首页 > 最新文献

CHANTS '12最新文献

英文 中文
LoadingZones: leveraging street parking to enable vehicular internet access 装货区:利用路边停车场,让车辆可以上网
Pub Date : 2012-08-22 DOI: 10.1145/2348616.2348622
R. Crepaldi, Ryan Beavers, Braden Ehrat, M. Jaeger, S. Biersteker, R. Kravets
Internet connectivity is nowadays an ubiquitous service. However, on the road we obtain access using costly and limited data cellular network subscriptions. This, along with significant network congestion, severely limits network use. Opportunistic access to indoor APs is limited by three factors. First, establishing a link to an AP requires a significant amount of time, and, second, links on the street usually have poor quality. Third, the lifetime of this link is very short in a moving car, due to indoor APs generally covering small areas of the street. Combined, these factors thwart opportunistic use of APs for Internet access. In this paper, we propose a novel approach that leverages the large number of parked cars to separate these three factors and tackle them independently: a parked car can connect to an AP with a link that, despite its poor quality, has a long lifetime. A moving vehicle can instead benefit from the better link with a parked car and use it as a relay. As our experiments show, our approach enables the use of this free, high throughput channel for a number of non time-sensitive applications, thus reducing cost and the load on the cellular network.
如今,互联网连接是一项无处不在的服务。然而,在路上,我们获得访问使用昂贵和有限的数据蜂窝网络订阅。这与严重的网络拥塞一起严重限制了网络的使用。利用室内ap的机会受到三个因素的限制。首先,建立到AP的链接需要大量的时间,其次,街道上的链接通常质量很差。第三,在移动的汽车中,由于室内ap通常覆盖很小的街道区域,因此该链路的寿命非常短。综合起来,这些因素阻止了利用ap进行互联网接入的投机行为。在本文中,我们提出了一种新颖的方法,利用大量停放的汽车来分离这三个因素并独立解决它们:停放的汽车可以通过链接连接到AP,尽管其质量较差,但具有较长的寿命。移动的车辆可以从与停放的汽车更好的连接中获益,并将其用作中继。正如我们的实验所示,我们的方法可以将这种免费的高吞吐量信道用于许多非时间敏感的应用程序,从而降低了蜂窝网络的成本和负载。
{"title":"LoadingZones: leveraging street parking to enable vehicular internet access","authors":"R. Crepaldi, Ryan Beavers, Braden Ehrat, M. Jaeger, S. Biersteker, R. Kravets","doi":"10.1145/2348616.2348622","DOIUrl":"https://doi.org/10.1145/2348616.2348622","url":null,"abstract":"Internet connectivity is nowadays an ubiquitous service. However, on the road we obtain access using costly and limited data cellular network subscriptions. This, along with significant network congestion, severely limits network use. Opportunistic access to indoor APs is limited by three factors. First, establishing a link to an AP requires a significant amount of time, and, second, links on the street usually have poor quality. Third, the lifetime of this link is very short in a moving car, due to indoor APs generally covering small areas of the street. Combined, these factors thwart opportunistic use of APs for Internet access. In this paper, we propose a novel approach that leverages the large number of parked cars to separate these three factors and tackle them independently: a parked car can connect to an AP with a link that, despite its poor quality, has a long lifetime. A moving vehicle can instead benefit from the better link with a parked car and use it as a relay. As our experiments show, our approach enables the use of this free, high throughput channel for a number of non time-sensitive applications, thus reducing cost and the load on the cellular network.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126756378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive usage of cellular and WiFi bandwidth: an optimal scheduling formulation 蜂窝和WiFi带宽的自适应使用:最优调度公式
Pub Date : 2012-08-22 DOI: 10.1145/2348616.2348631
Ozlem Bilgir, M. Martonosi
Worldwide, mobile data connectivity is now widespread, but not yet ubiquitous due to coverage limits and cost concerns. Mobile data offloading to WiFi---where available---could greatly decrease the usage of cellular data networks. In delay-tolerant applications, one could delay network communication in order to exploit free WiFi connections expected to appear soon. However, WiFi connectivity is limited, and even delay-tolerant applications must meet quality-of-service deadlines. To explore such bandwidth scheduling issues, we develop an optimal MILP-based scheduling framework. Our framework schedules multiple application data streams with varying size and delay tolerance, onto networks with varying coverage and bandwidth, in order to minimize cellular data usage. The ability to subdivide data streams into scheduling units is important, because it allows applications to exploit brief windows of WiFi coverage and it allows tradeoffs between solution quality and solver runtime.
