首页 > 最新文献

2020 IEEE 45th Conference on Local Computer Networks (LCN)最新文献

英文 中文
Net Auto-Solver: A formal approach for automatic resolution of OpenFlow anomalies Net Auto-Solver: OpenFlow异常自动解析的正式方法
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314851
Ramtin Aryan, A. Yazidi, A. Bouhoula, P. Engelstad
Policy anomalies are frequent in nowadays’s computer networks due to their increasing configuration complexity. Resolving policy anomalies usually requires network administrator intervention, which is a time-intensive and error-prone process. In this paper, we present Net Auto-Solver, a formal approach for automatic resolution of OpenFlow anomalies. The approach resorts to the concept of high-level policies to not only detect policy violations but also correct them on-the-fly. Our approach is fully automated and does not require interaction with the network administrator. Although there is a multitude of research works on detecting anomalies in SDN, research to correct those anomalies in an automatic manner is extremely scarce. At the heart of our approach, we propose two inference systems to perform corrective actions to the policy. We provide some experimental results involving real-life network configurations to show the performance of our approach. The first results are very promising.
由于当前计算机网络配置的复杂性不断增加,策略异常在网络中非常常见。解决策略异常通常需要网络管理员的干预,这是一个耗时且容易出错的过程。在本文中,我们提出了Net Auto-Solver,一种用于自动解决OpenFlow异常的正式方法。该方法采用高级策略的概念,不仅可以检测策略违规,还可以即时纠正它们。我们的方法是完全自动化的,不需要与网络管理员进行交互。尽管在检测SDN异常方面有大量的研究工作,但以自动方式纠正这些异常的研究却非常少。在我们方法的核心,我们提出了两个推理系统来执行对策略的纠正操作。我们提供了一些涉及实际网络配置的实验结果来展示我们的方法的性能。最初的结果非常有希望。
{"title":"Net Auto-Solver: A formal approach for automatic resolution of OpenFlow anomalies","authors":"Ramtin Aryan, A. Yazidi, A. Bouhoula, P. Engelstad","doi":"10.1109/LCN48667.2020.9314851","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314851","url":null,"abstract":"Policy anomalies are frequent in nowadays’s computer networks due to their increasing configuration complexity. Resolving policy anomalies usually requires network administrator intervention, which is a time-intensive and error-prone process. In this paper, we present Net Auto-Solver, a formal approach for automatic resolution of OpenFlow anomalies. The approach resorts to the concept of high-level policies to not only detect policy violations but also correct them on-the-fly. Our approach is fully automated and does not require interaction with the network administrator. Although there is a multitude of research works on detecting anomalies in SDN, research to correct those anomalies in an automatic manner is extremely scarce. At the heart of our approach, we propose two inference systems to perform corrective actions to the policy. We provide some experimental results involving real-life network configurations to show the performance of our approach. The first results are very promising.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving IoT Devices Secure Sharing in Multi-User Smart Space 实现物联网设备在多用户智能空间中的安全共享
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314780
M. Al-Shaboti, Gang Chen, I. Welch
Multiple users often share their Internet of Things (IoT) devices in a smart space. However, existing IoT systems do not support IoT sharing between multiple users or take into account the security risks associated with using shared devices. We address this problem by proposing a new multi-user IoT Secure Sharing (IoTSS) system supported by a newly designed sharing policy language. Our approach treats the policies as constraints in the context of an optimisation problem to fulfil user activities using the least vulnerable devices. We show how IoT sharing can be transformed into an equivalent Integer Linear Programming (ILP) problem, which can be solved efficiently and effectively by off-the-shelf Integer ILP solvers. To study the practical feasibility of IoTSS, we have implemented a proof-of-concept proxy-based prototype for the popularly used Mozilla WebThings Gateway. We found that the proxy service can achieve policies enforcement without incurring statistically significant time overhead.
