首页 > 最新文献

Seventh International Conference on Networking (icn 2008)最新文献

英文 中文
Managing Real-World System Configurations with Constraints 管理现实世界的系统配置与约束
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.38
Thomas Delaet, P. Anderson, W. Joosen
Managing large computing infrastructures in a reliable and efficient way requires system configuration tools which accept higher-level specifications. This paper describes an interface between the established configuration tool LCFG, and the experimental configuration tool PoDlM. The combined system is used to generate explicit real-world configurations from high-level, constraint-based specifications. The concept is validated using live data from a large production installation. This demonstrates that a loosely-coupled, multi-layer approach can be used to construct configuration tools which translate high-level requirements into deployable production configurations.
以可靠和有效的方式管理大型计算基础设施需要接受更高级别规范的系统配置工具。本文描述了已建立的配置工具LCFG与实验配置工具PoDlM之间的接口。组合系统用于从高级的、基于约束的规范生成显式的实际配置。该概念通过大型生产装置的实时数据进行了验证。这表明,可以使用松耦合的多层方法来构建配置工具,将高级需求转换为可部署的生产配置。
{"title":"Managing Real-World System Configurations with Constraints","authors":"Thomas Delaet, P. Anderson, W. Joosen","doi":"10.1109/ICN.2008.38","DOIUrl":"https://doi.org/10.1109/ICN.2008.38","url":null,"abstract":"Managing large computing infrastructures in a reliable and efficient way requires system configuration tools which accept higher-level specifications. This paper describes an interface between the established configuration tool LCFG, and the experimental configuration tool PoDlM. The combined system is used to generate explicit real-world configurations from high-level, constraint-based specifications. The concept is validated using live data from a large production installation. This demonstrates that a loosely-coupled, multi-layer approach can be used to construct configuration tools which translate high-level requirements into deployable production configurations.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115267459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Half-Overlap Subchannel Filtered MultiTone Modulation with the Small Delay 小延迟半重叠子信道滤波多音调制
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.33
P. Silhavy
In this contribution an analysis of MultiCarrier Modulation (MCM) is realized. The features of Discrete MultiTone modulation (DMT), Orthogonal Frequency Division Multiplexing (OFDM) and alternative modulation based on filter bank - Filtered MultiTone (FMT) will be mentioned. Based on this study the half sub-channel overlapped Filtered MultiTone Modulation will be introduced.
本文实现了对多载波调制(MCM)的分析。讨论了离散多音调制(DMT)、正交频分复用(OFDM)和基于滤波器组滤波多音(FMT)的替代调制的特点。在此基础上,介绍了半子信道重叠滤波多音调制。
{"title":"Half-Overlap Subchannel Filtered MultiTone Modulation with the Small Delay","authors":"P. Silhavy","doi":"10.1109/ICN.2008.33","DOIUrl":"https://doi.org/10.1109/ICN.2008.33","url":null,"abstract":"In this contribution an analysis of MultiCarrier Modulation (MCM) is realized. The features of Discrete MultiTone modulation (DMT), Orthogonal Frequency Division Multiplexing (OFDM) and alternative modulation based on filter bank - Filtered MultiTone (FMT) will be mentioned. Based on this study the half sub-channel overlapped Filtered MultiTone Modulation will be introduced.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116789469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Enhance Retrieval Efficiency on the Internet 提高互联网检索效率
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.123
W. Qu, Keqiu Li, M. Kitsuregawa
Due to the explosive growth of the WWW and the increasing amount of data available via the Internet, how to retrieve desired information from the Internet with high efficiency and good effectiveness is of great importance. In this paper, we propose an information retrieval model for use in large dynamic networks such as the Internet. Firstly, we divide the network into a number of groups. An exceptional handling mechanism is adopted, i.e., a controlled flooding algorithm for intre-group information updating and random walk algorithm for inter-group information retrieval. We also propose an equal representative mechanism to enhance the fault-tolerant ability of the system. Extensive experiments are conducted to evaluate the performance and rationality of our model. The experimental results show that our model outperforms the existing approaches on the retrieval efficiency and the fault-tolerant ability.
