首页 > 最新文献

International Conference on Communication Technology Proceedings, 2003. ICCT 2003.最新文献

英文 中文
Attack recall control in anomaly detection 异常检测中的攻击召回控制
Pub Date : 2003-04-09 DOI: 10.1109/ICCT.2003.1209103
Anh Trần Quang, Qianli Zhang, Xing Li
This paper presents an approach to control the attack recall in an anomaly detection system using support vector machines (SVM). The recall and precision of SVM are controlled by the selection of the training model. The training model is selected by optimization method using genetic algorithm. A SVM training model optimization problem is presented and an expected attack recall is controlled by a tradeoff parameter /spl rho/ in the objective function. Experimental results demonstrate that as /spl rho/ increases from 0 to 1, the recall increases from 0 to 1. If we use the value of /spl rho/ to estimate the recall, the mean square error of this estimation is decreased during the evolution of the training model. Our approach allows a user to design a system with an expected recall while the precision is high.
提出了一种利用支持向量机控制异常检测系统攻击召回的方法。支持向量机的查全率和查准率由训练模型的选择来控制。采用遗传算法优选训练模型。提出了一个支持向量机训练模型优化问题,并通过目标函数中的权衡参数/spl rho/控制预期攻击召回率。实验结果表明,当/spl rho/从0增加到1时,召回率从0增加到1。如果我们使用/spl rho/的值来估计召回,在训练模型的进化过程中,该估计的均方误差减小。我们的方法允许用户设计一个具有预期召回率的系统,同时精度很高。
{"title":"Attack recall control in anomaly detection","authors":"Anh Trần Quang, Qianli Zhang, Xing Li","doi":"10.1109/ICCT.2003.1209103","DOIUrl":"https://doi.org/10.1109/ICCT.2003.1209103","url":null,"abstract":"This paper presents an approach to control the attack recall in an anomaly detection system using support vector machines (SVM). The recall and precision of SVM are controlled by the selection of the training model. The training model is selected by optimization method using genetic algorithm. A SVM training model optimization problem is presented and an expected attack recall is controlled by a tradeoff parameter /spl rho/ in the objective function. Experimental results demonstrate that as /spl rho/ increases from 0 to 1, the recall increases from 0 to 1. If we use the value of /spl rho/ to estimate the recall, the mean square error of this estimation is decreased during the evolution of the training model. Our approach allows a user to design a system with an expected recall while the precision is high.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130772419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Statistical analysis of stability of multicast trees in cumulative layered multicast 累积分层组播树稳定性的统计分析
Pub Date : 2003-04-09 DOI: 10.1109/ICCT.2003.1209128
Shi Feng, Wu Jianping, Xu Ke
In this paper, we consider the stability of a multicast (one-to-many) tree in cumulative layered multicast, which is traditionally realized by dropping a layer when congestion is detected. First, we define a stability index to evaluate and quantify tree's stability. Then, for obtaining the general expression of the stability index, we develop a simple statistical model, which is based on the link-dependent model and the dependency-degree model in [X. Zhang et al., 2001]. We show that even in the case of lower link-marking probability, the stability of multicast tree is significantly more sensitive to network congestion when dependency between different links becomes smaller, indicating that more links will leave the tree when congestion occurs.
