首页 > 最新文献

2010 Proceedings IEEE INFOCOM最新文献

英文 中文
Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoretic Approach 无线传感器网络中的多信道分配:一种博弈论方法
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461935
Qing Yu, Jiming Chen, Yanfei Fan, Xuemin Shen, Youxian Sun
In this paper, we formulate multi-channel assignment in Wireless Sensor Networks (WSNs) as an optimization problem and show it is NP-hard. We then propose a distributed Game Based Channel Assignment algorithm (GBCA) to solve the problem. GBCA takes into account both the network topology information and transmission routing information. We prove that there exists at least one Nash Equilibrium in the channel assignment game. Furthermore, we analyze the sub-optimality of Nash Equilibrium and the convergence of the Best Response in the game. Simulation results are given to demonstrate that GBCA can reduce interference significantly and achieve satisfactory network performance in terms of delivery ratio, throughput, channel access delay and energy consumption.
本文将无线传感器网络(WSNs)中的多信道分配问题描述为一个优化问题,并证明了它是np困难的。然后,我们提出了一种基于分布式游戏的信道分配算法(GBCA)来解决这个问题。GBCA既考虑了网络拓扑信息,又考虑了传输路由信息。证明了信道分配对策中存在至少一个纳什均衡。进一步分析了纳什均衡的次最优性和博弈中最佳对策的收敛性。仿真结果表明,该方法能显著降低干扰,并在传输比、吞吐量、信道接入延迟和能耗等方面取得令人满意的网络性能。
{"title":"Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoretic Approach","authors":"Qing Yu, Jiming Chen, Yanfei Fan, Xuemin Shen, Youxian Sun","doi":"10.1109/INFCOM.2010.5461935","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461935","url":null,"abstract":"In this paper, we formulate multi-channel assignment in Wireless Sensor Networks (WSNs) as an optimization problem and show it is NP-hard. We then propose a distributed Game Based Channel Assignment algorithm (GBCA) to solve the problem. GBCA takes into account both the network topology information and transmission routing information. We prove that there exists at least one Nash Equilibrium in the channel assignment game. Furthermore, we analyze the sub-optimality of Nash Equilibrium and the convergence of the Best Response in the game. Simulation results are given to demonstrate that GBCA can reduce interference significantly and achieve satisfactory network performance in terms of delivery ratio, throughput, channel access delay and energy consumption.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126523747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
PeopleRank: Social Opportunistic Forwarding PeopleRank:社会机会主义转发
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462261
Abderrahmen Mtibaa, M. May, C. Diot, M. Ammar
In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes that are more likely to meet the destination. The question is which forwarding algorithm offers the best trade off between cost (number of message replicas) and rate of successful message delivery. We address this challenge by developing the PeopleRank approach in which nodes are ranked using a tunable weighted social information. Similar to the PageRank idea, PeopleRank gives higher weight to nodes if they are socially connected to important other nodes of the network. We develop centralized and distributed variants for the computation of PeopleRank. We present an evaluation using real mobility traces of nodes and their social interactions to show that PeopleRank manages to deliver messages with near optimal success rate (close to Epidemic Routing) while reducing the number of message retransmissions by 50% compared to Epidemic Routing.
在机会网络中,两个通信节点之间的端到端路径很少可用。在这种情况下,节点可能仍然会复制消息并将其转发给更有可能到达目的地的节点。问题是哪种转发算法在成本(消息副本数量)和成功消息传递率之间提供了最好的折衷。我们通过开发PeopleRank方法来解决这一挑战,该方法使用可调的加权社会信息对节点进行排名。与PageRank的想法类似,PeopleRank给那些与网络中重要的其他节点有社会联系的节点赋予更高的权重。我们为PeopleRank的计算开发了集中式和分布式变体。我们使用节点的真实移动轨迹及其社会互动进行了评估,以显示PeopleRank能够以接近最佳的成功率(接近流行病路由)传递消息,同时与流行病路由相比,将消息重传次数减少了50%。
{"title":"PeopleRank: Social Opportunistic Forwarding","authors":"Abderrahmen Mtibaa, M. May, C. Diot, M. Ammar","doi":"10.1109/INFCOM.2010.5462261","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462261","url":null,"abstract":"In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes that are more likely to meet the destination. The question is which forwarding algorithm offers the best trade off between cost (number of message replicas) and rate of successful message delivery. We address this challenge by developing the PeopleRank approach in which nodes are ranked using a tunable weighted social information. Similar to the PageRank idea, PeopleRank gives higher weight to nodes if they are socially connected to important other nodes of the network. We develop centralized and distributed variants for the computation of PeopleRank. We present an evaluation using real mobility traces of nodes and their social interactions to show that PeopleRank manages to deliver messages with near optimal success rate (close to Epidemic Routing) while reducing the number of message retransmissions by 50% compared to Epidemic Routing.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123809862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 316
The Capacity of Heterogeneous Wireless Networks 异构无线网络的容量
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462072
Pan Li, Yuguang Fang
Although capacity has been extensively studied in wireless networks, most of the results are for homogeneous wireless networks where all nodes are assumed identical. In this paper, we investigate the capacity of heterogeneous wireless networks with general network settings. Specifically, we consider a dense network with n normal nodes and m = n^b (0 < b < 1) more powerful helping nodes in a rectangular area with width b(n) and length 1/b(n), where b(n) = n^w and -1/2 < w ≤ 0. We assume there are n flows in the network. All the n normal nodes are sources while only randomly chosen n^d (0 < d < 1) normal nodes are destinations. We further assume the n normal nodes are uniformly and independently distributed, while the m helping nodes are either regularly placed or uniformly and independently distributed, resulting in two different kinds of networks called Regular Heterogeneous Wireless Networks and Random Heterogeneous Wireless Networks, respectively. In this paper, we attempt to find out what a heterogeneous wireless network with general network settings can do by deriving a lower bound on the capacity. We also explore the conditions under which heterogeneous wireless networks can provide throughput higher than traditional homogeneous wireless networks.