随着万维网的爆炸式增长和互联网上可获取的数据量的不断增加,如何高效、有效地从互联网上检索到所需的信息显得尤为重要。在本文中,我们提出了一个用于大型动态网络(如Internet)的信息检索模型。首先,我们将网络分成若干组。采用一种异常处理机制,即组间信息更新采用控制泛洪算法,组间信息检索采用随机游走算法。我们还提出了一个相等代表机制来增强系统的容错能力。进行了大量的实验来评估我们的模型的性能和合理性。实验结果表明,我们的模型在检索效率和容错能力上都优于现有的方法。
{"title":"Enhance Retrieval Efficiency on the Internet","authors":"W. Qu, Keqiu Li, M. Kitsuregawa","doi":"10.1109/ICN.2008.123","DOIUrl":"https://doi.org/10.1109/ICN.2008.123","url":null,"abstract":"Due to the explosive growth of the WWW and the increasing amount of data available via the Internet, how to retrieve desired information from the Internet with high efficiency and good effectiveness is of great importance. In this paper, we propose an information retrieval model for use in large dynamic networks such as the Internet. Firstly, we divide the network into a number of groups. An exceptional handling mechanism is adopted, i.e., a controlled flooding algorithm for intre-group information updating and random walk algorithm for inter-group information retrieval. We also propose an equal representative mechanism to enhance the fault-tolerant ability of the system. Extensive experiments are conducted to evaluate the performance and rationality of our model. The experimental results show that our model outperforms the existing approaches on the retrieval efficiency and the fault-tolerant ability.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127137758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Routing Algorithm Based on Architecture of ForCES 一种基于力结构的分布式路由算法
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.92
Bin Zhuge, Ligang Dong, Weiming Wang
This paper presents a distributed routing algorithm based on architecture of Forwarding and Control Element Separation(ForCES). On this algorithm the calculating routing table divides into two parts, inner routing table between Forwarding Elements and outer routing table between routers. Then according to both routing tables the Control Element calculates the final routing table of each Forwarding Element. An independent routing server is used for the routing process, which decreases the amount of development work. This algorithm satisfies the distributed characteristic of ForCES router and reduces the amount of computation of Forwarding Element obviously. The algorithm has been applied at a prototype of ForCES router with satisfactory result.
提出了一种基于转发与控制元素分离(force)体系结构的分布式路由算法。在该算法中,路由表的计算分为转发元素之间的内部路由表和路由器之间的外部路由表两部分。然后根据两个路由表计算出每个转发元素的最终路由表。路由过程使用独立的路由服务器,从而减少了开发工作量。该算法满足了force路由器的分布式特性,明显减少了转发单元的计算量。该算法已在力路由器样机上得到了较好的应用。
{"title":"A Distributed Routing Algorithm Based on Architecture of ForCES","authors":"Bin Zhuge, Ligang Dong, Weiming Wang","doi":"10.1109/ICN.2008.92","DOIUrl":"https://doi.org/10.1109/ICN.2008.92","url":null,"abstract":"This paper presents a distributed routing algorithm based on architecture of Forwarding and Control Element Separation(ForCES). On this algorithm the calculating routing table divides into two parts, inner routing table between Forwarding Elements and outer routing table between routers. Then according to both routing tables the Control Element calculates the final routing table of each Forwarding Element. An independent routing server is used for the routing process, which decreases the amount of development work. This algorithm satisfies the distributed characteristic of ForCES router and reduces the amount of computation of Forwarding Element obviously. The algorithm has been applied at a prototype of ForCES router with satisfactory result.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Simulation Study of the WFQ Scheduler in a DiffServ Node under LRD Traffic LRD流量下DiffServ节点WFQ调度的仿真研究
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.120
Kleber Kendy Horikawa Nabas, W. Godoy, E. Wille
The most important desidered characteristic for today's networks is quality of service (QoS). Currently DiffServ-based MPLS networks are able to the development of efficient methods for QoS provisioning. This article analysis, through computer simulation, the performance of WFQ schedulers in a DiffServ node loaded by long range dependence (LRD) traffic. The adopted process for the traffic generation consists in the aggregation of the traffic produced by several TCP connections transmitting files with a size that is modeled by heavy tail distribution. This distribution was obtained, from the Internet, by one-week long measurements. The objective is to observe the bandwidth distribution obtained with the WFQ scheduler, as well as the latency, i.e., the file transfer average delay, in an environment with different priorities. Simulations were carried out with the network simulator NS-2, and several simulation results are presented and analyzed.