在全球范围内,移动数据连接现在很普遍,但由于覆盖范围限制和成本问题,尚未普及。移动数据卸载到WiFi(如果有的话)可以大大减少蜂窝数据网络的使用。在延迟容忍应用程序中,可以延迟网络通信,以利用预计很快出现的免费WiFi连接。然而,WiFi连接是有限的,甚至延迟容忍应用程序也必须满足服务质量的最后期限。为了探索这种带宽调度问题,我们开发了一个基于milp的最佳调度框架。我们的框架将不同大小和延迟容忍度的多个应用程序数据流调度到不同覆盖和带宽的网络上,以最大限度地减少蜂窝数据的使用。将数据流细分为调度单元的能力非常重要,因为它允许应用程序利用WiFi覆盖的短暂窗口,并且允许在解决方案质量和求解器运行时间之间进行权衡。
{"title":"Adaptive usage of cellular and WiFi bandwidth: an optimal scheduling formulation","authors":"Ozlem Bilgir, M. Martonosi","doi":"10.1145/2348616.2348631","DOIUrl":"https://doi.org/10.1145/2348616.2348631","url":null,"abstract":"Worldwide, mobile data connectivity is now widespread, but not yet ubiquitous due to coverage limits and cost concerns. Mobile data offloading to WiFi---where available---could greatly decrease the usage of cellular data networks. In delay-tolerant applications, one could delay network communication in order to exploit free WiFi connections expected to appear soon. However, WiFi connectivity is limited, and even delay-tolerant applications must meet quality-of-service deadlines. To explore such bandwidth scheduling issues, we develop an optimal MILP-based scheduling framework. Our framework schedules multiple application data streams with varying size and delay tolerance, onto networks with varying coverage and bandwidth, in order to minimize cellular data usage. The ability to subdivide data streams into scheduling units is important, because it allows applications to exploit brief windows of WiFi coverage and it allows tradeoffs between solution quality and solver runtime.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131950934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Adaptive user anonymity for mobile opportunistic networks 移动机会网络的自适应用户匿名
Pub Date : 2012-08-22 DOI: 10.1145/2348616.2348635
M. Radenkovic, I. Vaghi
Current mobile opportunistic networks often use social routing protocols to transfer messages among users and to the services. In the face of changing underlying topology, mobility patterns and density of users and their queries, fixed algorithms for user anonymisation cannot provide sufficient level of user anonymity, and adaptive mechanisms for achieving user anonymity are needed. This paper describes a novel flexible and adaptive approach, AdaptAnon that is suitable for dynamic and heterogeneous mobile opportunistic networks. Our approach is multidimensional and combines multiple heuristics based on user profiles, analysis of user connectivity and history of anonymisation in order to predict and decide on the best set of nodes that can help anonymise the sending node. In our demonstration, we show that AdaptAnon achieves high quality of anonymisation in terms of both the number of nodes and the diversity of nodes in the anonymisation layer for varying query intensity and over live San Francisco cab mobility traces while neither decreasing success ratios nor increasing latency. We also compare AdaptAnon to other state of the art single dimensional anonymisation approaches and do real time visualization of performance parameters.
