首页 > 最新文献

Seventh International Conference on Networking (icn 2008)最新文献

英文 中文
Post-Disaster Communications: A Cognitive Agent Approach 灾后沟通:认知代理方法
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.60
S. Majid, K. Ahmed
Communication networks are vulnerable to emergencies both natural and manmade. Deployment of cost-effective, efficient and robust communications network for emergency situations is considered to be a vital problem. In this paper we propose the use of cognitive agents for post-disaster communications (CAP-C). Birth-death lifecycle of these mobile agents is also presented. We also presented a binary hypothesis test for evaluating the output of each cognitive agent.
通信网络容易受到自然和人为突发事件的影响。为紧急情况部署成本效益高、效率高和坚固的通信网络被认为是一个至关重要的问题。在本文中,我们提出在灾后通信中使用认知代理(CAP-C)。并给出了这些移动代理的生-死生命周期。我们还提出了一个二元假设检验来评估每个认知代理的输出。
{"title":"Post-Disaster Communications: A Cognitive Agent Approach","authors":"S. Majid, K. Ahmed","doi":"10.1109/ICN.2008.60","DOIUrl":"https://doi.org/10.1109/ICN.2008.60","url":null,"abstract":"Communication networks are vulnerable to emergencies both natural and manmade. Deployment of cost-effective, efficient and robust communications network for emergency situations is considered to be a vital problem. In this paper we propose the use of cognitive agents for post-disaster communications (CAP-C). Birth-death lifecycle of these mobile agents is also presented. We also presented a binary hypothesis test for evaluating the output of each cognitive agent.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Fault-Tolerant Extension of Hypercube for Secure and Reliable Group Communications 安全可靠群通信的超立方体容错扩展
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.95
M. Striki, J. Baras, K. Manousakis
Securing group communications in resource constrained, infrastructure-less mobile ad hoc networks (MANETs) has become one of the most challenging research directions in the areas of wireless networking and security. MANETs are emerging as the desired environment for an increasing number of commercial and military applications, addressing also an increasing number of users. Security on the other hand, is becoming an indispensable requirement of our modern life for all these applications. The inherent limitations of MANETs impose major difficulties on establishing a suitable secure group communications framework. We contribute to the latter by extending hypercube, an existing key agreement (KA) scheme - all parties contribute equally to the group key - to tolerate multiple member failures with low cost. We achieve this by enhancing hypercube with a novel adaptively proactive algorithm. Members are assumed to be already authenticated via some underlying mechanism and we only focus on the design and analysis of a fault-tolerant scheme. Our algorithm has been evaluated and compared with the existing approach. Through our analysis and simulations we demonstrate its superiority in terms of robustness and efficiency.
在资源受限、无基础设施的移动自组网(manet)中保护群通信已成为无线网络和安全领域最具挑战性的研究方向之一。manet正在成为越来越多的商业和军事应用的理想环境,也解决了越来越多的用户。另一方面,对于所有这些应用程序,安全性正在成为我们现代生活中不可或缺的要求。manet固有的局限性给建立一个合适的安全组通信框架带来了很大的困难。我们通过扩展hypercube(一种现有的密钥协议(KA)方案——所有各方对组密钥的贡献都是平等的——来实现后者,以低成本容忍多个成员失败。我们通过一种新颖的自适应主动算法增强超立方体来实现这一目标。假设成员已经通过某种底层机制进行了身份验证,我们只关注容错方案的设计和分析。我们的算法已被评估并与现有的方法进行了比较。通过分析和仿真,证明了该方法在鲁棒性和效率方面的优越性。
{"title":"Fault-Tolerant Extension of Hypercube for Secure and Reliable Group Communications","authors":"M. Striki, J. Baras, K. Manousakis","doi":"10.1109/ICN.2008.95","DOIUrl":"https://doi.org/10.1109/ICN.2008.95","url":null,"abstract":"Securing group communications in resource constrained, infrastructure-less mobile ad hoc networks (MANETs) has become one of the most challenging research directions in the areas of wireless networking and security. MANETs are emerging as the desired environment for an increasing number of commercial and military applications, addressing also an increasing number of users. Security on the other hand, is becoming an indispensable requirement of our modern life for all these applications. The inherent limitations of MANETs impose major difficulties on establishing a suitable secure group communications framework. We contribute to the latter by extending hypercube, an existing key agreement (KA) scheme - all parties contribute equally to the group key - to tolerate multiple member failures with low cost. We achieve this by enhancing hypercube with a novel adaptively proactive algorithm. Members are assumed to be already authenticated via some underlying mechanism and we only focus on the design and analysis of a fault-tolerant scheme. Our algorithm has been evaluated and compared with the existing approach. Through our analysis and simulations we demonstrate its superiority in terms of robustness and efficiency.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116734276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Application Layer Multicast for Collaborative Scenarios: The OMCAST Protocol 协作场景的应用层多播:OMCAST协议
