首页 > 最新文献

2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)最新文献

英文 中文
Optimization of Wi-Fi access point placement in an indoor environment 室内环境中Wi-Fi接入点放置的优化
A. Chariete, V. Guillet, Jean-Yves Thiriet
In this paper, we propose an optimization approach for designing WLAN networks in an Indoor environment. This approach integrates all relevant parameters to find the optimal placement of access points, there optimum settings (transmission power, azimuth, radiation patterns, etc.) and the optimal allocation of channels while maximizing the coverage, minimizing the interference and minimizing the number of access points to install. Our approach was evaluated when planning a WLAN 802.11 an with a 5GHz band and 20MHz bandwidth on a 5-story building. The results show the effectiveness of our approach to quickly plan a high quality WLANs.
本文提出了一种室内环境下无线局域网网络的优化设计方法。该方法集成了所有相关参数,以找到接入点的最佳位置、最佳设置(发射功率、方位角、辐射模式等)和通道的最佳分配,同时最大化覆盖范围、最小化干扰和最小化要安装的接入点数量。在规划5层楼的5GHz频段和20MHz带宽的WLAN 802.11 an时,对我们的方法进行了评估。结果表明,该方法能够快速规划出高质量的无线局域网。
{"title":"Optimization of Wi-Fi access point placement in an indoor environment","authors":"A. Chariete, V. Guillet, Jean-Yves Thiriet","doi":"10.1109/NOTERE.2016.7745827","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745827","url":null,"abstract":"In this paper, we propose an optimization approach for designing WLAN networks in an Indoor environment. This approach integrates all relevant parameters to find the optimal placement of access points, there optimum settings (transmission power, azimuth, radiation patterns, etc.) and the optimal allocation of channels while maximizing the coverage, minimizing the interference and minimizing the number of access points to install. Our approach was evaluated when planning a WLAN 802.11 an with a 5GHz band and 20MHz bandwidth on a 5-story building. The results show the effectiveness of our approach to quickly plan a high quality WLANs.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new approach to investigate IoT threats based on a four layer model 基于四层模型调查物联网威胁的新方法
Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, P. Urien
This paper is a first attempt to define a set of security vulnerabilities for the Internet of Things (IoT), in a corporate environment, in order to classify various connected objects based on a taxonomy that was previously proposed. The IoT is a complex infrastructure that we divide in four parts (objects, transport, storage, interfaces). It needs protection and supervision. The object and its ecosystem are surrounded with other devices that can become entry points or targets of attacks, even if they are protected from the outer world but not from their local environment. We study the impact of attacks (such as OS reprogramming that has been recently published) on connected thermostats and their possible consequences on their environment, as a first approach to a threat analysis for the IoT.
本文首次尝试为企业环境中的物联网(IoT)定义一组安全漏洞,以便根据先前提出的分类法对各种连接对象进行分类。物联网是一个复杂的基础设施,我们将其分为四个部分(对象、传输、存储、接口)。它需要保护和监督。物体及其生态系统被其他设备包围,这些设备可能成为攻击的入口或目标,即使它们受到外部世界的保护,但却没有受到本地环境的保护。我们研究了攻击(例如最近发布的操作系统重新编程)对连接恒温器的影响及其对环境的可能后果,作为物联网威胁分析的第一种方法。
{"title":"A new approach to investigate IoT threats based on a four layer model","authors":"Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, P. Urien","doi":"10.1109/NOTERE.2016.7745830","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745830","url":null,"abstract":"This paper is a first attempt to define a set of security vulnerabilities for the Internet of Things (IoT), in a corporate environment, in order to classify various connected objects based on a taxonomy that was previously proposed. The IoT is a complex infrastructure that we divide in four parts (objects, transport, storage, interfaces). It needs protection and supervision. The object and its ecosystem are surrounded with other devices that can become entry points or targets of attacks, even if they are protected from the outer world but not from their local environment. We study the impact of attacks (such as OS reprogramming that has been recently published) on connected thermostats and their possible consequences on their environment, as a first approach to a threat analysis for the IoT.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Strong authentication for mobile cloud computing 移动云计算的强认证
Anis Ahmed-Nacer, Mehdi Ahmed-Nacer
Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, written down and stolen, eavesdropped or deliberately being told to other people. In this article, we propose a solution in order to improve authentication in mobile cloud computing and mainly resolves men in the middle attack. This solution is inspired by the authentication algorithms studied in 3G (the 3rd Generation) and TLS (Transport Layer Security) to secure the data exchanged in the network. These algorithms ensure a strong authentication before stating the communication. However, a sensitive data in the network can also be exchanged during the communication. To ensure a strong authentication during a communication, the multi-scale Situation Identification from Context (muSIC) system is used to detect the suspect behavior of the users.