当今网络最重要的特性是服务质量(QoS)。目前基于diffservs的MPLS网络能够开发出有效的QoS提供方法。本文通过计算机仿真,分析了远程依赖(LRD)流量负载的DiffServ节点中WFQ调度器的性能。采用的流量生成过程是将多个传输文件的TCP连接产生的流量进行聚合,这些文件的大小采用重尾分布建模。这个分布是通过为期一周的测量从互联网上获得的。目的是观察WFQ调度器在不同优先级环境下获得的带宽分布,以及延迟,即文件传输的平均延迟。利用网络模拟器NS-2进行了仿真,给出了几种仿真结果并进行了分析。
{"title":"A Simulation Study of the WFQ Scheduler in a DiffServ Node under LRD Traffic","authors":"Kleber Kendy Horikawa Nabas, W. Godoy, E. Wille","doi":"10.1109/ICN.2008.120","DOIUrl":"https://doi.org/10.1109/ICN.2008.120","url":null,"abstract":"The most important desidered characteristic for today's networks is quality of service (QoS). Currently DiffServ-based MPLS networks are able to the development of efficient methods for QoS provisioning. This article analysis, through computer simulation, the performance of WFQ schedulers in a DiffServ node loaded by long range dependence (LRD) traffic. The adopted process for the traffic generation consists in the aggregation of the traffic produced by several TCP connections transmitting files with a size that is modeled by heavy tail distribution. This distribution was obtained, from the Internet, by one-week long measurements. The objective is to observe the bandwidth distribution obtained with the WFQ scheduler, as well as the latency, i.e., the file transfer average delay, in an environment with different priorities. Simulations were carried out with the network simulator NS-2, and several simulation results are presented and analyzed.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126974658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software 使用Microsoft Windows XP Service Pack2 (SP2)软件缓解TCP-SYN攻击
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.77
Sanjeev Kumar, Einar Petana
TCP-SYN attack is one of the commonly used DDoS attacks aimed at bringing down a computer system connected to Internet. There has been an increased targeting of Windows end-users and servers. The attackers and intruders are leveraging easily identifiable network blocks to target and exploit Windows end-user servers and computer systems. In order to provide some level of security and protection against security attacks, the Microsoft's Windows XP operating systems were designed with an additional level of security. The initial Microsoft's windows XP without service pack2 (SP2) provided windows firewall with some security features. The later version of Microsoft's windows XP with SP2 intends to provide enhanced security features to prevent and mitigate the adverse effect of security attacks on the host computer systems. In this experimental paper, we set out to conduct real TCP-SYN attacks on computer systems in a controlled lab environment and measure the effectiveness of Microsoft's windows XP without SP2, and with SP2 in preventing TCP-SYN attacks. The Windows firewall (without SP2) was found to be not effective against the TCP-SYN attacks. However, the later version of Microsoft's Windows XP with SP2 was found to significantly help mitigate the adverse effect of the TCP SYN attacks on Windows based computer systems.