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.59
Gerard París, M. Arrufat, P. López, Marc Sánchez Artigas
New collaborative applications relying on a MANET need multicast to perform efficient group communication. Application layer multicast is seen as a good alternative to the traditional network layer routing protocols because of its flexibility and ease of deployment. However, existing application layer multicast protocols for MANETs are not designed for collaborative scenarios. In this paper, we present OMCAST, a new overlay multicast protocol for mobile ad hoc networks that is specifically targeted for collaborative scenarios. OMCAST benefits from the broadcast nature of the wireless medium in order to minimize network delay and congestion. Evaluation shows that OMCAST achieves better network performance than current message delivery approaches.
依赖于MANET的新型协作应用需要多播来执行高效的组通信。应用层组播由于其灵活性和易于部署而被视为传统网络层路由协议的一个很好的替代方案。然而,现有的用于manet的应用层多播协议并不是为协作场景而设计的。在本文中,我们提出了OMCAST,一种新的覆盖多播协议,用于移动自组织网络,专门针对协作场景。OMCAST受益于无线媒体的广播性质,以尽量减少网络延迟和拥塞。评估表明,OMCAST实现了比当前消息传递方法更好的网络性能。
{"title":"An Application Layer Multicast for Collaborative Scenarios: The OMCAST Protocol","authors":"Gerard París, M. Arrufat, P. López, Marc Sánchez Artigas","doi":"10.1109/ICN.2008.59","DOIUrl":"https://doi.org/10.1109/ICN.2008.59","url":null,"abstract":"New collaborative applications relying on a MANET need multicast to perform efficient group communication. Application layer multicast is seen as a good alternative to the traditional network layer routing protocols because of its flexibility and ease of deployment. However, existing application layer multicast protocols for MANETs are not designed for collaborative scenarios. In this paper, we present OMCAST, a new overlay multicast protocol for mobile ad hoc networks that is specifically targeted for collaborative scenarios. OMCAST benefits from the broadcast nature of the wireless medium in order to minimize network delay and congestion. Evaluation shows that OMCAST achieves better network performance than current message delivery approaches.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimising the Use of Robust Header Compression Profiles in NEMO Networks 优化在NEMO网络中鲁棒报头压缩配置文件的使用
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.35
Priyanka Rawat, J. Bonnin, A. Minaburo
Mobile Internet access in moving entities such as, cars, buses, trains, and airplanes is in great demand. The mobility protocols Mobile IPv6 and NEMO, use a bi-directional tunneling mechanism and all communications pass through this tunnel. If this tunnel provides network mobility transparency to the nodes within the network and to their correspondents, it also introduces high protocol overheads since multiple Internet header are carried on each message. This becomes critical since the tunnel is established over different access technologies such as Wireless LAN and 3G where bandwidth is a scarce resource. Moreover, for each mobile terminal (MN) or mobile router (MR), the mobility protocols create a tunnel with the home agent (HA) which can become a bottleneck when it has to serve thousands of mobiles. ROHC header compression mechanism is known to be able to reduce header size and improve performance in low bandwidth links. Thus, ROHC can be used to reduce the tunnel header overhead and improve the performance of the HA. However, ROHC is a complex mechanism and its use needs to be optimised for this specific usage. In this paper, we present two approaches to optimise the use of ROHC profiles when ROHC compression is used in NEMO networks. In the first approach, we suggest to use a reduced number of ROHC profiles. It is proposed to use only the IP profile of ROHC as IP header is the largest header. Also, header compression is applied per user in order to reduce the number of contexts and thus to reduce the processing load and the memory consumption at HA. The second approach proposes to classify the ROHC profiles into different levels depending on the resources that are used at the MR and HA. Optimising the use of ROHC profiles, although reduces the header compression performance, in return it saves resources. Moreover, the complexity of the ROHC mechanism is reduced. We present a performance evaluation of the header overhead reduction for different types of IP flows under the two approaches when they are applied to mobile networks.