本文考虑了累积分层组播中一对多组播树的稳定性问题,传统的多播树是在检测到拥塞时去掉一层来实现的。首先,我们定义了一个稳定性指标来评价和量化树的稳定性。然后,为了得到稳定性指标的一般表达式,我们建立了一个简单的统计模型,该模型基于[X]中的链接依赖模型和依赖程度模型。张等,2001]。研究表明,即使在链路标记概率较低的情况下,当不同链路之间的依赖关系越小时,组播树的稳定性对网络拥塞的敏感性显著增强,这表明当拥塞发生时,会有更多的链路离开组播树。
{"title":"Statistical analysis of stability of multicast trees in cumulative layered multicast","authors":"Shi Feng, Wu Jianping, Xu Ke","doi":"10.1109/ICCT.2003.1209128","DOIUrl":"https://doi.org/10.1109/ICCT.2003.1209128","url":null,"abstract":"In this paper, we consider the stability of a multicast (one-to-many) tree in cumulative layered multicast, which is traditionally realized by dropping a layer when congestion is detected. First, we define a stability index to evaluate and quantify tree's stability. Then, for obtaining the general expression of the stability index, we develop a simple statistical model, which is based on the link-dependent model and the dependency-degree model in [X. Zhang et al., 2001]. We show that even in the case of lower link-marking probability, the stability of multicast tree is significantly more sensitive to network congestion when dependency between different links becomes smaller, indicating that more links will leave the tree when congestion occurs.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132866308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Support of mobile networks in B3G systems 支持B3G系统中的移动网络
Pub Date : 2003-04-09 DOI: 10.1109/ICCT.2003.1209785
Hong-Yon Lach, N. Natarajan
We consider the problem of supporting moving in systems beyond 3G (B3G). We summarize the scope of problem, current solution approaches and the remaining challenges that need to be addressed.
我们考虑的问题,支持移动系统超越3G (B3G)。我们总结了问题的范围、当前的解决方法和需要解决的剩余挑战。
{"title":"Support of mobile networks in B3G systems","authors":"Hong-Yon Lach, N. Natarajan","doi":"10.1109/ICCT.2003.1209785","DOIUrl":"https://doi.org/10.1109/ICCT.2003.1209785","url":null,"abstract":"We consider the problem of supporting moving in systems beyond 3G (B3G). We summarize the scope of problem, current solution approaches and the remaining challenges that need to be addressed.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"67 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130268798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wavelength converter management in all-optical networks with arbitrary topologies using abstracting techniques 基于抽象技术的任意拓扑全光网络波长转换器管理
Pub Date : 2003-04-09 DOI: 10.1109/ICCT.2003.1209034
Ding Zhemin, M. Hamdi
Previous works have shown the wavelength conversion can considerably reduce the blocking probability in all-optical networks, but most of analytical models and algorithms are proposed under simplifying assumptions or restricted to specific cases. In this paper, we first introduce an abstracting technique called blocking island (BI) paradigm. A blocking island hierarchy (BIH) can be constructed by using the BI paradigm and bottleneck links can be easily identified in BIH. We then propose the wavelength placement algorithms using this traffic case. To make sure our algorithm is applicable in arbitrary topologies and any incoming traffic patterns, a simulation-based optimization approach is employed. In the simulation, we show the performance improvement obtained by full wavelength conversion can almost be achieved by using limited number of wavelength converters with careful placement. In a random generated network topology, we demonstrate our algorithm outperforms the best existing allocation scheme.
以往的研究表明,波长转换可以大大降低全光网络中的阻塞概率,但大多数分析模型和算法都是在简化假设或局限于特定情况下提出的。在本文中,我们首先介绍了一种称为阻塞岛(BI)范式的抽象技术。阻塞岛层次结构(BIH)可以通过使用BI范式构建,瓶颈链接可以很容易地在阻塞岛层次结构中识别出来。然后,我们提出了使用这种流量情况的波长放置算法。为了确保算法适用于任意拓扑和任何传入流量模式,采用了基于仿真的优化方法。在仿真中,我们表明,通过使用有限数量的波长转换器并精心放置,几乎可以实现全波长转换所获得的性能改进。在随机生成的网络拓扑中,我们证明了我们的算法优于现有的最佳分配方案。