TCP-SYN攻击是一种常用的DDoS攻击,目的是使连接到Internet的计算机系统瘫痪。针对Windows终端用户和服务器的攻击越来越多。攻击者和入侵者利用容易识别的网络块来瞄准和利用Windows终端用户服务器和计算机系统。为了提供一定程度的安全性和防止安全攻击,微软的Windows XP操作系统在设计上增加了额外的安全性。最初的微软windows XP无服务包2 (SP2)提供了带有一些安全功能的windows防火墙。微软windows XP SP2的最新版本旨在提供增强的安全功能,以防止和减轻对主机系统的安全攻击的不利影响。在这篇实验论文中,我们着手在受控的实验室环境中对计算机系统进行真正的TCP-SYN攻击,并测量Microsoft windows XP不带SP2和带SP2在防止TCP-SYN攻击方面的有效性。发现Windows防火墙(没有SP2)对TCP-SYN攻击无效。然而,后来的Microsoft Windows XP SP2版本被发现可以显著地帮助减轻TCP SYN攻击对基于Windows的计算机系统的不利影响。
{"title":"Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software","authors":"Sanjeev Kumar, Einar Petana","doi":"10.1109/ICN.2008.77","DOIUrl":"https://doi.org/10.1109/ICN.2008.77","url":null,"abstract":"TCP-SYN attack is one of the commonly used DDoS attacks aimed at bringing down a computer system connected to Internet. There has been an increased targeting of Windows end-users and servers. The attackers and intruders are leveraging easily identifiable network blocks to target and exploit Windows end-user servers and computer systems. In order to provide some level of security and protection against security attacks, the Microsoft's Windows XP operating systems were designed with an additional level of security. The initial Microsoft's windows XP without service pack2 (SP2) provided windows firewall with some security features. The later version of Microsoft's windows XP with SP2 intends to provide enhanced security features to prevent and mitigate the adverse effect of security attacks on the host computer systems. In this experimental paper, we set out to conduct real TCP-SYN attacks on computer systems in a controlled lab environment and measure the effectiveness of Microsoft's windows XP without SP2, and with SP2 in preventing TCP-SYN attacks. The Windows firewall (without SP2) was found to be not effective against the TCP-SYN attacks. However, the later version of Microsoft's Windows XP with SP2 was found to significantly help mitigate the adverse effect of the TCP SYN attacks on Windows based computer systems.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Practical MANETs for Pervasive Cattle Monitoring 用于无处不在的牛群监测的实用城域网
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.78
B. Wietrzyk, M. Radenkovic, Ivaylo Kostadinov
The application of Mobile Ad Hoc Networks to cattle monitoring has the potential to increase the profitability of cattle production and positively impact the everyday live of farm personnel. The main research challenges are identifying and refining realistic requirements for a MANET routing protocol and designing such protocol. In this paper we report on the field experiments we performed in order to address this. Our approach builds on energy efficient MANETs to provide continuous monitoring of multidimensional parameters of animal mobility including temporal and spatial walking intensity and feed intake in order to detect oestrus, pregnancy, animal diseases and reduced efficiency of pastures. We support remote and in-situ, specific and range queries and notifications about newly detected events. Our extensive set of emulations show that we achieve lower and more balanced energy consumption while preserving the delays for increasing number of nodes within the user expected boundaries.