多个用户经常在智能空间中共享他们的物联网(IoT)设备。然而,现有的物联网系统不支持多用户之间的物联网共享,也不考虑使用共享设备带来的安全风险。我们通过提出一种新的多用户物联网安全共享(IoTSS)系统来解决这个问题,该系统由新设计的共享策略语言支持。我们的方法将策略视为优化问题上下文中的约束,以使用最不脆弱的设备来实现用户活动。我们展示了如何将物联网共享转换为等效的整数线性规划(ILP)问题,该问题可以通过现成的整数线性规划求解器高效地解决。为了研究IoTSS的实际可行性,我们为常用的Mozilla WebThings网关实现了一个基于代理的概念验证原型。我们发现代理服务可以实现策略执行,而不会产生统计上显著的时间开销。
{"title":"Achieving IoT Devices Secure Sharing in Multi-User Smart Space","authors":"M. Al-Shaboti, Gang Chen, I. Welch","doi":"10.1109/LCN48667.2020.9314780","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314780","url":null,"abstract":"Multiple users often share their Internet of Things (IoT) devices in a smart space. However, existing IoT systems do not support IoT sharing between multiple users or take into account the security risks associated with using shared devices. We address this problem by proposing a new multi-user IoT Secure Sharing (IoTSS) system supported by a newly designed sharing policy language. Our approach treats the policies as constraints in the context of an optimisation problem to fulfil user activities using the least vulnerable devices. We show how IoT sharing can be transformed into an equivalent Integer Linear Programming (ILP) problem, which can be solved efficiently and effectively by off-the-shelf Integer ILP solvers. To study the practical feasibility of IoTSS, we have implemented a proof-of-concept proxy-based prototype for the popularly used Mozilla WebThings Gateway. We found that the proxy service can achieve policies enforcement without incurring statistically significant time overhead.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114906121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intelligent Task Off-Loading and Resource Allocation for 6G Smart City Environment 6G智慧城市环境下的智能任务卸载与资源分配
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314819
Syed Usman Jamil, M. A. Khan, S. Rehman
Smart cities enhance the quality of life for citizens by utilising cutting edge technologies such as 5G and beyond wireless communication. Internet of Everything (IoE) enables a smart city to power and monitor multiple geographically distributed IoE nodes to support a range of applications across various domains such as energy and resource management, intelligent transport systems and E-health to name a few. Due to unprecedented increase in the use of IoE technology and the volume of data it generates, there is need to develop a state-of-the-art architecture to support wide range of applications in order to manage smart city resources in an efficient and intelligent manner. In this work in progress article, we present a conceptual design to establish efficient task off-loading and resource allocation architecture for smart city environment. We first present a novel conceptual design, called conventional model for task off-loading and resource allocation. Secondly, we build upon the conventional model to introduce the intelligence for task off-loading and resource allocation problem. We further develop the specific research questions in order to design and evaluate the performance of various units within the above mentioned models to accommodate the technological advancements such as the use of Artificial Intelligence (AI) in the sixth generation (6G) wireless communication era.
智慧城市通过利用5G等尖端技术及无线通信技术,提高市民的生活质量。万物互联(IoE)使智慧城市能够为多个地理分布的IoE节点供电和监控,以支持各种领域的一系列应用,如能源和资源管理、智能交通系统和电子医疗等等。由于物联网技术的使用及其产生的数据量空前增加,需要开发最先进的架构来支持广泛的应用,以便以高效和智能的方式管理智慧城市资源。在这篇正在进行的文章中,我们提出了一个概念设计,以建立智能城市环境中有效的任务卸载和资源分配架构。我们首先提出了一种新的概念设计,称为任务卸载和资源分配的传统模型。其次,我们在传统模型的基础上引入了任务卸载和资源分配问题的智能。我们进一步发展具体的研究问题,以便设计和评估上述模型中各种单元的性能,以适应技术进步,例如在第六代(6G)无线通信时代使用人工智能(AI)。
{"title":"Intelligent Task Off-Loading and Resource Allocation for 6G Smart City Environment","authors":"Syed Usman Jamil, M. A. Khan, S. Rehman","doi":"10.1109/LCN48667.2020.9314819","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314819","url":null,"abstract":"Smart cities enhance the quality of life for citizens by utilising cutting edge technologies such as 5G and beyond wireless communication. Internet of Everything (IoE) enables a smart city to power and monitor multiple geographically distributed IoE nodes to support a range of applications across various domains such as energy and resource management, intelligent transport systems and E-health to name a few. Due to unprecedented increase in the use of IoE technology and the volume of data it generates, there is need to develop a state-of-the-art architecture to support wide range of applications in order to manage smart city resources in an efficient and intelligent manner. In this work in progress article, we present a conceptual design to establish efficient task off-loading and resource allocation architecture for smart city environment. We first present a novel conceptual design, called conventional model for task off-loading and resource allocation. Secondly, we build upon the conventional model to introduce the intelligence for task off-loading and resource allocation problem. We further develop the specific research questions in order to design and evaluate the performance of various units within the above mentioned models to accommodate the technological advancements such as the use of Artificial Intelligence (AI) in the sixth generation (6G) wireless communication era.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126842360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Managing Container QoS with Network and Storage Workloads over a Hyperconverged Platform 在超融合平台上管理具有网络和存储工作负载的容器QoS
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314802
Sumitro Bhaumik, Sandip Chakraborty
Container resource management is non-trivial over hyperconverged platforms where the storage is shared among host servers. Therefore, the same backbone network is used by storage and regular network traffic. In this paper, we first characterize this problem by analyzing the nature of the traffic from storage workloads and its impact on the network workloads in a container-based virtualization environment. Accordingly, we develop CONtrol, a resource management approach for assuring network workloads’ performance in the presence of storage workloads. CONtrol uses a proportional-integral-derivative controller to dynamically decide the bandwidth redistribution among various workloads. Additionally, it uses a container migration strategy for balancing the workloads across different servers of a hyperconverged platform. We have implemented CONtrol over a hyperconverged platform with 5 physical servers. Thorough testing indicates that it can significantly improve the performance of various benchmark applications over a containerized hyper-converged platform.