如今,身份验证已经成为移动云计算中的一个主要挑战。在云提供商中使用静态密码进行身份验证存在几个安全缺陷:密码可能被遗忘、猜测、写下来并被窃取、窃听或故意告诉其他人。本文提出了一种改进移动云计算认证的解决方案,主要解决了中间人攻击问题。该解决方案的灵感来自3G(第三代)和TLS(传输层安全)中研究的身份验证算法,以保护网络中交换的数据。这些算法确保在声明通信之前进行强认证。但是,在通信过程中也会交换网络中的敏感数据。为了确保通信过程中的强认证,采用多尺度情境识别(muSIC)系统来检测用户的可疑行为。
{"title":"Strong authentication for mobile cloud computing","authors":"Anis Ahmed-Nacer, Mehdi Ahmed-Nacer","doi":"10.1109/NOTERE.2016.7745824","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745824","url":null,"abstract":"Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, written down and stolen, eavesdropped or deliberately being told to other people. In this article, we propose a solution in order to improve authentication in mobile cloud computing and mainly resolves men in the middle attack. This solution is inspired by the authentication algorithms studied in 3G (the 3rd Generation) and TLS (Transport Layer Security) to secure the data exchanged in the network. These algorithms ensure a strong authentication before stating the communication. However, a sensitive data in the network can also be exchanged during the communication. To ensure a strong authentication during a communication, the multi-scale Situation Identification from Context (muSIC) system is used to detect the suspect behavior of the users.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
HTTP/1.1 pipelining vs HTTP2 in-the-clear: Performance comparison HTTP/1.1管道与明确的HTTP2:性能比较
Romuald Corbel, Emile Stephan, N. Omnès
The average Web Page size is constantly increasing: it doubled between January 2012 and January 2015 [1]. In such a context the transport of the Internet traffic becomes very challenging. To moderate the impact of the increase of traffic on end-users' Quality of Experience (QoE), the IETF specified the protocol HTTP2, which optimizes the transfer of the HTTP1 protocol. In this paper we provide a comparison of HTTP1 and HTTP2, both in terms of functionalities and in terms of Page Download Time (PDT). As end-to-end encryption is not always required, this comparison is provided in-the-clear. To avoid any bias in the comparison, our measurements are made with the same hardware, the same software and the same transport conditions (multiplexing over a single TCP connection per domain). Based on our measurement, we show that HTTP2 always highlights better performances that HTTP1. More precisely, we observe the HTTP2 PDT remains 15% lower than HTTP1 PDT as the network delay increases. Furthermore, we observe that the ratio of HTTP2 PDT to HTTP1 PDT decreases as the packet loss increases, showing that HTTP2 is more resilient to packet loss than HTTP1.