当前的移动机会网络通常使用社交路由协议在用户之间和服务之间传输消息。面对底层拓扑结构、移动模式和用户及其查询密度的变化,固定的用户匿名算法无法提供足够的用户匿名水平,需要自适应机制来实现用户匿名。本文介绍了一种适用于动态和异构移动机会网络的灵活自适应的新方法——AdaptAnon。我们的方法是多维的,结合了基于用户配置文件、用户连接分析和匿名历史的多种启发式方法,以预测和决定可以帮助匿名发送节点的最佳节点集。在我们的演示中,我们展示了AdaptAnon在匿名层的节点数量和节点多样性方面实现了高质量的匿名,用于不同的查询强度和实时旧金山出租车移动跟踪,同时既没有降低成功率,也没有增加延迟。我们还将AdaptAnon与其他最先进的单维匿名方法进行了比较,并对性能参数进行了实时可视化。
{"title":"Adaptive user anonymity for mobile opportunistic networks","authors":"M. Radenkovic, I. Vaghi","doi":"10.1145/2348616.2348635","DOIUrl":"https://doi.org/10.1145/2348616.2348635","url":null,"abstract":"Current mobile opportunistic networks often use social routing protocols to transfer messages among users and to the services. In the face of changing underlying topology, mobility patterns and density of users and their queries, fixed algorithms for user anonymisation cannot provide sufficient level of user anonymity, and adaptive mechanisms for achieving user anonymity are needed. This paper describes a novel flexible and adaptive approach, AdaptAnon that is suitable for dynamic and heterogeneous mobile opportunistic networks. Our approach is multidimensional and combines multiple heuristics based on user profiles, analysis of user connectivity and history of anonymisation in order to predict and decide on the best set of nodes that can help anonymise the sending node. In our demonstration, we show that AdaptAnon achieves high quality of anonymisation in terms of both the number of nodes and the diversity of nodes in the anonymisation layer for varying query intensity and over live San Francisco cab mobility traces while neither decreasing success ratios nor increasing latency. We also compare AdaptAnon to other state of the art single dimensional anonymisation approaches and do real time visualization of performance parameters.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131158810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Time-reference distribution in delay tolerant networks 时延容忍网络中的时间参考分布
Pub Date : 2012-08-22 DOI: 10.1145/2348616.2348618
J. Morgenroth, L. Wolf
A delay tolerant network (DTN) deals with the issue of frequently interrupted connections and relaxes the need for a continuous end-to-end relation between nodes. The Bundle Protocol is the typical way to set-up a DTN, but requires a common time in the whole network. Further, globally synchronized timestamps are required by many mechanisms like cryptography protocols or global event ordering. Since standard time synchronization approaches from classical networking do not work in DTNs, we introduce a novel algorithm to distribute a time reference in such networks. Our approach rates the quality of the local time with respect to the accuracy of the local clock. We show that this simple and self-aligning algorithm can provide an adequate accuracy depending on the inter-contact times between the nodes.
容忍延迟网络(delay tolerance network, DTN)处理频繁中断连接的问题,减少了对节点之间连续的端到端关系的需求。捆绑协议是建立DTN的典型方式,但需要在整个网络中共用一个时间。此外,许多机制(如加密协议或全局事件排序)都需要全局同步的时间戳。由于经典网络中的标准时间同步方法在DTNs中不起作用,我们引入了一种新的算法来在这种网络中分配时间参考。我们的方法是根据当地时钟的准确性来评估当地时间的质量。我们证明了这种简单的自对准算法可以根据节点之间的相互接触时间提供足够的精度。
{"title":"Time-reference distribution in delay tolerant networks","authors":"J. Morgenroth, L. Wolf","doi":"10.1145/2348616.2348618","DOIUrl":"https://doi.org/10.1145/2348616.2348618","url":null,"abstract":"A delay tolerant network (DTN) deals with the issue of frequently interrupted connections and relaxes the need for a continuous end-to-end relation between nodes. The Bundle Protocol is the typical way to set-up a DTN, but requires a common time in the whole network. Further, globally synchronized timestamps are required by many mechanisms like cryptography protocols or global event ordering.\u0000 Since standard time synchronization approaches from classical networking do not work in DTNs, we introduce a novel algorithm to distribute a time reference in such networks. Our approach rates the quality of the local time with respect to the accuracy of the local clock. We show that this simple and self-aligning algorithm can provide an adequate accuracy depending on the inter-contact times between the nodes.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128862394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SCAMPI application platform SCAMPI应用平台
Pub Date : 2012-08-22 DOI: 10.1145/2348616.2348636
Teemu Kärkkäinen, M. Pitkänen, P. Houghton, J. Ott
In this paper we demonstrate an application platform architecture and implementation that allows developers to easily target opportunistic networks. The platform includes an opportunistic router, HTML5 application development framework, and an opportunistic application market for distributing applications. We demonstrate the platform and multiple HTML5 applications -- including chat, music and social networking applications -- running on Android devices.