{"title":"Wavelength converter management in all-optical networks with arbitrary topologies using abstracting techniques","authors":"Ding Zhemin, M. Hamdi","doi":"10.1109/ICCT.2003.1209034","DOIUrl":"https://doi.org/10.1109/ICCT.2003.1209034","url":null,"abstract":"Previous works have shown the wavelength conversion can considerably reduce the blocking probability in all-optical networks, but most of analytical models and algorithms are proposed under simplifying assumptions or restricted to specific cases. In this paper, we first introduce an abstracting technique called blocking island (BI) paradigm. A blocking island hierarchy (BIH) can be constructed by using the BI paradigm and bottleneck links can be easily identified in BIH. We then propose the wavelength placement algorithms using this traffic case. To make sure our algorithm is applicable in arbitrary topologies and any incoming traffic patterns, a simulation-based optimization approach is employed. In the simulation, we show the performance improvement obtained by full wavelength conversion can almost be achieved by using limited number of wavelength converters with careful placement. In a random generated network topology, we demonstrate our algorithm outperforms the best existing allocation scheme.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restoration and audit of Internet e-mail based on TCP stream reassembling 基于TCP流重组的Internet电子邮件恢复与审计
Pub Date : 2003-04-09 DOI: 10.1109/ICCT.2003.1209100
W. Zhimin, J. Xiaolin
With the ceaseless development of Internet/intranet application, Internet e-mail has become one of the most important ways for people and enterprises to communicate with each other. However, in enterprises, a great deal of sensitive data, such as product reports, statistic data, may be divulged through the mail system by the provocateur. So, checking the outgoing e-mail is an effective means to protect sensitive data in the enterprises. As a network application service, the e-mail is based on simple mail transfer protocol (SMTP). According to some defects exists in mail checking system nowadays, the technology of TCP stream reassembling is proposed to restore the whole e-mail text and attachment in this paper, and audit the completed e-mail file using MIME standard and improved pattern match algorithm. Finally, the framework of implementation is illustrated using Win Pcap library.
随着Internet/intranet应用的不断发展,Internet电子邮件已成为人们与企业之间最重要的沟通方式之一。然而,在企业中,大量的敏感数据,如产品报告、统计数据等,可能会被不法分子通过邮件系统泄露出去。因此,检查外发邮件是保护企业敏感数据的有效手段。电子邮件作为一种网络应用服务,基于简单邮件传输协议SMTP (simple mail transfer protocol)。针对目前邮件检测系统存在的一些缺陷,本文提出了利用TCP流重组技术恢复邮件全文和附件,并采用MIME标准和改进的模式匹配算法对完整的邮件文件进行审计。最后,利用winpcap库对实现框架进行了说明。
{"title":"Restoration and audit of Internet e-mail based on TCP stream reassembling","authors":"W. Zhimin, J. Xiaolin","doi":"10.1109/ICCT.2003.1209100","DOIUrl":"https://doi.org/10.1109/ICCT.2003.1209100","url":null,"abstract":"With the ceaseless development of Internet/intranet application, Internet e-mail has become one of the most important ways for people and enterprises to communicate with each other. However, in enterprises, a great deal of sensitive data, such as product reports, statistic data, may be divulged through the mail system by the provocateur. So, checking the outgoing e-mail is an effective means to protect sensitive data in the enterprises. As a network application service, the e-mail is based on simple mail transfer protocol (SMTP). According to some defects exists in mail checking system nowadays, the technology of TCP stream reassembling is proposed to restore the whole e-mail text and attachment in this paper, and audit the completed e-mail file using MIME standard and improved pattern match algorithm. Finally, the framework of implementation is illustrated using Win Pcap library.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126449048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Experimental analysis of clock recovery based on EAM-oscillator 基于eam振荡器的时钟恢复实验分析
Pub Date : 2003-04-09 DOI: 10.1109/ICCT.2003.1209158
W. Anbin, Wujian, Zuo Peng, Wen Liangsheng, Gongwei, Lin Jin-tong
Clock recovery using the injected optoelectronic hybrid oscillator based on electro-absorption modular (EAM) is described and investigated in 4/spl times/10GHz optical time division multiplexing system in this paper. The time jitter of clock is less than 0.5 ps. The influence of EA modulator's window to time jitter and amplitude of extracted clock is analyzed. The tendency of theoretical results agrees with experimental result. Result shows that the window width can be larger than the width of time slot for the clock recovery.