将移动 Ad Hoc 网络应用于牛群监测有可能提高牛群生产的利润率,并对农场工作人员的日常生活产生积极影响。主要的研究挑战是确定和完善城域网路由协议的实际要求,并设计这样的协议。在本文中,我们报告了为解决这一问题而进行的现场实验。我们的方法建立在高能效城域网的基础上,对动物移动的多维参数进行连续监测,包括时间和空间行走强度和采食量,以检测发情、怀孕、动物疾病和牧场效率降低等情况。我们支持远程和原地、特定和范围查询,以及有关新检测到事件的通知。我们进行的大量仿真表明,我们的能耗更低、更均衡,同时还能在用户预期范围内保持节点数量增加时的延迟。
{"title":"Practical MANETs for Pervasive Cattle Monitoring","authors":"B. Wietrzyk, M. Radenkovic, Ivaylo Kostadinov","doi":"10.1109/ICN.2008.78","DOIUrl":"https://doi.org/10.1109/ICN.2008.78","url":null,"abstract":"The application of Mobile Ad Hoc Networks to cattle monitoring has the potential to increase the profitability of cattle production and positively impact the everyday live of farm personnel. The main research challenges are identifying and refining realistic requirements for a MANET routing protocol and designing such protocol. In this paper we report on the field experiments we performed in order to address this. Our approach builds on energy efficient MANETs to provide continuous monitoring of multidimensional parameters of animal mobility including temporal and spatial walking intensity and feed intake in order to detect oestrus, pregnancy, animal diseases and reduced efficiency of pastures. We support remote and in-situ, specific and range queries and notifications about newly detected events. Our extensive set of emulations show that we achieve lower and more balanced energy consumption while preserving the delays for increasing number of nodes within the user expected boundaries.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129676744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Applying a Macro Model of Ad Hoc Networks to Access Control Ad Hoc网络宏模型在访问控制中的应用
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.50
Congzhou Zhou, N. Maxemchuk
Our previous work proposes a macro model that controls the flows across naturally occurring bottlenecks in multi-hop wireless networks. The macro model resembles a conventional wired network, and allows us to apply extant research on flow control directly to ad hoc networks. In this paper, we further justify the feasibility of applying our macro model of ad hoc networks to access control and the validity of only controlling the flows across bottlenecks. We describe a simple rule that partitions the network into super-nodes. We then introduce a probabilistic geographic routing protocol that routes packets between bottlenecks to avoid congestion within super-nodes. Simulation results show that not only is the average flow in non- bottlenecked areas less than the average flow across bottlenecks, but the flows in each of the transmission areas that is not in a bottleneck are less than the flows in the transmission areas within the bottleneck.
我们之前的工作提出了一个宏观模型来控制多跳无线网络中自然发生的瓶颈的流量。宏观模型类似于传统的有线网络,并允许我们将现有的流量控制研究直接应用于自组织网络。在本文中,我们进一步证明了将我们的自组织网络宏观模型应用于访问控制的可行性,以及仅控制跨越瓶颈的流量的有效性。我们描述了一个将网络划分为超级节点的简单规则。然后,我们引入了一个概率地理路由协议,在瓶颈之间路由数据包,以避免超级节点内的拥塞。仿真结果表明,不仅非瓶颈区域的平均流量小于跨越瓶颈的平均流量,而且非瓶颈区域的每个传输区域的流量小于瓶颈内传输区域的流量。
{"title":"Applying a Macro Model of Ad Hoc Networks to Access Control","authors":"Congzhou Zhou, N. Maxemchuk","doi":"10.1109/ICN.2008.50","DOIUrl":"https://doi.org/10.1109/ICN.2008.50","url":null,"abstract":"Our previous work proposes a macro model that controls the flows across naturally occurring bottlenecks in multi-hop wireless networks. The macro model resembles a conventional wired network, and allows us to apply extant research on flow control directly to ad hoc networks. In this paper, we further justify the feasibility of applying our macro model of ad hoc networks to access control and the validity of only controlling the flows across bottlenecks. We describe a simple rule that partitions the network into super-nodes. We then introduce a probabilistic geographic routing protocol that routes packets between bottlenecks to avoid congestion within super-nodes. Simulation results show that not only is the average flow in non- bottlenecked areas less than the average flow across bottlenecks, but the flows in each of the transmission areas that is not in a bottleneck are less than the flows in the transmission areas within the bottleneck.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124011107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Further Classification of Bluetooth-Enabled Ad-Hoc Networks Depending on a Risk Analysis within Each Classified Group 基于每个分类组内风险分析的蓝牙自组织网络进一步分类
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.26
Keijo Haataja
Since ad-hoc networks have no fixed infrastructure, there are many different kinds of Bluetooth-enabled ad- hoc networks with various security procedures and security requirements. In this paper, we make further classification of Bluetooth-enabled ad-hoc networks and their security procedures/requirements depending on a risk analysis within each classified group. In addition, we evaluate possible breaches and damage that can be inflicted by various attacks in such scenarios. Moreover, we devise security procedures to prevent malicious Bluetooth devices from stealing information from other Bluetooth devices.
