首页 > 最新文献

2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)最新文献

英文 中文
Optimization of services-into-burst multiplexing based on Hopfield network 基于Hopfield网络的突发业务复用优化
Pub Date : 2005-08-14 DOI: 10.1109/ICW.2005.65
Viet Minh Nhat Vo, A. Obaid, P. Poirier
Traffic grooming is the technique which combines low-bandwidth traffics into higher-bandwidth channels in order to satisfy certain constraints as to maximize the traffic throughput, minimize the connection-blocking probability, or optimize the wavelength bandwidth exploitation. A case considered in this paper is optimization of the multiplexing of customer services into bursts at the edge nodes of an optical network. This is formulated as an integer linear program and dealt with basing on the Hopfield network. The methods based on neural networks, normally require a considerable delay which is hard to practice for optical data transport. This paper also proposes solutions to reduce this delay.
业务量疏导是将低带宽业务量组合到高带宽信道中,以满足一定的约束条件,使业务量吞吐量最大化、连接阻塞概率最小化或优化波长带宽利用的技术。本文考虑的一个实例是在光网络的边缘节点将客户服务复用为突发的优化问题。将其表述为整数线性规划,并基于Hopfield网络进行处理。基于神经网络的方法通常需要相当大的延迟,这在光学数据传输中很难实现。本文还提出了减少这种延迟的解决方案。
{"title":"Optimization of services-into-burst multiplexing based on Hopfield network","authors":"Viet Minh Nhat Vo, A. Obaid, P. Poirier","doi":"10.1109/ICW.2005.65","DOIUrl":"https://doi.org/10.1109/ICW.2005.65","url":null,"abstract":"Traffic grooming is the technique which combines low-bandwidth traffics into higher-bandwidth channels in order to satisfy certain constraints as to maximize the traffic throughput, minimize the connection-blocking probability, or optimize the wavelength bandwidth exploitation. A case considered in this paper is optimization of the multiplexing of customer services into bursts at the edge nodes of an optical network. This is formulated as an integer linear program and dealt with basing on the Hopfield network. The methods based on neural networks, normally require a considerable delay which is hard to practice for optical data transport. This paper also proposes solutions to reduce this delay.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130325280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of security mechanisms in wireless sensor networks 无线传感器网络安全机制的评估
Pub Date : 2005-08-14 DOI: 10.1109/ICW.2005.47
Germano Guimarães, E. Souto, D. Sadok, J. Kelner
Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains however a considerable challenge as the hardware used often shows serious processing and energy limitations. This work evaluates the impact of a number of security mechanism on sensor nodes and the network as a whole. Hence a number of actual measurements were undertaken in a real sensor platform in order to accurately establish energy consumption for various encryption algorithms; as well the baseline scenario obtained when none of these is used. Measurements have shown that integrity code length added to application messages using some cryptography algorithms and MAC (message authentication code) is acceptable for a sensor node with 128 kB of ROM memory and 4 kB of RAM (MICA2). We also were able to check that power consumption of the encryption process does not in itself cause representative impact, since it is in the micro-joules range.