在存储在多个主机服务器之间共享的超融合平台上,容器资源管理非常重要。因此,存储流量和常规网络流量使用同一骨干网。在本文中,我们首先通过分析存储工作负载流量的性质及其对基于容器的虚拟化环境中的网络工作负载的影响来描述这个问题。因此,我们开发了CONtrol,一种在存储工作负载存在的情况下确保网络工作负载性能的资源管理方法。控制采用比例-积分-导数控制器来动态决定带宽在不同工作负载之间的再分配。此外,它还使用容器迁移策略来平衡超融合平台的不同服务器之间的工作负载。我们在一个拥有5台物理服务器的超融合平台上实现了CONtrol。全面的测试表明,它可以显著提高容器化超融合平台上各种基准测试应用程序的性能。
{"title":"Managing Container QoS with Network and Storage Workloads over a Hyperconverged Platform","authors":"Sumitro Bhaumik, Sandip Chakraborty","doi":"10.1109/LCN48667.2020.9314802","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314802","url":null,"abstract":"Container resource management is non-trivial over hyperconverged platforms where the storage is shared among host servers. Therefore, the same backbone network is used by storage and regular network traffic. In this paper, we first characterize this problem by analyzing the nature of the traffic from storage workloads and its impact on the network workloads in a container-based virtualization environment. Accordingly, we develop CONtrol, a resource management approach for assuring network workloads’ performance in the presence of storage workloads. CONtrol uses a proportional-integral-derivative controller to dynamically decide the bandwidth redistribution among various workloads. Additionally, it uses a container migration strategy for balancing the workloads across different servers of a hyperconverged platform. We have implemented CONtrol over a hyperconverged platform with 5 physical servers. Thorough testing indicates that it can significantly improve the performance of various benchmark applications over a containerized hyper-converged platform.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Traffic Prediction using Quantile Regression with linear, Tree, and Deep Learning Models 网络流量预测使用分位数回归与线性,树,和深度学习模型
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314779
Ahmed Alutaibi, S. Ganti
Machine Learning research has progressed tremendously in recent years. Major fields that machine learning pushed its frontier were prediction and data modeling. In this work we evaluate the applicability of a handpicked prediction models on predicting inter-day aggregate network traffic. We chose models that work best with multi-variate feature space. They represent linear, decision trees, and neural network models. Over the years, predicting network traffic has resorted to predicting point values. This approach is not descriptive enough and naively gives a shallow conclusion about the data. We propose using a quantile loss function that predicts boundaries or prediction intervals. Our results show that linear models fared well compared to their simplicity while Long Short-Term Memory Neural Networks gave best results across all experiments.