在本文中,我们展示了一个应用程序平台架构和实现,它允许开发人员轻松地瞄准机会主义网络。该平台包括一个机会路由器、HTML5应用开发框架和一个机会应用市场,用于分发应用程序。我们展示了该平台和多个HTML5应用程序——包括聊天、音乐和社交网络应用程序——在Android设备上运行。
{"title":"SCAMPI application platform","authors":"Teemu Kärkkäinen, M. Pitkänen, P. Houghton, J. Ott","doi":"10.1145/2348616.2348636","DOIUrl":"https://doi.org/10.1145/2348616.2348636","url":null,"abstract":"In this paper we demonstrate an application platform architecture and implementation that allows developers to easily target opportunistic networks. The platform includes an opportunistic router, HTML5 application development framework, and an opportunistic application market for distributing applications. We demonstrate the platform and multiple HTML5 applications -- including chat, music and social networking applications -- running on Android devices.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122365382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Flow control mechanisms for the bundle protocol in IEEE 802.15.4 low-power networks IEEE 802.15.4低功耗网络中束协议的流量控制机制
Pub Date : 2012-08-22 DOI: 10.1145/2348616.2348630
Wolf-Bastian Pöttner, L. Wolf
Wireless Sensor Networks are networks formed by wireless sensor nodes that generally feature a low-power microcontroller and an IEEE 802.15.4 radio. Most Delay Tolerant Wireless Sensor Networks in literature use proprietary protocols that are specifically designed for a single purpose. In this paper we explore, how the Bundle Protocol can be used on top of the IEEE 802.15.4 PHY and MAC layers, while avoiding overhead for additional layers in between. To pursue this, a Convergence Layer has to realize certain tasks that usually are dealt with in layers 3 and 4 of the OSI 7-layer protocol stack. We argue that flow control has to be an integral ingredient of the Convergence Layer and compare the performance of four different mechanisms using our Bundle Protocol implementation for Contiki.
无线传感器网络是由无线传感器节点组成的网络,通常具有低功耗微控制器和IEEE 802.15.4无线电。文献中大多数容忍延迟无线传感器网络使用专门为单一目的设计的专有协议。在本文中,我们探讨了如何在IEEE 802.15.4物理层和MAC层之上使用束协议,同时避免在两者之间额外层的开销。为了实现这一点,汇聚层必须实现通常在OSI 7层协议栈的第3层和第4层处理的某些任务。我们认为流量控制必须是收敛层的一个组成部分,并使用我们的Bundle Protocol实现来比较四种不同机制的性能。
{"title":"Flow control mechanisms for the bundle protocol in IEEE 802.15.4 low-power networks","authors":"Wolf-Bastian Pöttner, L. Wolf","doi":"10.1145/2348616.2348630","DOIUrl":"https://doi.org/10.1145/2348616.2348630","url":null,"abstract":"Wireless Sensor Networks are networks formed by wireless sensor nodes that generally feature a low-power microcontroller and an IEEE 802.15.4 radio. Most Delay Tolerant Wireless Sensor Networks in literature use proprietary protocols that are specifically designed for a single purpose. In this paper we explore, how the Bundle Protocol can be used on top of the IEEE 802.15.4 PHY and MAC layers, while avoiding overhead for additional layers in between. To pursue this, a Convergence Layer has to realize certain tasks that usually are dealt with in layers 3 and 4 of the OSI 7-layer protocol stack. We argue that flow control has to be an integral ingredient of the Convergence Layer and compare the performance of four different mechanisms using our Bundle Protocol implementation for Contiki.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130201672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pocket backup storage system with cloud integration 与云集成的袖珍备份存储系统
Pub Date : 2012-08-22 DOI: 10.1145/2348616.2348633
Karthik Nilakant, Eiko Yoneki
A variety of personal backup services now allow users to synchronise their files across multiple devices such as laptops and smartphones. These applications typically operate by synchronising each device with a centralised storage service across the Internet. However, access to the Internet may occasionally not be available, leaving any unsynchronised content in a vulnerable state. To address this, we introduce a cooperative backup storage system that could alternatively make use of storage capacity provided by other devices within close proximity, using ad-hoc or local network connectivity. Such devices can provide a secondary storage tier in case of Internet connectivity issues, and could also be used to forward files to central storage at a later time.