网页的平均大小在不断增加:从2012年1月到2015年1月,网页大小翻了一番。在这样的背景下,互联网流量的传输变得非常具有挑战性。为了缓和流量增加对终端用户体验质量(QoE)的影响,IETF指定了HTTP2协议,该协议优化了HTTP1协议的传输。在本文中,我们从功能和页面下载时间(PDT)两方面对HTTP1和HTTP2进行了比较。由于并不总是需要端到端加密,因此这种比较是明确提供的。为了避免比较中的任何偏差,我们的测量使用相同的硬件,相同的软件和相同的传输条件(在每个域的单个TCP连接上进行多路复用)。根据我们的测量,我们发现HTTP2总是比HTTP1表现出更好的性能。更准确地说,我们观察到,随着网络延迟的增加,HTTP2 PDT仍然比HTTP1 PDT低15%。此外,我们观察到HTTP2 PDT与HTTP1 PDT的比率随着丢包的增加而降低,这表明HTTP2比HTTP1更能适应丢包。
{"title":"HTTP/1.1 pipelining vs HTTP2 in-the-clear: Performance comparison","authors":"Romuald Corbel, Emile Stephan, N. Omnès","doi":"10.1109/NOTERE.2016.7745823","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745823","url":null,"abstract":"The average Web Page size is constantly increasing: it doubled between January 2012 and January 2015 [1]. In such a context the transport of the Internet traffic becomes very challenging. To moderate the impact of the increase of traffic on end-users' Quality of Experience (QoE), the IETF specified the protocol HTTP2, which optimizes the transfer of the HTTP1 protocol. In this paper we provide a comparison of HTTP1 and HTTP2, both in terms of functionalities and in terms of Page Download Time (PDT). As end-to-end encryption is not always required, this comparison is provided in-the-clear. To avoid any bias in the comparison, our measurements are made with the same hardware, the same software and the same transport conditions (multiplexing over a single TCP connection per domain). Based on our measurement, we show that HTTP2 always highlights better performances that HTTP1. More precisely, we observe the HTTP2 PDT remains 15% lower than HTTP1 PDT as the network delay increases. Furthermore, we observe that the ratio of HTTP2 PDT to HTTP1 PDT decreases as the packet loss increases, showing that HTTP2 is more resilient to packet loss than HTTP1.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131122419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Automated application offloading through ant-inspired decision-making 通过反激励决策自动卸载应用程序
Roya Golchay, Frédéric Le Mouël, Julien Ponge, N. Stouls
The explosive trend of smartphone usage as the most effective and convenient communication tools of human life in recent years make developers build ever more complex smartphone applications. Gaming, navigation, video editing, augmented reality, and speech recognition applications require considerable computational power and energy. Although smartphones have a wide range of capabilities - GPS, WiFi, cameras their inherent limitations - frequent disconnections, mobility - and significant constraints - size, lower weights, longer battery life make difficult to exploiting their full potential to run complex applications. Several research works have proposed solutions in application offloading domain, but few ones concerning the highly changing properties of the environment. To address these issues, we realize an automated application offloading middleware, ACOMMA, with dynamic and re-adaptable decision-making engine. The decision engine of ACOMMA is based on an ant-inspired algorithm.