汽车、公共汽车、火车和飞机等移动实体的移动互联网接入需求很大。移动协议Mobile IPv6和NEMO使用双向隧道机制,所有通信都要经过隧道。如果此隧道为网络中的节点及其通信者提供网络移动性透明性,它也引入了很高的协议开销,因为每条消息都携带多个Internet报头。这一点至关重要,因为隧道建立在不同的接入技术上,如无线局域网和3G,其中带宽是稀缺资源。此外,对于每个移动终端(MN)或移动路由器(MR),移动协议与本地代理(HA)创建了一条隧道,当它必须为数千台移动设备提供服务时,这可能成为瓶颈。已知ROHC报头压缩机制能够减少报头大小并提高低带宽链路的性能。因此,ROHC可以用来减少隧道报头开销,提高HA的性能。然而,ROHC是一种复杂的机制,它的使用需要针对这种特定的用途进行优化。在本文中,我们提出了两种方法来优化在NEMO网络中使用ROHC压缩时ROHC剖面的使用。在第一种方法中,我们建议使用减少数量的ROHC配置文件。由于IP报头是最大的报头,建议只使用ROHC的IP配置文件。此外,对每个用户应用报头压缩是为了减少上下文的数量,从而减少HA时的处理负载和内存消耗。第二种方法建议根据MR和HA使用的资源将ROHC概况分类为不同的级别。优化ROHC配置文件的使用,虽然降低了报头压缩性能,但作为回报它节省了资源。此外,还降低了ROHC机构的复杂性。我们提出了在两种方法下,当它们应用于移动网络时,不同类型的IP流的报头开销减少的性能评估。
{"title":"Optimising the Use of Robust Header Compression Profiles in NEMO Networks","authors":"Priyanka Rawat, J. Bonnin, A. Minaburo","doi":"10.1109/ICN.2008.35","DOIUrl":"https://doi.org/10.1109/ICN.2008.35","url":null,"abstract":"Mobile Internet access in moving entities such as, cars, buses, trains, and airplanes is in great demand. The mobility protocols Mobile IPv6 and NEMO, use a bi-directional tunneling mechanism and all communications pass through this tunnel. If this tunnel provides network mobility transparency to the nodes within the network and to their correspondents, it also introduces high protocol overheads since multiple Internet header are carried on each message. This becomes critical since the tunnel is established over different access technologies such as Wireless LAN and 3G where bandwidth is a scarce resource. Moreover, for each mobile terminal (MN) or mobile router (MR), the mobility protocols create a tunnel with the home agent (HA) which can become a bottleneck when it has to serve thousands of mobiles. ROHC header compression mechanism is known to be able to reduce header size and improve performance in low bandwidth links. Thus, ROHC can be used to reduce the tunnel header overhead and improve the performance of the HA. However, ROHC is a complex mechanism and its use needs to be optimised for this specific usage. In this paper, we present two approaches to optimise the use of ROHC profiles when ROHC compression is used in NEMO networks. In the first approach, we suggest to use a reduced number of ROHC profiles. It is proposed to use only the IP profile of ROHC as IP header is the largest header. Also, header compression is applied per user in order to reduce the number of contexts and thus to reduce the processing load and the memory consumption at HA. The second approach proposes to classify the ROHC profiles into different levels depending on the resources that are used at the MR and HA. Optimising the use of ROHC profiles, although reduces the header compression performance, in return it saves resources. Moreover, the complexity of the ROHC mechanism is reduced. We present a performance evaluation of the header overhead reduction for different types of IP flows under the two approaches when they are applied to mobile networks.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125412631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Access Control Model for Web-Services That Supports Delegation and Creation of Authority 支持授权和创建权限的web服务访问控制模型
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.72
Mitsuhiro Mabuchi, Yasushi Shinjo, Akira Sato, Kazuhiko Kato
We present a new access control model for XML Web-Services that provides users with two kinds of authorities: the authority to delegate their authorities to other users and the authority to create new authorities based on their own authorities. We developed this model by introducing capability- based access control to Web services. A capability consists of an object identifier and the list of permitted operations for that object. We map an authority of a Web-Services object to a capability of the object and express the capability as a description in Web Services Description Language (WSDL). Delegation of an authority corresponds to distribution of a capability, which is