近年来,机器学习研究取得了巨大进展。机器学习的主要前沿领域是预测和数据建模。在这项工作中,我们评估了一个精挑细选的预测模型在预测日间总网络流量方面的适用性。我们选择了最适合多变量特征空间的模型。它们代表线性、决策树和神经网络模型。多年来,预测网络流量一直依赖于预测点值。这种方法没有足够的描述性,并且天真地给出了关于数据的肤浅结论。我们建议使用分位数损失函数来预测边界或预测区间。我们的研究结果表明,线性模型与它们的简单性相比表现良好,而长短期记忆神经网络在所有实验中都取得了最好的结果。
{"title":"Network Traffic Prediction using Quantile Regression with linear, Tree, and Deep Learning Models","authors":"Ahmed Alutaibi, S. Ganti","doi":"10.1109/LCN48667.2020.9314779","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314779","url":null,"abstract":"Machine Learning research has progressed tremendously in recent years. Major fields that machine learning pushed its frontier were prediction and data modeling. In this work we evaluate the applicability of a handpicked prediction models on predicting inter-day aggregate network traffic. We chose models that work best with multi-variate feature space. They represent linear, decision trees, and neural network models. Over the years, predicting network traffic has resorted to predicting point values. This approach is not descriptive enough and naively gives a shallow conclusion about the data. We propose using a quantile loss function that predicts boundaries or prediction intervals. Our results show that linear models fared well compared to their simplicity while Long Short-Term Memory Neural Networks gave best results across all experiments.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116633666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain on MSP430 with IEEE 802.15.4 基于IEEE 802.15.4的MSP430区块链
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314805
Eryk Schiller, Elfat Esati, Sina Rafati Niya, B. Stiller
This work develops an integration of Blockchains (BC) with the Internet-of-Things (IoT) using a highly constrained TelosB IoT platform based on the MSP430 processor family and CC2420 IEEE 802.15.4-compliant radio interfaces. The system is evaluated in an indoor office environment focusing on overhead and energy efficiency of BC transaction (TX) transmissions.
这项工作使用基于MSP430处理器家族和CC2420 IEEE 802.15.4兼容无线电接口的高度受限的TelosB物联网平台,开发了区块链(BC)与物联网(IoT)的集成。该系统在室内办公环境中进行了评估,重点是BC交易(TX)传输的开销和能源效率。
{"title":"Blockchain on MSP430 with IEEE 802.15.4","authors":"Eryk Schiller, Elfat Esati, Sina Rafati Niya, B. Stiller","doi":"10.1109/LCN48667.2020.9314805","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314805","url":null,"abstract":"This work develops an integration of Blockchains (BC) with the Internet-of-Things (IoT) using a highly constrained TelosB IoT platform based on the MSP430 processor family and CC2420 IEEE 802.15.4-compliant radio interfaces. The system is evaluated in an indoor office environment focusing on overhead and energy efficiency of BC transaction (TX) transmissions.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131128134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards a Distributed Defence Mechanism Against IoT-based Bots 针对物联网机器人的分布式防御机制
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314830
Carlos A. Rivera A., Arash Shaghaghi, S. Kanhere
IoT devices are the target of choice for attackers, and one of the most devastating threats involving compromised IoT devices has been their exploitation as part of botnets. Here, we propose c-Shield, as a distributed and extensible solution designed to detect and respond to IoT-based bots in an enterprise network. c-Shield passively inspects network traffic associated with IoT devices over a range of different protocols and systematically analyses the URLs extracted. Compared with the existing solutions, c-Shield is designed to be capable of detecting bots using advanced evasion techniques such as Domain Name Generation Algorithms (DGA) with a high accuracy rate.