近年来,智能手机作为人类生活中最有效、最方便的通信工具,其使用呈爆炸式增长趋势,这使得开发人员开发出越来越复杂的智能手机应用程序。游戏、导航、视频编辑、增强现实和语音识别应用需要相当大的计算能力和能量。尽管智能手机具有广泛的功能——GPS、WiFi、摄像头——但它们固有的局限性——频繁断开、移动性——以及显著的限制——尺寸、重量更轻、电池寿命更长,使得它们难以充分发挥其运行复杂应用程序的潜力。一些研究工作已经提出了应用卸载领域的解决方案,但很少有研究涉及到环境的高度变化特性。为了解决这些问题,我们实现了一个自动化的应用卸载中间件ACOMMA,它具有动态和可重新适应的决策引擎。ACOMMA的决策引擎基于一种蚁群算法。
{"title":"Automated application offloading through ant-inspired decision-making","authors":"Roya Golchay, Frédéric Le Mouël, Julien Ponge, N. Stouls","doi":"10.1109/NOTERE.2016.7745831","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745831","url":null,"abstract":"The explosive trend of smartphone usage as the most effective and convenient communication tools of human life in recent years make developers build ever more complex smartphone applications. Gaming, navigation, video editing, augmented reality, and speech recognition applications require considerable computational power and energy. Although smartphones have a wide range of capabilities - GPS, WiFi, cameras their inherent limitations - frequent disconnections, mobility - and significant constraints - size, lower weights, longer battery life make difficult to exploiting their full potential to run complex applications. Several research works have proposed solutions in application offloading domain, but few ones concerning the highly changing properties of the environment. To address these issues, we realize an automated application offloading middleware, ACOMMA, with dynamic and re-adaptable decision-making engine. The decision engine of ACOMMA is based on an ant-inspired algorithm.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117209432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Acadoop, a lightweight MapReduce framework for education and prototyping Acadoop,用于教育和原型设计的轻量级MapReduce框架
Zakaria Aarab, Walid El Haimouti, Hamza Idbenouakrim, Aissam Ouinou, Ayoub Ratbi, Philippe Maurant, A. Tchana
We present Acadoop, a lightweight MapReduce framework, which offers the main features of the Hadoop framework, and follows its architecture. The purpose of this lightening is mainly educational : it aims at enabling students to understand more easily the design of such frameworks, and to experiment with the behaviour of the applications that run on these frameworks. A further benefit of this lightening is that Acadoop provides a simple tool for prototyping and assessing scheduling policies for the MapReduce framework. We give a few simple examples of comparisons between scheduling policies, in order to illustrate Acadoop's possibilities with regard to both education and prototyping. In conclusion, we present the context in which Acadoop was developped, and present some lines for further improvement.
我们介绍了Acadoop,一个轻量级的MapReduce框架,它提供了Hadoop框架的主要特性,并遵循其架构。这种简化的目的主要是教育:它旨在使学生能够更容易地理解这些框架的设计,并实验运行在这些框架上的应用程序的行为。这种简化的另一个好处是,Acadoop为MapReduce框架提供了一个简单的原型和评估调度策略的工具。为了说明Acadoop在教育和原型方面的可能性,我们给出了几个比较调度策略的简单示例。最后,我们介绍了Acadoop开发的背景,并提出了一些需要进一步改进的地方。
{"title":"Acadoop, a lightweight MapReduce framework for education and prototyping","authors":"Zakaria Aarab, Walid El Haimouti, Hamza Idbenouakrim, Aissam Ouinou, Ayoub Ratbi, Philippe Maurant, A. Tchana","doi":"10.1109/NOTERE.2016.7745829","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745829","url":null,"abstract":"We present Acadoop, a lightweight MapReduce framework, which offers the main features of the Hadoop framework, and follows its architecture. The purpose of this lightening is mainly educational : it aims at enabling students to understand more easily the design of such frameworks, and to experiment with the behaviour of the applications that run on these frameworks. A further benefit of this lightening is that Acadoop provides a simple tool for prototyping and assessing scheduling policies for the MapReduce framework. We give a few simple examples of comparisons between scheduling policies, in order to illustrate Acadoop's possibilities with regard to both education and prototyping. In conclusion, we present the context in which Acadoop was developped, and present some lines for further improvement.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131555565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Inter-MANET routing protocol evaluation tools Inter-MANET路由协议评估工具的比较
F. Grandhomme, Gilles Guette, A. Ksentini, T. Plesse
Nowadays, thanks to the increasing technologies, soldiers and vehicles are equiped with wireless technology to communicate on the battlefield. They form adhoc network and particularly Mobile Ad hoc Network (MANET). Since the battlefield is organized as a coalition, we are in front of a situation where several groups (nations mainly) want to connect to others and establish interMANET communication. Inter-MANET (or interdomainMANET) communication should allow exchange, but maintain a supervision on the exchanged information. Several protocols have been designed in order to handle inter-domain routing for tactical MANETs. In this article, we describe these protocols and focus on the general issues they solve. Then, we compare the results of a simulator (NS3), an emulator (CORE) and a real platform (laptops) on simple network characteristics on Network and Data Link layers. We highlight behavioral differences between the three candidates and particularly softwares (NS3 and CORE). They create problems that do not exist in reality. Consequently, most existing protocols proposed in the litterature are more complex than they should be. Based on this comparison, we propose some guidelines to design Inter-domain routing protocols for MANET.