由于ad-hoc网络没有固定的基础设施,因此有许多不同类型的支持蓝牙的ad-hoc网络,具有不同的安全程序和安全要求。在本文中,我们根据每个分类组内的风险分析对启用蓝牙的ad-hoc网络及其安全程序/要求进行进一步分类。此外,我们还评估了在这种情况下各种攻击可能造成的破坏和损害。此外,我们设计了安全程序,以防止恶意蓝牙设备从其他蓝牙设备窃取信息。
{"title":"Further Classification of Bluetooth-Enabled Ad-Hoc Networks Depending on a Risk Analysis within Each Classified Group","authors":"Keijo Haataja","doi":"10.1109/ICN.2008.26","DOIUrl":"https://doi.org/10.1109/ICN.2008.26","url":null,"abstract":"Since ad-hoc networks have no fixed infrastructure, there are many different kinds of Bluetooth-enabled ad- hoc networks with various security procedures and security requirements. In this paper, we make further classification of Bluetooth-enabled ad-hoc networks and their security procedures/requirements depending on a risk analysis within each classified group. In addition, we evaluate possible breaches and damage that can be inflicted by various attacks in such scenarios. Moreover, we devise security procedures to prevent malicious Bluetooth devices from stealing information from other Bluetooth devices.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127625045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Transport-layer Approach for Achieving Predictable Throughput for Internet Applications 为因特网应用程序实现可预测吞吐量的传输层方法
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.30
G. Hasegawa, Kana Yamanegi, M. Murata
We propose a transport-layer approach to provide predictable throughput for applications requiring stable bandwidth resource, such as video streaming and VoIP. The proposed mechanism deploys an end-to-end approach: it dynamically sets the increase degree of the congestion window size of a TCP connection according to the measurement results of the available bandwidth of the network path, which is obtained by inline network measurement technique developed in our research group. In the present paper, we briefly introduce the proposed mechanism and show the performance evaluation results in the experimental network and in the commercial Internet environment. We exhibit that the proposed mechanism can achieve the required throughput with high probability without any support from intermediate network nodes.
我们提出一种传输层方法,为视频流和VoIP等需要稳定带宽资源的应用提供可预测的吞吐量。该机制采用端到端方法,根据网络路径可用带宽的测量结果动态设置TCP连接拥塞窗口大小的增加程度,该测量结果由本课题组开发的内联网络测量技术获得。在本文中,我们简要介绍了所提出的机制,并展示了在实验网络和商业互联网环境中的性能评估结果。我们证明了所提出的机制可以在没有任何中间网络节点支持的情况下以高概率实现所需的吞吐量。
{"title":"A Transport-layer Approach for Achieving Predictable Throughput for Internet Applications","authors":"G. Hasegawa, Kana Yamanegi, M. Murata","doi":"10.1109/ICN.2008.30","DOIUrl":"https://doi.org/10.1109/ICN.2008.30","url":null,"abstract":"We propose a transport-layer approach to provide predictable throughput for applications requiring stable bandwidth resource, such as video streaming and VoIP. The proposed mechanism deploys an end-to-end approach: it dynamically sets the increase degree of the congestion window size of a TCP connection according to the measurement results of the available bandwidth of the network path, which is obtained by inline network measurement technique developed in our research group. In the present paper, we briefly introduce the proposed mechanism and show the performance evaluation results in the experimental network and in the commercial Internet environment. We exhibit that the proposed mechanism can achieve the required throughput with high probability without any support from intermediate network nodes.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115861530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Seventh International Conference on Networking (icn 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1