各种各样的个人备份服务现在允许用户在笔记本电脑和智能手机等多个设备上同步他们的文件。这些应用程序通常通过将每个设备与互联网上的集中存储服务同步来运行。然而,访问互联网可能偶尔不可用,使任何未同步的内容处于易受攻击的状态。为了解决这个问题,我们引入了一种协作式备份存储系统,该系统可以利用就近的其他设备提供的存储容量,使用ad-hoc或本地网络连接。这样的设备可以在Internet连接问题的情况下提供二级存储层,并且还可以用于在以后将文件转发到中央存储。
{"title":"Pocket backup storage system with cloud integration","authors":"Karthik Nilakant, Eiko Yoneki","doi":"10.1145/2348616.2348633","DOIUrl":"https://doi.org/10.1145/2348616.2348633","url":null,"abstract":"A variety of personal backup services now allow users to synchronise their files across multiple devices such as laptops and smartphones. These applications typically operate by synchronising each device with a centralised storage service across the Internet. However, access to the Internet may occasionally not be available, leaving any unsynchronised content in a vulnerable state. To address this, we introduce a cooperative backup storage system that could alternatively make use of storage capacity provided by other devices within close proximity, using ad-hoc or local network connectivity. Such devices can provide a secondary storage tier in case of Internet connectivity issues, and could also be used to forward files to central storage at a later time.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116532859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Free-riding the BitTorrent DHT to improve DTN connectivity 免费使用BitTorrent DHT来改善DTN连接
Pub Date : 2012-08-22 DOI: 10.1145/2348616.2348619
S. Schildt, Till Lorentzen, J. Morgenroth, Wolf-Bastian Pöttner, L. Wolf
Until now there exists no standardized or widely-used name resolution mechanism for Bundle Protocol based DTNs. In local IP based networks the IP Neighbor Discovery (IPND) protocol provides link-local discovery of DTN neighbors, however in the Internet there is no mechanism that maps Bundle Protocol addresses (EIDs) to Convergence Layer addresses. This seriously hampers connectivity in the DTNBone. In this paper we argue, that a DHT-based naming mechanism is a good fit for DTN networks. We show the advantages of using the existing DHT infrastructure from the BitTorrent file sharing network as a basis instead of rolling out a custom solution. We will present experiences and performance measures with a lightweight implementation of the proposed system that we began to distribute as integrated component of the IBR-DTN Bundle Protocol implementation.
到目前为止,还没有针对基于Bundle Protocol的ddn的标准化或广泛使用的名称解析机制。在基于本地IP的网络中,IP邻居发现(IPND)协议提供DTN邻居的链路本地发现,但是在Internet中没有将捆绑协议地址(eid)映射到收敛层地址的机制。这严重阻碍了DTNBone的连接。在本文中,我们认为基于dht的命名机制非常适合DTN网络。我们展示了使用来自BitTorrent文件共享网络的现有DHT基础设施作为基础的优势,而不是推出自定义解决方案。我们将介绍轻量级实施拟议系统的经验和绩效衡量标准,我们已开始将该系统作为IBR-DTN捆绑协议实施的集成组成部分进行分发。
{"title":"Free-riding the BitTorrent DHT to improve DTN connectivity","authors":"S. Schildt, Till Lorentzen, J. Morgenroth, Wolf-Bastian Pöttner, L. Wolf","doi":"10.1145/2348616.2348619","DOIUrl":"https://doi.org/10.1145/2348616.2348619","url":null,"abstract":"Until now there exists no standardized or widely-used name resolution mechanism for Bundle Protocol based DTNs. In local IP based networks the IP Neighbor Discovery (IPND) protocol provides link-local discovery of DTN neighbors, however in the Internet there is no mechanism that maps Bundle Protocol addresses (EIDs) to Convergence Layer addresses. This seriously hampers connectivity in the DTNBone.\u0000 In this paper we argue, that a DHT-based naming mechanism is a good fit for DTN networks. We show the advantages of using the existing DHT infrastructure from the BitTorrent file sharing network as a basis instead of rolling out a custom solution. We will present experiences and performance measures with a lightweight implementation of the proposed system that we began to distribute as integrated component of the IBR-DTN Bundle Protocol implementation.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Is it worth taking a planned approach to design ad hoc infrastructure for post disaster communication? 是否值得采用一种有计划的方法来为灾后通信设计特别的基础设施?