如今,由于技术的不断发展,士兵和车辆都配备了无线技术,以便在战场上进行通信。它们组成了自组网,特别是移动自组网(MANET)。由于战场是作为一个联盟组织的,我们面临着几个团体(主要是国家)想要连接到其他团体并建立interMANET通信的情况。Inter-MANET(或interdomainMANET)通信应该允许交换,但对交换的信息保持监督。为了处理战术manet的域间路由,已经设计了几种协议。在本文中,我们将描述这些协议,并重点讨论它们解决的一般问题。然后,我们比较了一个模拟器(NS3)、一个模拟器(CORE)和一个真实平台(笔记本电脑)在网络和数据链路层的简单网络特性上的结果。我们强调了三种候选软件之间的行为差异,特别是软件(NS3和CORE)。他们制造了现实中不存在的问题。因此,文献中提出的大多数现有协议都比它们应该的更复杂。在此基础上,我们提出了一些用于MANET域间路由协议设计的指导原则。
{"title":"Comparison of Inter-MANET routing protocol evaluation tools","authors":"F. Grandhomme, Gilles Guette, A. Ksentini, T. Plesse","doi":"10.1109/NOTERE.2016.7745822","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745822","url":null,"abstract":"Nowadays, thanks to the increasing technologies, soldiers and vehicles are equiped with wireless technology to communicate on the battlefield. They form adhoc network and particularly Mobile Ad hoc Network (MANET). Since the battlefield is organized as a coalition, we are in front of a situation where several groups (nations mainly) want to connect to others and establish interMANET communication. Inter-MANET (or interdomainMANET) communication should allow exchange, but maintain a supervision on the exchanged information. Several protocols have been designed in order to handle inter-domain routing for tactical MANETs. In this article, we describe these protocols and focus on the general issues they solve. Then, we compare the results of a simulator (NS3), an emulator (CORE) and a real platform (laptops) on simple network characteristics on Network and Data Link layers. We highlight behavioral differences between the three candidates and particularly softwares (NS3 and CORE). They create problems that do not exist in reality. Consequently, most existing protocols proposed in the litterature are more complex than they should be. Based on this comparison, we propose some guidelines to design Inter-domain routing protocols for MANET.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133327469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS LowPAN for Internet of Things 面向物联网的QoS LowPAN
Neji Kouka, Adel Thalajoui, A. Meddeb
6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has been granted and this QoS feature and there are no implementations of such feature in real networks. In this paper, we evaluate the effectiveness of these priority bits in various scenarios. We show that under very heavy or very low network load, these bits have a limited effect on the delay.
lowpan是由IETF引入的,作为一种标准协议,用于连接跨IPv6云的小型和受限设备。6LowPAN支持基于两个优先位的QoS特性。到目前为止,人们对这种QoS特性几乎没有兴趣,也没有在实际网络中实现这种特性。在本文中,我们评估了这些优先位在不同场景下的有效性。我们表明,在非常高或非常低的网络负载下,这些位对延迟的影响有限。
{"title":"QoS LowPAN for Internet of Things","authors":"Neji Kouka, Adel Thalajoui, A. Meddeb","doi":"10.1109/NOTERE.2016.7745826","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745826","url":null,"abstract":"6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has been granted and this QoS feature and there are no implementations of such feature in real networks. In this paper, we evaluate the effectiveness of these priority bits in various scenarios. We show that under very heavy or very low network load, these bits have a limited effect on the delay.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134462194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1