自组织和无线传感器网络最近作为成功的技术出现在许多应用领域。然而,由于所使用的硬件经常显示出严重的处理和能源限制,因此需要在其中构建安全服务仍然是一个相当大的挑战。这项工作评估了一些安全机制对传感器节点和整个网络的影响。因此,为了准确地建立各种加密算法的能耗,在真实的传感器平台上进行了许多实际测量;以及在不使用这些方法时获得的基线场景。测量表明,对于具有128 kB ROM内存和4 kB RAM (MICA2)的传感器节点,使用某些加密算法和MAC(消息验证码)添加到应用程序消息中的完整性代码长度是可以接受的。我们还能够检查加密过程的功耗本身不会造成代表性影响,因为它在微焦耳范围内。
{"title":"Evaluation of security mechanisms in wireless sensor networks","authors":"Germano Guimarães, E. Souto, D. Sadok, J. Kelner","doi":"10.1109/ICW.2005.47","DOIUrl":"https://doi.org/10.1109/ICW.2005.47","url":null,"abstract":"Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains however a considerable challenge as the hardware used often shows serious processing and energy limitations. This work evaluates the impact of a number of security mechanism on sensor nodes and the network as a whole. Hence a number of actual measurements were undertaken in a real sensor platform in order to accurately establish energy consumption for various encryption algorithms; as well the baseline scenario obtained when none of these is used. Measurements have shown that integrity code length added to application messages using some cryptography algorithms and MAC (message authentication code) is acceptable for a sensor node with 128 kB of ROM memory and 4 kB of RAM (MICA2). We also were able to check that power consumption of the encryption process does not in itself cause representative impact, since it is in the micro-joules range.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Multi-path traffic engineering distributed VPLS routing algorithm 多路径流量工程分布式VPLS路由算法
Pub Date : 2005-08-14 DOI: 10.1109/ICW.2005.58
N. Abuali, H. Mouftah, S. Gazor
The paper proposes a multi-path routing algorithm to guarantee the bandwidth QoS requirements of point to multipoint (P2MP) virtual private LAN services (VPLS). The probability to find a single feasible path which satisfies a VPLS bandwidth requirement is low for connection requests with large bandwidth constraint requirements or when the network is congested Thus, the proposed algorithm divides the required constraint into sub-constraints and finds the minimum number of optimum P2MP paths that meet the sub-constraint requirement. Most of the work in the area of multi-path routing is focused on partitioning the traffic among multiple point to point (P2P) paths. The traffic is partitioned to reduce the network congestion or to adaptively balance the load among multiple paths based on the network status. The novelty of the proposed algorithm is that the algorithm finds the minimum number of paths that satisfy certain bandwidth QoS constraint. Additionally, the multi-path route is calculated to avoid the critical links of other ingress routers and balances the load by choosing paths with maximum residual bandwidth. The proposed algorithm performance is validated using extensive simulation. The results show that the algorithm is capable of increasing the number of admitted requests and improve the network resource utilization by avoiding critical links and choosing paths with maximum residual bandwidth.
为了保证点对多点(P2MP)虚拟专用网业务(VPLS)的带宽QoS要求,提出了一种多路径路由算法。对于带宽约束要求较大的连接请求或网络拥塞时,找到满足VPLS带宽要求的单个可行路径的概率较低,因此,该算法将所要求的约束划分为子约束,并找到满足子约束要求的最优P2MP路径的最小个数。多路径路由领域的大部分工作都集中在将流量在多个点对点(P2P)路径之间进行划分上。对流量进行分区,可以减少网络拥塞,也可以根据网络状况在多条路径之间自适应均衡负载。该算法的新颖之处在于它能找到满足一定带宽QoS约束的最小路径数。此外,在计算多路径路由时,会避开其他入站路由器的关键链路,选择剩余带宽最大的路径进行负载均衡。通过大量的仿真验证了该算法的性能。结果表明,该算法通过避开关键链路和选择剩余带宽最大的路径,能够增加接收请求的数量,提高网络资源利用率。
{"title":"Multi-path traffic engineering distributed VPLS routing algorithm","authors":"N. Abuali, H. Mouftah, S. Gazor","doi":"10.1109/ICW.2005.58","DOIUrl":"https://doi.org/10.1109/ICW.2005.58","url":null,"abstract":"The paper proposes a multi-path routing algorithm to guarantee the bandwidth QoS requirements of point to multipoint (P2MP) virtual private LAN services (VPLS). The probability to find a single feasible path which satisfies a VPLS bandwidth requirement is low for connection requests with large bandwidth constraint requirements or when the network is congested Thus, the proposed algorithm divides the required constraint into sub-constraints and finds the minimum number of optimum P2MP paths that meet the sub-constraint requirement. Most of the work in the area of multi-path routing is focused on partitioning the traffic among multiple point to point (P2P) paths. The traffic is partitioned to reduce the network congestion or to adaptively balance the load among multiple paths based on the network status. The novelty of the proposed algorithm is that the algorithm finds the minimum number of paths that satisfy certain bandwidth QoS constraint. Additionally, the multi-path route is calculated to avoid the critical links of other ingress routers and balances the load by choosing paths with maximum residual bandwidth. The proposed algorithm performance is validated using extensive simulation. The results show that the algorithm is capable of increasing the number of admitted requests and improve the network resource utilization by avoiding critical links and choosing paths with maximum residual bandwidth.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"56 35","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120933391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Directed flooding: a fault-tolerant routing protocol for wireless sensor networks 定向泛洪:无线传感器网络的容错路由协议
Pub Date : 2005-08-14 DOI: 10.1109/ICW.2005.41
R. Farivar, M. Fazeli, S. Miremadi
Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing protocols have been specifically designed for WSNs where energy awareness is an essential design issue. Routing protocols in WSNs might differ depending on the application and network architecture. In this article, a fault-tolerant and energy efficient routing protocol for wireless sensor networks is proposed. This protocol is called directed flooding, and is a descendant of the flooding routing protocol, which consumes less energy, while maintaining high levels of fault-tolerance. This is done by sending data in a specific aperture instead of broadcasting, which is used in the traditional flooding algorithm. A simulation of this protocol was performed. The results of simulation are presented and analyzed.