物联网设备是攻击者的首选目标,涉及受损物联网设备的最具破坏性的威胁之一是它们作为僵尸网络的一部分被利用。在这里,我们提出c-Shield,作为一个分布式和可扩展的解决方案,旨在检测和响应企业网络中基于物联网的机器人。c-Shield通过一系列不同的协议被动地检测与物联网设备相关的网络流量,并系统地分析提取的url。与现有解决方案相比,c-Shield能够使用域名生成算法(DGA)等先进的逃避技术检测机器人,准确率很高。
{"title":"Towards a Distributed Defence Mechanism Against IoT-based Bots","authors":"Carlos A. Rivera A., Arash Shaghaghi, S. Kanhere","doi":"10.1109/LCN48667.2020.9314830","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314830","url":null,"abstract":"IoT devices are the target of choice for attackers, and one of the most devastating threats involving compromised IoT devices has been their exploitation as part of botnets. Here, we propose c-Shield, as a distributed and extensible solution designed to detect and respond to IoT-based bots in an enterprise network. c-Shield passively inspects network traffic associated with IoT devices over a range of different protocols and systematically analyses the URLs extracted. Compared with the existing solutions, c-Shield is designed to be capable of detecting bots using advanced evasion techniques such as Domain Name Generation Algorithms (DGA) with a high accuracy rate.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132654031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User Performance in a 5G Multi-connectivity Ultra-Dense Network City Scenario 5G多连接超密集网络城市场景下的用户性能
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314774
J. Perdomo, Mårten Ericson, M. Nordberg, K. Andersson
Multi-connectivity and network densification are two solutions intended to improve performance and reliability. These solutions can improve 5G NR’s system performance especially when using high-frequency bands. This work focuses on the user equipment (UE) performance using multi-connectivity within an ultra-dense deployment in a city environment. By being connected to more than one access node simultaneously, the UE should benefit from increased reliability and performance. However, this improved performance comes at the expense of a potentially increased power consumption. Simulation results show that multi-connectivity improves performance by up to 46% and 27% in downlink and uplink resp., increases UE energy efficiency by up to 30% and improves reliability for highly mobile users by up to 37%. The price to pay is an increased UE power consumption of up to 25% and 60% for dual-connectivity and tri-connectivity resp. A multi-connectivity scheme is presented to reduce the secondary connection’s transmit power.
多连接和网络致密化是两种旨在提高性能和可靠性的解决方案。这些解决方案可以提高5G NR的系统性能,特别是在使用高频频段时。这项工作的重点是在城市环境中超密集部署中使用多连接的用户设备(UE)性能。通过同时接入多个接入节点,可以提高终端的可靠性和性能。然而,这种性能的提高是以潜在增加的功耗为代价的。仿真结果表明,多路连接的下行和上行性能分别提高了46%和27%。,可将UE能效提高30%,并将高度移动用户的可靠性提高37%。付出的代价是双连接和三连接的终端功耗分别增加25%和60%。为了降低二次连接的发射功率,提出了一种多连接方案。
{"title":"User Performance in a 5G Multi-connectivity Ultra-Dense Network City Scenario","authors":"J. Perdomo, Mårten Ericson, M. Nordberg, K. Andersson","doi":"10.1109/LCN48667.2020.9314774","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314774","url":null,"abstract":"Multi-connectivity and network densification are two solutions intended to improve performance and reliability. These solutions can improve 5G NR’s system performance especially when using high-frequency bands. This work focuses on the user equipment (UE) performance using multi-connectivity within an ultra-dense deployment in a city environment. By being connected to more than one access node simultaneously, the UE should benefit from increased reliability and performance. However, this improved performance comes at the expense of a potentially increased power consumption. Simulation results show that multi-connectivity improves performance by up to 46% and 27% in downlink and uplink resp., increases UE energy efficiency by up to 30% and improves reliability for highly mobile users by up to 37%. The price to pay is an increased UE power consumption of up to 25% and 60% for dual-connectivity and tri-connectivity resp. A multi-connectivity scheme is presented to reduce the secondary connection’s transmit power.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133765124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Collision-Protected Multihop Frame Transmission Method with Wireless LAN Communication Supported by Longer-Distance Wireless Communication 远距离无线通信支持无线局域网通信的防碰撞多跳帧传输方法
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314841
Ryosuke Nagayoshi, Y. Tanigawa, H. Tode
Currently, in addition to wireless LAN (WLAN), equipments for longer-distance wireless communication like IEEE 802.11af and 802.11ah are being developed. Thus, in the near future, access points (APs) and wireless stations (STAs) equipped with functions for both WLAN communication and longer-distance communication are expected. Although longer-distance communication enables STAs to connect to their APs even outside the WLAN coverages, the transmission rates are smaller. Multihop WLAN communication via relay STAs provides larger transmission rates. However, frame transmission from relay STAs increases collisions, and additional routing is required. This study proposes collision-protected multihop transmission without preliminary routing in the environment in which both WLAN communication and longer-distance communication are available. Collision protection and routing are processed by a two-way handshake between data frame transmitter and receiver stations with the longer-distance communication. After the handshake, the data frame is transmitted via relay STAs by exclusively using the WLAN channel.