done by passing a WSDL description. Creation of a new authority corresponds to generating a restricted capability based on an original capability, which is done by stacking an object on an original object. Stacking objects also makes it possible to add new functions to existing Web-Services objects without modifying the existing objects. We demonstrate the effectiveness of the proposed model using a schedule management application, which enables a project leader to delegate his or her tasks to subordinates by comparing it with Google Calendar. We also show that the execution times of stackable objects are acceptable by comparing them with typical Internet delay.
我们为XML Web-Services提出了一种新的访问控制模型,它为用户提供了两种类型的权限:将自己的权限委托给其他用户的权限和基于自己的权限创建新权限的权限。我们通过向Web服务引入基于功能的访问控制来开发这个模型。功能由对象标识符和该对象允许的操作列表组成。我们将Web-Services对象的权限映射到该对象的功能,并将该功能表示为Web服务描述语言(WSDL)中的描述。授权对应于功能的分布,这是通过传递WSDL描述来完成的。新权限的创建对应于基于原始功能生成受限制的功能,这是通过在原始对象上堆叠对象来完成的。堆叠对象还可以在不修改现有对象的情况下向现有Web-Services对象添加新功能。我们使用日程管理应用程序演示了所建议模型的有效性,该应用程序使项目负责人能够通过将其与Google Calendar进行比较,将其任务委派给下属。通过将可堆叠对象的执行时间与典型的Internet延迟进行比较,我们也证明了可堆叠对象的执行时间是可以接受的。
{"title":"An Access Control Model for Web-Services That Supports Delegation and Creation of Authority","authors":"Mitsuhiro Mabuchi, Yasushi Shinjo, Akira Sato, Kazuhiko Kato","doi":"10.1109/ICN.2008.72","DOIUrl":"https://doi.org/10.1109/ICN.2008.72","url":null,"abstract":"We present a new access control model for XML Web-Services that provides users with two kinds of authorities: the authority to delegate their authorities to other users and the authority to create new authorities based on their own authorities. We developed this model by introducing capability- based access control to Web services. A capability consists of an object identifier and the list of permitted operations for that object. We map an authority of a Web-Services object to a capability of the object and express the capability as a description in Web Services Description Language (WSDL). Delegation of an authority corresponds to distribution of a capability, which is done by passing a WSDL description. Creation of a new authority corresponds to generating a restricted capability based on an original capability, which is done by stacking an object on an original object. Stacking objects also makes it possible to add new functions to existing Web-Services objects without modifying the existing objects. We demonstrate the effectiveness of the proposed model using a schedule management application, which enables a project leader to delegate his or her tasks to subordinates by comparing it with Google Calendar. We also show that the execution times of stackable objects are acceptable by comparing them with typical Internet delay.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Highly Efficient Call Admission Control for Wireless Multimedia Traffic 无线多媒体业务的高效呼叫接纳控制
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.17
Stylianos Chatziperis, P. Koutsakis, M. Paterakis
The development of efficient call admission control schemes for next generation wireless cellular networks remains a challenging and yet unresolved problem, due to the rapidly growing number of multimedia applications and to user mobility. In recent work we have modeled the behavior of H.263 videoconference traces with the use of a discrete autoregressive (DAR(1)) model. Based on this model, we then proposed an efficient CAC scheme for videoconference traffic over cellular networks, which uses precomputed traffic scenarios for its decision-making and which was shown to clearly excel in comparison with well-known existing approaches, in terms of quality of service (QoS) provisioning to users receiving videoconference traffic. In this paper, we continue our work by enhancing and further studying our scheme for the case of "unknown users" attempting to enter the network and for the case of providing call admission control to web users as well as videoconference ones.