无线传感器网络由具有传感、计算和无线通信能力的小节点组成。许多路由协议都是专门为无线传感器网络设计的,其中能量感知是一个基本的设计问题。wsn中的路由协议可能会根据应用程序和网络体系结构而有所不同。本文提出了一种适用于无线传感器网络的容错节能路由协议。这种协议被称为定向泛洪,是泛洪路由协议的后代,它消耗更少的能量,同时保持高水平的容错性。这是通过在特定的孔径内发送数据来完成的,而不是在传统的泛洪算法中使用广播。对该方案进行了仿真。给出了仿真结果并进行了分析。
{"title":"Directed flooding: a fault-tolerant routing protocol for wireless sensor networks","authors":"R. Farivar, M. Fazeli, S. Miremadi","doi":"10.1109/ICW.2005.41","DOIUrl":"https://doi.org/10.1109/ICW.2005.41","url":null,"abstract":"Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing protocols have been specifically designed for WSNs where energy awareness is an essential design issue. Routing protocols in WSNs might differ depending on the application and network architecture. In this article, a fault-tolerant and energy efficient routing protocol for wireless sensor networks is proposed. This protocol is called directed flooding, and is a descendant of the flooding routing protocol, which consumes less energy, while maintaining high levels of fault-tolerance. This is done by sending data in a specific aperture instead of broadcasting, which is used in the traditional flooding algorithm. A simulation of this protocol was performed. The results of simulation are presented and analyzed.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
QoS path selection exploiting minimum link delays in MPLS-based networks 在基于mpls的网络中利用最小链路延迟的QoS路径选择
Pub Date : 2005-08-14 DOI: 10.1109/ICW.2005.70
S. Fowler, S. Zeadally, Farhan Siddiqui
Real-time multimedia is typically associated with various quality of service (QoS) requirements. Several QoS routing schemes have been proposed to determine a path which has sufficient bandwidth to achieve the desired QoS requirements. Some of these schemes flood nodes with advertisements to obtain information about congestion on the links. Consequently, protocol overhead is of concern in such cases. Other schemes use source routing to determine the shortest routing path, but security is a major concern for allowing source routing in the Internet. To efficiently support QoS over IP networks, traffic engineering (TE) has introduced multiprotocol label switching (MPLS). QoS routing is an essential component of MPLS to maximize network resources. In this paper, we propose an approach that sets up a label switched path (LSP) based on the lowest time delay from the ingress to the egress router using only the ingress, rather than requiring all the nodes in the network to exchange information. Our simulation results show that with our proposed approach, we obtain an improvement in the number of packets delivered and better use of network resources. Furthermore, modification of the MPLS domain is not required.