目前,除了无线局域网(WLAN)之外,还在开发IEEE 802.11af和802.11ah等远距离无线通信设备。因此,在不久的将来,预计将出现既具有WLAN通信功能又具有较长距离通信功能的接入点(ap)和无线站(sta)。尽管长距离通信使sta能够在WLAN覆盖范围之外连接其ap,但传输速率较小。多跳无线局域网通信通过中继sta提供更大的传输速率。但是,来自中继sta的帧传输增加了冲突,并且需要额外的路由。本研究提出在WLAN通信和较长距离通信同时可用的环境下,不需要预先路由的防碰撞多跳传输。碰撞保护和路由由数据帧发送站和接收站之间的双向握手处理,具有较远的通信距离。握手后,数据帧通过中继sta通过专用的WLAN信道传输。
{"title":"A Collision-Protected Multihop Frame Transmission Method with Wireless LAN Communication Supported by Longer-Distance Wireless Communication","authors":"Ryosuke Nagayoshi, Y. Tanigawa, H. Tode","doi":"10.1109/LCN48667.2020.9314841","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314841","url":null,"abstract":"Currently, in addition to wireless LAN (WLAN), equipments for longer-distance wireless communication like IEEE 802.11af and 802.11ah are being developed. Thus, in the near future, access points (APs) and wireless stations (STAs) equipped with functions for both WLAN communication and longer-distance communication are expected. Although longer-distance communication enables STAs to connect to their APs even outside the WLAN coverages, the transmission rates are smaller. Multihop WLAN communication via relay STAs provides larger transmission rates. However, frame transmission from relay STAs increases collisions, and additional routing is required. This study proposes collision-protected multihop transmission without preliminary routing in the environment in which both WLAN communication and longer-distance communication are available. Collision protection and routing are processed by a two-way handshake between data frame transmitter and receiver stations with the longer-distance communication. After the handshake, the data frame is transmitted via relay STAs by exclusively using the WLAN channel.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient autonomous vehicle navigation scheme based on LiDAR sensor in vehicular network 车联网中基于LiDAR传感器的高效自主车辆导航方案
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314817
Rima Benelmir, S. Bitam, A. Mellouk
Recently, autonomous vehicles navigation (AVN) attracted many researches trying to improve road traffic without the human intervention. One of the main challenges in AVN is allowing a vehicle to discover its moving trajectory with a reduced computational complexity. To cope with this issue, we propose in this paper a new simulated annealing algorithm to discover an optimal trajectory when the vehicle encounters an obstacle using LiDAR perception. The found trajectory is then sent to a roadside unit (RSU), which communicates this discovery to other nodes in the network for further use. During its navigation, the vehicle perceives the environment by a LiDAR sensor to detect an eventual obstacle and launches an optimal path discovery to reach the final destination in a reduced time. The results obtained showed the effectiveness of our proposal to find an optimal route compared to Dijkstra algorithm.
近年来,无人驾驶汽车导航(AVN)吸引了许多研究,试图在没有人为干预的情况下改善道路交通。AVN的主要挑战之一是允许车辆在降低计算复杂度的情况下发现其移动轨迹。为了解决这一问题,本文提出了一种新的模拟退火算法,利用激光雷达感知发现车辆遇到障碍物时的最优轨迹。然后将发现的轨迹发送到路边单元(RSU), RSU将此发现传递给网络中的其他节点以供进一步使用。在其导航过程中,车辆通过激光雷达传感器感知环境,以检测最终障碍物,并启动最佳路径发现,以在更短的时间内到达最终目的地。结果表明,与Dijkstra算法相比,本文提出的算法在寻找最优路径方面是有效的。
{"title":"An efficient autonomous vehicle navigation scheme based on LiDAR sensor in vehicular network","authors":"Rima Benelmir, S. Bitam, A. Mellouk","doi":"10.1109/LCN48667.2020.9314817","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314817","url":null,"abstract":"Recently, autonomous vehicles navigation (AVN) attracted many researches trying to improve road traffic without the human intervention. One of the main challenges in AVN is allowing a vehicle to discover its moving trajectory with a reduced computational complexity. To cope with this issue, we propose in this paper a new simulated annealing algorithm to discover an optimal trajectory when the vehicle encounters an obstacle using LiDAR perception. The found trajectory is then sent to a roadside unit (RSU), which communicates this discovery to other nodes in the network for further use. During its navigation, the vehicle perceives the environment by a LiDAR sensor to detect an eventual obstacle and launches an optimal path discovery to reach the final destination in a reduced time. The results obtained showed the effectiveness of our proposal to find an optimal route compared to Dijkstra algorithm.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123887682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE 45th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1