在4/spl倍/10GHz光时分复用系统中,研究了基于电吸收模块(EAM)的注入式光电混合振荡器的时钟恢复。时钟的时间抖动小于0.5 ps,分析了EA调制器窗口对提取时钟的时间抖动和幅度的影响。理论结果与实验结果趋于一致。结果表明,时钟恢复的窗口宽度可以大于时隙宽度。
{"title":"Experimental analysis of clock recovery based on EAM-oscillator","authors":"W. Anbin, Wujian, Zuo Peng, Wen Liangsheng, Gongwei, Lin Jin-tong","doi":"10.1109/ICCT.2003.1209158","DOIUrl":"https://doi.org/10.1109/ICCT.2003.1209158","url":null,"abstract":"Clock recovery using the injected optoelectronic hybrid oscillator based on electro-absorption modular (EAM) is described and investigated in 4/spl times/10GHz optical time division multiplexing system in this paper. The time jitter of clock is less than 0.5 ps. The influence of EA modulator's window to time jitter and amplitude of extracted clock is analyzed. The tendency of theoretical results agrees with experimental result. Result shows that the window width can be larger than the width of time slot for the clock recovery.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126555314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new resource shared restoration mechanism for optical network 一种新的光网络资源共享恢复机制
Pub Date : 2003-04-09 DOI: 10.1109/ICCT.2003.1209165
Yaping Zhou, Yuefeng Ji
A two-step resource precalculated and shared restoration mechanism is put forward in this paper. This mechanism separates calculation of link resource to reserve for newly created lightpath from restore path routing. The target of resource reservation is to minimize the resources for restoration under the condition that a restore path had been routed, and the restore path routing is base on various strategies. A different algorithm with minimal resource reservation can be seen as a different resource shared restoration scheme, which aims at a different objective for networking. Meanwhile a second shortest path and resource shared restoration scheme is given as an example.
提出了一种两步资源预计算共享恢复机制。这种机制将为新创建的光路预留链路资源的计算与恢复路径路由分离开来。资源预留的目标是在已经路由了恢复路径的情况下,使用于恢复的资源最小化,恢复路径的路由基于多种策略。一种不同的最小化资源预留算法可以看作是一种不同的资源共享恢复方案,它针对的是不同的网络目标。同时给出了第二最短路径和资源共享恢复方案的实例。
{"title":"A new resource shared restoration mechanism for optical network","authors":"Yaping Zhou, Yuefeng Ji","doi":"10.1109/ICCT.2003.1209165","DOIUrl":"https://doi.org/10.1109/ICCT.2003.1209165","url":null,"abstract":"A two-step resource precalculated and shared restoration mechanism is put forward in this paper. This mechanism separates calculation of link resource to reserve for newly created lightpath from restore path routing. The target of resource reservation is to minimize the resources for restoration under the condition that a restore path had been routed, and the restore path routing is base on various strategies. A different algorithm with minimal resource reservation can be seen as a different resource shared restoration scheme, which aims at a different objective for networking. Meanwhile a second shortest path and resource shared restoration scheme is given as an example.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122570608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A security payment scheme of mobile e-commerce 一种移动电子商务安全支付方案
Pub Date : 2003-04-09 DOI: 10.1109/ICCT.2003.1209687
Yuanjun Dai, L. Zhang
Mobile e-commerce enables the mobile user to buy and pay for things via his mobile phone anywhere and at anytime. It will bring convenience and contribute to improve life quality of the user. However, security measures must be strong enough to protect the user from illegal abuses and to get confidence from him. This paper presents a secure payment scheme for the mobile e-commerce. We introduce a secure module into the WAP gateway for user authentication and making mobile e-commerce applications secure.