Pub Date : 2012-08-22 DOI: 10.1145/2348616.2348637
Sujoy Saha, V. Shah, Rohit Verma, Ratna Mandal, S. Nandi
After any natural disaster the availability of existing conventional communication infrastructure almost gets ruled out. After the devastation, to restore the communication system in ad hoc basis; ensuring almost 100% packet delivery within acceptable latency with optimal utilization of resources are prime design motives. Our work proposes a four tier planned hybrid architecture, which conforms the aforesaid motives yielding a desired performance in terms of delivery probability within least latency, for a given disaster hit area map with a suitable heuristic algorithm. Our study also reveals that there exists no deterministic polynomial time solution that can implement the desired design motives as well as the feasibility of our planned methodology. Compared to any brute force strategy, as per the simulation results, our approach shows 42% higher delivery probability and 49% lower latency.
在任何自然灾害之后,现有的传统通信基础设施的可用性几乎被排除在外。灾后,临时恢复通讯系统;在可接受的延迟内确保几乎100%的数据包传输并优化资源利用率是主要的设计动机。我们的工作提出了一个四层计划混合架构,它符合上述动机,在最小延迟的交付概率方面产生期望的性能,对于给定的灾害灾区地图,使用合适的启发式算法。我们的研究还表明,不存在确定性的多项式时间解,可以实现期望的设计动机以及我们计划的方法的可行性。与任何暴力破解策略相比,根据仿真结果,我们的方法显示42%的高交付概率和49%的低延迟。
{"title":"Is it worth taking a planned approach to design ad hoc infrastructure for post disaster communication?","authors":"Sujoy Saha, V. Shah, Rohit Verma, Ratna Mandal, S. Nandi","doi":"10.1145/2348616.2348637","DOIUrl":"https://doi.org/10.1145/2348616.2348637","url":null,"abstract":"After any natural disaster the availability of existing conventional communication infrastructure almost gets ruled out. After the devastation, to restore the communication system in ad hoc basis; ensuring almost 100% packet delivery within acceptable latency with optimal utilization of resources are prime design motives. Our work proposes a four tier planned hybrid architecture, which conforms the aforesaid motives yielding a desired performance in terms of delivery probability within least latency, for a given disaster hit area map with a suitable heuristic algorithm. Our study also reveals that there exists no deterministic polynomial time solution that can implement the desired design motives as well as the feasibility of our planned methodology. Compared to any brute force strategy, as per the simulation results, our approach shows 42% higher delivery probability and 49% lower latency.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126387780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A performance comparison of DTN bundle protocol implementations on resource constrained nodes 资源受限节点上DTN束协议实现的性能比较
Pub Date : 2012-08-22 DOI: 10.1145/2348616.2348634
Gleneesha M. Johnson Williams, B. Walker, Angela Hennessy
As delay-tolerant networking (DTN) finds applications in a wider variety of environments, DTN implementations have been ported to a variety of devices. Performance testing of DTN implementations has typically been carried out on powerful hardware, but there have been few performance evaluations on resource-constrained devices. We present the results of experiments comparing two of the major open-source DTN implementations, DTN2 and IBR-DTN, on resource-constrained nodes. The comparison is in terms of storage and receive performance, as well as network throughput.
随着容忍延迟网络(DTN)在更广泛的环境中得到应用,DTN实现已被移植到各种设备上。DTN实现的性能测试通常在功能强大的硬件上进行,但很少在资源受限的设备上进行性能评估。我们展示了在资源受限节点上比较两种主要开源DTN实现(DTN2和IBR-DTN)的实验结果。比较是在存储和接收性能以及网络吞吐量方面。
{"title":"A performance comparison of DTN bundle protocol implementations on resource constrained nodes","authors":"Gleneesha M. Johnson Williams, B. Walker, Angela Hennessy","doi":"10.1145/2348616.2348634","DOIUrl":"https://doi.org/10.1145/2348616.2348634","url":null,"abstract":"As delay-tolerant networking (DTN) finds applications in a wider variety of environments, DTN implementations have been ported to a variety of devices. Performance testing of DTN implementations has typically been carried out on powerful hardware, but there have been few performance evaluations on resource-constrained devices. We present the results of experiments comparing two of the major open-source DTN implementations, DTN2 and IBR-DTN, on resource-constrained nodes. The comparison is in terms of storage and receive performance, as well as network throughput.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121067856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
CHANTS '12
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1