实时多媒体通常与各种服务质量(QoS)需求相关联。已经提出了几种QoS路由方案,以确定具有足够带宽的路径来实现期望的QoS要求。其中一些方案向节点发送大量广告,以获取链路上的拥塞信息。因此,在这种情况下,协议开销是值得关注的。其他方案使用源路由来确定最短的路由路径,但是在Internet中允许源路由时,安全性是一个主要问题。为了有效地支持IP网络的QoS, TE (traffic engineering)引入了MPLS (multiprotocol label switching)技术。QoS路由是MPLS实现网络资源最大化的重要组成部分。本文提出了一种基于最小时延的标签交换路径(label switched path, LSP)的方法,该方法不需要网络中的所有节点交换信息,而只使用入口路由器。仿真结果表明,采用本文提出的方法,可以提高数据包的传输数量,更好地利用网络资源。不需要修改MPLS域。
{"title":"QoS path selection exploiting minimum link delays in MPLS-based networks","authors":"S. Fowler, S. Zeadally, Farhan Siddiqui","doi":"10.1109/ICW.2005.70","DOIUrl":"https://doi.org/10.1109/ICW.2005.70","url":null,"abstract":"Real-time multimedia is typically associated with various quality of service (QoS) requirements. Several QoS routing schemes have been proposed to determine a path which has sufficient bandwidth to achieve the desired QoS requirements. Some of these schemes flood nodes with advertisements to obtain information about congestion on the links. Consequently, protocol overhead is of concern in such cases. Other schemes use source routing to determine the shortest routing path, but security is a major concern for allowing source routing in the Internet. To efficiently support QoS over IP networks, traffic engineering (TE) has introduced multiprotocol label switching (MPLS). QoS routing is an essential component of MPLS to maximize network resources. In this paper, we propose an approach that sets up a label switched path (LSP) based on the lowest time delay from the ingress to the egress router using only the ingress, rather than requiring all the nodes in the network to exchange information. Our simulation results show that with our proposed approach, we obtain an improvement in the number of packets delivered and better use of network resources. Furthermore, modification of the MPLS domain is not required.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127038060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
State-driven energy optimization in wireless sensor networks 无线传感器网络中状态驱动的能量优化
Pub Date : 2005-08-14 DOI: 10.1109/ICW.2005.76
R. Jurdak, P. Baldi, C. Lopes
Most sensor network applications require quality of service guarantees on a network-wide basis, suggesting the need for global network cost optimization. The dynamic and nonuniform local states of individual nodes in sensor networks complicate global cost optimization. Here, we present an approach for optimizing global cost in sensor networks through greedy local decisions at each node, and we explore the benefits of this approach in reducing the idle listening at individual nodes in order to reduce the global network energy cost. We consider two representations for the local sensor node state: (1) number of descendants in the routing tree: and (2) number of descendants and duty cycle. For both state representations, we show through experiments on a testbed of 14 mica2 sensor nodes running ALPL that enabling nodes to set their listening mode according to their local state reduces global energy cost by 35% and provides more balanced energy consumption over the case of BMAC.
大多数传感器网络应用需要在全网范围内保证服务质量,这表明需要全局网络成本优化。传感器网络中单个节点的动态和不均匀局部状态使全局成本优化变得复杂。在这里,我们提出了一种通过每个节点的贪婪局部决策来优化传感器网络全局成本的方法,并探讨了这种方法在减少单个节点的空闲侦听以降低全局网络能源成本方面的好处。我们考虑了本地传感器节点状态的两种表示方式:(1)路由树中的后代数量;(2)后代数量和占空比。对于这两种状态表示,我们通过运行ALPL的14个mica2传感器节点的测试平台上的实验表明,使节点能够根据其本地状态设置侦听模式,从而减少了35%的全局能源成本,并且比BMAC提供了更平衡的能源消耗。
{"title":"State-driven energy optimization in wireless sensor networks","authors":"R. Jurdak, P. Baldi, C. Lopes","doi":"10.1109/ICW.2005.76","DOIUrl":"https://doi.org/10.1109/ICW.2005.76","url":null,"abstract":"Most sensor network applications require quality of service guarantees on a network-wide basis, suggesting the need for global network cost optimization. The dynamic and nonuniform local states of individual nodes in sensor networks complicate global cost optimization. Here, we present an approach for optimizing global cost in sensor networks through greedy local decisions at each node, and we explore the benefits of this approach in reducing the idle listening at individual nodes in order to reduce the global network energy cost. We consider two representations for the local sensor node state: (1) number of descendants in the routing tree: and (2) number of descendants and duty cycle. For both state representations, we show through experiments on a testbed of 14 mica2 sensor nodes running ALPL that enabling nodes to set their listening mode according to their local state reduces global energy cost by 35% and provides more balanced energy consumption over the case of BMAC.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116327251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A novel fairness based criticality avoidance routing algorithm for wavelength routed optical networks 波长路由光网络中基于公平性的临界避免路由算法
Pub Date : 2005-08-14 DOI: 10.1109/ICW.2005.14
S. Pramod, S. Siddiqui, H. Mouftah
In conventional RWA algorithms the shorter lightpaths fragment the available wavelengths resulting in a higher blocking probability for longer hopcount lightpaths. In this paper we study a novel routing algorithm, which uses traffic classification to classify different hop count connection requests to provide fairness among short and long hop count traffic requests. Also our routing algorithm uses the link criticality information which is related to the number of available wavelengths on a link to provide load balancing over all the links in a network.