由于多媒体应用和用户移动性的快速增长,下一代无线蜂窝网络的高效呼叫接纳控制方案的开发仍然是一个具有挑战性和尚未解决的问题。在最近的工作中,我们使用离散自回归(DAR(1))模型对H.263视频会议轨迹的行为进行了建模。基于该模型,我们提出了蜂窝网络上视频会议流量的高效CAC方案,该方案使用预先计算的流量场景进行决策,并且在向接收视频会议流量的用户提供服务质量(QoS)方面,与已知的现有方法相比,该方案明显优于现有方法。在本文中,我们将继续我们的工作,对我们的方案进行改进和进一步研究,以应对“未知用户”试图进入网络的情况,以及为web用户和视频会议用户提供呼叫准入控制的情况。
{"title":"Highly Efficient Call Admission Control for Wireless Multimedia Traffic","authors":"Stylianos Chatziperis, P. Koutsakis, M. Paterakis","doi":"10.1109/ICN.2008.17","DOIUrl":"https://doi.org/10.1109/ICN.2008.17","url":null,"abstract":"The development of efficient call admission control schemes for next generation wireless cellular networks remains a challenging and yet unresolved problem, due to the rapidly growing number of multimedia applications and to user mobility. In recent work we have modeled the behavior of H.263 videoconference traces with the use of a discrete autoregressive (DAR(1)) model. Based on this model, we then proposed an efficient CAC scheme for videoconference traffic over cellular networks, which uses precomputed traffic scenarios for its decision-making and which was shown to clearly excel in comparison with well-known existing approaches, in terms of quality of service (QoS) provisioning to users receiving videoconference traffic. In this paper, we continue our work by enhancing and further studying our scheme for the case of \"unknown users\" attempting to enter the network and for the case of providing call admission control to web users as well as videoconference ones.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128031380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Liberating TCP: The Free and the Stunts 解放TCP:自由和特技
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.109
Jason Valdez, Mina Guirguis
The performance of a TCP connection is typically dictated by what the network can provide rather than what the application would like to achieve. In particular, the additive-increase multiplicative-decrease (AIMD) mechanism employed by TCP hinges on its ability to meet specific throughput requirements since it has to respond to congestion signals promptly by decreasing its sending rate. The level and the timing of congestion signals impose strict limitations on the achievable throughput over short time-scales. To that end, this paper presents a new architecture, whereby a set of TCP connections (we refer to them as the Stunts) sacrifice their performance on behalf of another TCP connection (we refer to it as the Free) by picking up a delegated subset of the congestion signals and reacting to them in lieu of the free connection. This gives the Free connection just enough freedom to meet specific throughput requirements as requested by the application, without affecting the level of congestion in the network. We evaluate our architecture via extensive simulation experiments.