移动电子商务使移动用户可以随时随地通过手机进行购物和支付。它将为用户带来便利,有助于提高用户的生活质量。然而,安全措施必须足够强大,以保护用户免受非法滥用,并获得他的信任。提出了一种适用于移动电子商务的安全支付方案。我们在WAP网关中引入了一个安全模块,用于用户认证,使移动电子商务应用更加安全。
{"title":"A security payment scheme of mobile e-commerce","authors":"Yuanjun Dai, L. Zhang","doi":"10.1109/ICCT.2003.1209687","DOIUrl":"https://doi.org/10.1109/ICCT.2003.1209687","url":null,"abstract":"Mobile e-commerce enables the mobile user to buy and pay for things via his mobile phone anywhere and at anytime. It will bring convenience and contribute to improve life quality of the user. However, security measures must be strong enough to protect the user from illegal abuses and to get confidence from him. This paper presents a secure payment scheme for the mobile e-commerce. We introduce a secure module into the WAP gateway for user authentication and making mobile e-commerce applications secure.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122998645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Lossless data compression methods based on neural network 基于神经网络的无损数据压缩方法
Pub Date : 2003-04-09 DOI: 10.1109/ICCT.2003.1209899
Yang Guowei, Li Zhengxi, Tu Xuyan
No lossless data compression method based on neural network has been found before. A lossless compression method based on BP network for the long character-string of 0 and 1 is given by establishing specific mapping Y and specific integer function and with the non-linear approximation capability of concrete three-layer BP network in this paper. The compression and decompression algorithms of the lossless compression method are provided. Experiments show that the compression ratio of the lossless compression method is usually around 16/11 and the method can effectively compress the data which have been compressed by Huffman coding, arithmetic coding or dictionary coding.
基于神经网络的数据无损压缩方法目前还没有发现。本文通过建立特定的映射Y和特定的整数函数,利用具体的三层BP网络的非线性逼近能力,给出了一种基于BP网络的0和1长字符串无损压缩方法。给出了无损压缩方法的压缩和解压缩算法。实验表明,无损压缩方法的压缩比通常在16/11左右,可以有效地压缩经过霍夫曼编码、算术编码或字典编码压缩过的数据。
{"title":"Lossless data compression methods based on neural network","authors":"Yang Guowei, Li Zhengxi, Tu Xuyan","doi":"10.1109/ICCT.2003.1209899","DOIUrl":"https://doi.org/10.1109/ICCT.2003.1209899","url":null,"abstract":"No lossless data compression method based on neural network has been found before. A lossless compression method based on BP network for the long character-string of 0 and 1 is given by establishing specific mapping Y and specific integer function and with the non-linear approximation capability of concrete three-layer BP network in this paper. The compression and decompression algorithms of the lossless compression method are provided. Experiments show that the compression ratio of the lossless compression method is usually around 16/11 and the method can effectively compress the data which have been compressed by Huffman coding, arithmetic coding or dictionary coding.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"119 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126302125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An energy-saving scheme for wireless LANs 无线局域网的节能方案
Pub Date : 2003-04-09 DOI: 10.1109/ICCT.2003.1209755
Ning Li, Hai Wang, Shaoren Zheng
In this paper, we propose a distributed energy-saving strategy by dynamically switching-off wireless network interface card (NIC), and analyze its performance in fully connected networks. Simulation results show that in wireless LAN, when the network load is rather heavy, this scheme can save NIC's energy consumption by more than 60%, at the meanwhile, its delay and throughput performance is still similar to that of 02.11DCF protocol. This scheme does not need global synchronization and can be applied to other MAC protocols based on collision avoidance mechanism.
本文提出了一种动态关闭无线网卡的分布式节能策略,并对其在全连接网络中的性能进行了分析。仿真结果表明,在无线局域网中,当网络负载较大时,该方案可节省网卡能耗60%以上,同时其延迟和吞吐量性能仍与02.11DCF协议相当。该方案不需要全局同步,可以应用于其他基于避碰机制的MAC协议。
{"title":"An energy-saving scheme for wireless LANs","authors":"Ning Li, Hai Wang, Shaoren Zheng","doi":"10.1109/ICCT.2003.1209755","DOIUrl":"https://doi.org/10.1109/ICCT.2003.1209755","url":null,"abstract":"In this paper, we propose a distributed energy-saving strategy by dynamically switching-off wireless network interface card (NIC), and analyze its performance in fully connected networks. Simulation results show that in wireless LAN, when the network load is rather heavy, this scheme can save NIC's energy consumption by more than 60%, at the meanwhile, its delay and throughput performance is still similar to that of 02.11DCF protocol. This scheme does not need global synchronization and can be applied to other MAC protocols based on collision avoidance mechanism.","PeriodicalId":237858,"journal":{"name":"International Conference on Communication Technology Proceedings, 2003. ICCT 2003.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
International Conference on Communication Technology Proceedings, 2003. ICCT 2003.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1