在传统的RWA算法中,较短的光路分割可用波长,导致较长跳数光路的更高阻塞概率。本文研究了一种新的路由算法,该算法使用流量分类对不同跳数的连接请求进行分类,以保证短跳数和长跳数流量请求之间的公平性。此外,我们的路由算法使用链路临界信息,这与链路上可用波长的数量有关,以便在网络中的所有链路上提供负载平衡。
{"title":"A novel fairness based criticality avoidance routing algorithm for wavelength routed optical networks","authors":"S. Pramod, S. Siddiqui, H. Mouftah","doi":"10.1109/ICW.2005.14","DOIUrl":"https://doi.org/10.1109/ICW.2005.14","url":null,"abstract":"In conventional RWA algorithms the shorter lightpaths fragment the available wavelengths resulting in a higher blocking probability for longer hopcount lightpaths. In this paper we study a novel routing algorithm, which uses traffic classification to classify different hop count connection requests to provide fairness among short and long hop count traffic requests. Also our routing algorithm uses the link criticality information which is related to the number of available wavelengths on a link to provide load balancing over all the links in a network.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116156167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optical routing border gateway protocol-based advance lightpath setup 基于光路由边界网关协议的先进光路设置
Pub Date : 2005-08-14 DOI: 10.1109/ICW.2005.63
A. Hafid, A. Maach, M. Khair, J. Drissi
In inter-connected optical networks, users submit lightpath requests at the time they wish to establish the lightpath. The service provider consults the information gathered by the inter-domain routing protocols for available resources. For each request, the network must decide immediately whether to accept or reject the request. In this model, there is always the uncertainty of whether the user will be able to establish the desired lightpath at the desired time or not. Furthermore, in the context of a number of applications, e.g., Grid applications, users need to setup lightpaths in advance to perform their activities that are planned in advance. In this paper, we propose a scheme that allows the setup of inter-domain lightpaths in advance; it extends the Optical Routing Border Gateway Protocol (ORBGP) to get information about inter-domain paths and availability of wavelengths over a certain period of time in the future. One of the key innovations of the scheme is that it provides the user with alternatives, carefully selected, when his/her request cannot be accommodated because of resources shortage.
在互连的光网络中,用户在希望建立光路时提交光路请求。服务提供者根据域间路由协议收集的信息查找可用资源。对于每个请求,网络必须立即决定是接受还是拒绝该请求。在该模型中,用户是否能够在期望的时间建立期望的光路始终存在不确定性。此外,在许多应用程序的上下文中,例如,网格应用程序,用户需要提前设置光路来执行他们提前计划的活动。在本文中,我们提出了一种允许预先设置域间光路的方案;它扩展了光路由边界网关协议(ORBGP),以获得有关域间路径和未来一定时间内波长可用性的信息。该方案的关键创新之一是,当用户的要求因资源短缺而无法满足时,它为用户提供了精心挑选的替代方案。
{"title":"Optical routing border gateway protocol-based advance lightpath setup","authors":"A. Hafid, A. Maach, M. Khair, J. Drissi","doi":"10.1109/ICW.2005.63","DOIUrl":"https://doi.org/10.1109/ICW.2005.63","url":null,"abstract":"In inter-connected optical networks, users submit lightpath requests at the time they wish to establish the lightpath. The service provider consults the information gathered by the inter-domain routing protocols for available resources. For each request, the network must decide immediately whether to accept or reject the request. In this model, there is always the uncertainty of whether the user will be able to establish the desired lightpath at the desired time or not. Furthermore, in the context of a number of applications, e.g., Grid applications, users need to setup lightpaths in advance to perform their activities that are planned in advance. In this paper, we propose a scheme that allows the setup of inter-domain lightpaths in advance; it extends the Optical Routing Border Gateway Protocol (ORBGP) to get information about inter-domain paths and availability of wavelengths over a certain period of time in the future. One of the key innovations of the scheme is that it provides the user with alternatives, carefully selected, when his/her request cannot be accommodated because of resources shortage.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130780938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Host anomaly detection performance analysis based on system call of neuro-fuzzy using Soundex algorithm and N-gram technique 基于Soundex算法和N-gram技术的神经模糊系统调用主机异常检测性能分析
Pub Date : 2005-08-14 DOI: 10.1109/ICW.2005.49
Byung-Rae Cha
To improve the anomaly intrusion detection system using system calls, this study focuses on neuro-fuzzy learning using the Soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern. That is, by changing variable length sequential system call data into a fixed length behavior pattern using the Soundex algorithm, this study conducted backpropagation neural networks with fuzzy membership function. The neuro-fuzzy and N-gram techniques are applied for anomaly intrusion detection of system calls using sendmail data of UNM to demonstrate its performance.