TCP连接的性能通常取决于网络可以提供什么,而不是应用程序想要实现什么。特别是,TCP采用的加-增-乘-减(AIMD)机制取决于它满足特定吞吐量需求的能力,因为它必须通过降低发送速率来迅速响应拥塞信号。拥塞信号的水平和时间对短时间内可实现的吞吐量施加了严格的限制。为此,本文提出了一种新的体系结构,其中一组TCP连接(我们称其为噱头)牺牲其性能以代表另一个TCP连接(我们称其为自由),方法是获取拥塞信号的委托子集并对它们作出反应,以代替自由连接。这为Free连接提供了足够的自由来满足应用程序请求的特定吞吐量需求,而不会影响网络中的拥塞水平。我们通过大量的模拟实验来评估我们的架构。
{"title":"Liberating TCP: The Free and the Stunts","authors":"Jason Valdez, Mina Guirguis","doi":"10.1109/ICN.2008.109","DOIUrl":"https://doi.org/10.1109/ICN.2008.109","url":null,"abstract":"The performance of a TCP connection is typically dictated by what the network can provide rather than what the application would like to achieve. In particular, the additive-increase multiplicative-decrease (AIMD) mechanism employed by TCP hinges on its ability to meet specific throughput requirements since it has to respond to congestion signals promptly by decreasing its sending rate. The level and the timing of congestion signals impose strict limitations on the achievable throughput over short time-scales. To that end, this paper presents a new architecture, whereby a set of TCP connections (we refer to them as the Stunts) sacrifice their performance on behalf of another TCP connection (we refer to it as the Free) by picking up a delegated subset of the congestion signals and reacting to them in lieu of the free connection. This gives the Free connection just enough freedom to meet specific throughput requirements as requested by the application, without affecting the level of congestion in the network. We evaluate our architecture via extensive simulation experiments.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125892220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spectral Characteristics of Nonlinear Systems Approximated by Piecewise Linear Function 分段线性函数逼近非线性系统的谱特性
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.63
J. Schimmel, I. Koula, J. Misurec, Z. Smékal
This paper deals with an analytic solution of spectrum changes that appear in nonlinear discrete systems without memory whose transfer characteristics can be approximated via piecewise linear function. The paper also deals with relations between the mutual harmonics ratio and the approximation parameters. Furthermore, the dependence of the harmonics ratio on the amplitude of a harmonic input signal is presented for the most common systems whose transfer characteristics are approximated via piecewise linear function.
本文研究无记忆非线性离散系统中频谱变化的解析解,该系统的传递特性可以用分段线性函数逼近。本文还讨论了互谐波比与近似参数之间的关系。此外,对于最常见的传输特性近似为分段线性函数的系统,给出了谐波比与谐波输入信号幅值的关系。
{"title":"Spectral Characteristics of Nonlinear Systems Approximated by Piecewise Linear Function","authors":"J. Schimmel, I. Koula, J. Misurec, Z. Smékal","doi":"10.1109/ICN.2008.63","DOIUrl":"https://doi.org/10.1109/ICN.2008.63","url":null,"abstract":"This paper deals with an analytic solution of spectrum changes that appear in nonlinear discrete systems without memory whose transfer characteristics can be approximated via piecewise linear function. The paper also deals with relations between the mutual harmonics ratio and the approximation parameters. Furthermore, the dependence of the harmonics ratio on the amplitude of a harmonic input signal is presented for the most common systems whose transfer characteristics are approximated via piecewise linear function.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124988806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Limited-Client-Capability Broadcasting Scheme for VoD Applications 用于VoD应用的有限客户端能力广播方案
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.18
Hsiang-Fu Yu, Hung-Chang Yang, Chu-Yi Chien, Yao-Tien Wang
Data broadcasting is independent of client arrival rate, and thus it is very suitable to transmit popular videos that interest many clients at a particular period of time. One broadcasting method (called periodic broadcasting) is to partition a video into segments, which are then simultaneously broadcast on several data channels. Once clients want to watch the video, they download the segments from these channels. Specially, the skyscraper broadcasting (SkB), client-centric approach (CCA), greedy disk-conserving broadcasting (GDB) schemes were proposed to support a client with a small bandwidth. This paper presents a limited-client-capability broadcasting (LCCB) scheme, which achieves small waiting time, bandwidth consumption, and buffer demand on the client side. In comparison with SkB, CCA, and GDB, LCCB gains smaller waiting time. Extensive simulation results indicate that LCCB also requires lower client buffer spaces than SkB, CCA, and GDB.
