of sensor nodes to process a very wide spectrum block potentially having a GHz bandwidth. We devise a novel recovery algorithm that systematically undoes compressive encoding and in-network combining done to the raw measurements, incorporating the least squares and I1-minimization decoding used in compressive sensing, and demonstrate that the algorithm can effectively restore an accurate estimate of the original data suitable for finegrained spectrum analysis. We present mathematical analysis and empirical evaluation of the system with software-defined radios.","PeriodicalId":206346,"journal":{"name":"2013 Proceedings IEEE INFOCOM","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130125536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1