为了改进使用系统调用的异常入侵检测系统,本研究重点研究了使用Soundex算法的神经模糊学习,该算法旨在将特征选择和变长数据转换为固定长度的学习模式。即利用Soundex算法将变长序列系统调用数据转化为固定长度的行为模式,进行具有模糊隶属函数的反向传播神经网络。利用UNM的sendmail数据,将神经模糊和N-gram技术应用于系统调用的异常入侵检测,以验证其性能。
{"title":"Host anomaly detection performance analysis based on system call of neuro-fuzzy using Soundex algorithm and N-gram technique","authors":"Byung-Rae Cha","doi":"10.1109/ICW.2005.49","DOIUrl":"https://doi.org/10.1109/ICW.2005.49","url":null,"abstract":"To improve the anomaly intrusion detection system using system calls, this study focuses on neuro-fuzzy learning using the Soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern. That is, by changing variable length sequential system call data into a fixed length behavior pattern using the Soundex algorithm, this study conducted backpropagation neural networks with fuzzy membership function. The neuro-fuzzy and N-gram techniques are applied for anomaly intrusion detection of system calls using sendmail data of UNM to demonstrate its performance.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129047510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance analysis of random access channel in OFDMA systems OFDMA系统中随机接入信道的性能分析
Pub Date : 2005-08-14 DOI: 10.1109/ICW.2005.66
Insoo Koo, Seokjoo Shin, Kiseon Kim
The random access channel (RACH) in OFDMA systems is an uplink contention-based transport channel that is mainly used for subscriber stations to make a resource request to base stations. In this paper we focus on analyzing the performance of RACH in OFDMA systems such that the successful transmission probability, correctly detectable probability and throughput of RACH are analyzed. We also choose an access mechanism with binary exponential backoff delay procedure similar to that in IEEE 802.11. Based on the mechanism, we derive the delay and the blocking probability of RACH in OFDMA systems.
OFDMA系统中的随机接入信道(RACH)是一种基于上行链路竞争的传输信道,主要用于用户站向基站发出资源请求。本文重点分析了RACH在OFDMA系统中的性能,分析了RACH的成功传输概率、正确检测概率和吞吐量。我们还选择了一种类似于ieee802.11的二进制指数回退延迟过程的访问机制。在此基础上,推导了RACH在OFDMA系统中的时延和阻塞概率。
{"title":"Performance analysis of random access channel in OFDMA systems","authors":"Insoo Koo, Seokjoo Shin, Kiseon Kim","doi":"10.1109/ICW.2005.66","DOIUrl":"https://doi.org/10.1109/ICW.2005.66","url":null,"abstract":"The random access channel (RACH) in OFDMA systems is an uplink contention-based transport channel that is mainly used for subscriber stations to make a resource request to base stations. In this paper we focus on analyzing the performance of RACH in OFDMA systems such that the successful transmission probability, correctly detectable probability and throughput of RACH are analyzed. We also choose an access mechanism with binary exponential backoff delay procedure similar to that in IEEE 802.11. Based on the mechanism, we derive the delay and the blocking probability of RACH in OFDMA systems.","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125044265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1