数据广播与客户端到达率无关,因此非常适合在特定时间段传输客户端感兴趣的热门视频。一种广播方法(称为周期性广播)是将视频分割成几个片段,然后在几个数据通道上同时广播。一旦客户想看视频,他们就从这些频道下载片段。特别提出了摩天大楼广播(SkB)、客户中心广播(CCA)和贪婪磁盘保存广播(GDB)方案,以支持小带宽的客户端。本文提出了一种有限客户端能力广播(LCCB)方案,该方案在客户端实现了较小的等待时间、带宽消耗和缓冲区需求。与SkB、CCA和GDB相比,LCCB的等待时间更短。大量的仿真结果表明,LCCB比SkB、CCA和GDB需要更少的客户机缓冲区空间。
{"title":"A Limited-Client-Capability Broadcasting Scheme for VoD Applications","authors":"Hsiang-Fu Yu, Hung-Chang Yang, Chu-Yi Chien, Yao-Tien Wang","doi":"10.1109/ICN.2008.18","DOIUrl":"https://doi.org/10.1109/ICN.2008.18","url":null,"abstract":"Data broadcasting is independent of client arrival rate, and thus it is very suitable to transmit popular videos that interest many clients at a particular period of time. One broadcasting method (called periodic broadcasting) is to partition a video into segments, which are then simultaneously broadcast on several data channels. Once clients want to watch the video, they download the segments from these channels. Specially, the skyscraper broadcasting (SkB), client-centric approach (CCA), greedy disk-conserving broadcasting (GDB) schemes were proposed to support a client with a small bandwidth. This paper presents a limited-client-capability broadcasting (LCCB) scheme, which achieves small waiting time, bandwidth consumption, and buffer demand on the client side. In comparison with SkB, CCA, and GDB, LCCB gains smaller waiting time. Extensive simulation results indicate that LCCB also requires lower client buffer spaces than SkB, CCA, and GDB.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122145008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Understanding BitTorrent Download Performance 了解BitTorrent下载性能
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.16
Dongliang Guan, Jiangtao Wang, Yue Zhang, Junni Dong
We conducted in this paper an experimental study on BitTorrent (BT) download performance. Although BT has been widely deployed, many important features about it are not clear yet. For example, what parameter configuration is optimal for its download performance and to what extent is its incentive mechanism efficient in preventing free-riding. We focused our study on two aspects in this paper: the impact of maximum concurrent upload number on download speed; the efficiency of BT's incentive mechanism on fairness and download performance in the face of free-riders. Our results reveal that there is not an uniform value for the optimal maximum concurrent upload number, and that BT's incentive mechanism is robust to free-riders at a large scale, however seed's upload capacity should be good engineered and BT's incentive mechanism deserve to be improved in some aspects, e.g., optimistic unchoke.
本文对BT下载性能进行了实验研究。尽管BT已经被广泛部署,但它的许多重要特性还不清楚。例如,什么参数配置对其下载性能最优,其激励机制在多大程度上有效防止搭便车。本文主要从两个方面进行研究:最大并发上传数对下载速度的影响;BT在面对“搭便车”的情况下对公平和下载性能的激励机制的效率。我们的研究结果表明,最优最大并发上传数没有统一的值,BT的激励机制对大规模的搭便车者是稳健的,但种子的上传能力需要很好的工程设计,BT的激励机制在一些方面值得改进,例如乐观的放开。
{"title":"Understanding BitTorrent Download Performance","authors":"Dongliang Guan, Jiangtao Wang, Yue Zhang, Junni Dong","doi":"10.1109/ICN.2008.16","DOIUrl":"https://doi.org/10.1109/ICN.2008.16","url":null,"abstract":"We conducted in this paper an experimental study on BitTorrent (BT) download performance. Although BT has been widely deployed, many important features about it are not clear yet. For example, what parameter configuration is optimal for its download performance and to what extent is its incentive mechanism efficient in preventing free-riding. We focused our study on two aspects in this paper: the impact of maximum concurrent upload number on download speed; the efficiency of BT's incentive mechanism on fairness and download performance in the face of free-riders. Our results reveal that there is not an uniform value for the optimal maximum concurrent upload number, and that BT's incentive mechanism is robust to free-riders at a large scale, however seed's upload capacity should be good engineered and BT's incentive mechanism deserve to be improved in some aspects, e.g., optimistic unchoke.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Seventh International Conference on Networking (icn 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1