尽管在无线网络中对容量进行了广泛的研究,但大多数研究结果都是针对所有节点都假设相同的同构无线网络。在本文中,我们研究了具有一般网络设置的异构无线网络的容量。具体来说,我们考虑一个有n个正常节点且m = n^b (0 < b < 1)的密集网络,在宽度为b(n)、长度为1/b(n)的矩形区域中,有更强大的帮助节点,其中b(n) = n^w和-1/2 < w ≤0. 我们假设网络中有n个流。所有n个正常节点都是源,而只有随机选择的n^d (0 < d < 1)个正常节点是目标。我们进一步假设n个正态节点均匀独立分布,而m个辅助节点或规则放置或均匀独立分布,从而形成两种不同类型的网络,分别称为规则异构无线网络和随机异构无线网络。在本文中,我们试图通过推导容量的下界来找出具有一般网络设置的异构无线网络可以做什么。我们还探讨了在何种条件下异构无线网络可以提供比传统同构无线网络更高的吞吐量。
{"title":"The Capacity of Heterogeneous Wireless Networks","authors":"Pan Li, Yuguang Fang","doi":"10.1109/INFCOM.2010.5462072","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462072","url":null,"abstract":"Although capacity has been extensively studied in wireless networks, most of the results are for homogeneous wireless networks where all nodes are assumed identical. In this paper, we investigate the capacity of heterogeneous wireless networks with general network settings. Specifically, we consider a dense network with n normal nodes and m = n^b (0 < b < 1) more powerful helping nodes in a rectangular area with width b(n) and length 1/b(n), where b(n) = n^w and -1/2 < w &#8804; 0. We assume there are n flows in the network. All the n normal nodes are sources while only randomly chosen n^d (0 < d < 1) normal nodes are destinations. We further assume the n normal nodes are uniformly and independently distributed, while the m helping nodes are either regularly placed or uniformly and independently distributed, resulting in two different kinds of networks called Regular Heterogeneous Wireless Networks and Random Heterogeneous Wireless Networks, respectively. In this paper, we attempt to find out what a heterogeneous wireless network with general network settings can do by deriving a lower bound on the capacity. We also explore the conditions under which heterogeneous wireless networks can provide throughput higher than traditional homogeneous wireless networks.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125190505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Improving QoS in BitTorrent-like VoD Systems 改进类似bittorrent的VoD系统的QoS
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462029
Yan Yang, Alix L. H. Chow, L. Golubchik, Danielle Bragg
In recent years a number of research efforts have focused on effective use of P2P-based systems in providing large scale video streaming services. In particular, live streaming and Video-on-Demand (VoD) systems have attracted much interest. While previous efforts mainly focused on the common challenges faced by both types of applications, there are still a number of fundamental open questions in designing P2P-based VoD systems, which is the focus of our effort. Specifically, in this paper, we consider a BitTorrent-like VoD system and focus on the following questions: (1) how the lack of load balance, which typically exists in a P2P- based VoD system, affects the performance and what steps can be taken to remedy that, and (2) is a FCFS approach to serving requests at a peer sufficient or whether a Deadline-Aware Scheduling (DAS) approach can lead to performance improvements. Given the deadline considerations that exist in VoD systems, we also investigate approaches to avoiding unnecessary queueing time. For each of these questions, we first illustrate deficiencies of current approaches in adequately meeting streaming quality of service requirements. Motivated by this, we propose several practical schemes aimed at addressing these questions. To illustrate the benefits of our approach, we present an extensive simulation-based performance study.
近年来,许多研究工作都集中在有效利用基于p2p的系统来提供大规模视频流服务上。特别是,直播和视频点播(VoD)系统引起了人们的极大兴趣。虽然以前的工作主要集中在这两种类型的应用程序面临的共同挑战,但在设计基于p2p的VoD系统时仍然存在一些基本的开放性问题,这是我们努力的重点。具体来说,在本文中,我们考虑了一个类似bittorrent的VoD系统,并关注以下问题:(1)缺乏负载平衡(通常存在于基于P2P的VoD系统中)如何影响性能以及可以采取哪些措施来补救这一问题,以及(2)FCFS方法是否在对等端足够的情况下服务请求,或者截止日期感知调度(DAS)方法是否可以导致性能改进。考虑到视频点播系统中存在的截止日期因素,我们还研究了避免不必要排队时间的方法。对于这些问题,我们首先说明了当前方法在充分满足流媒体服务质量要求方面的缺陷。基于此,我们提出了几个旨在解决这些问题的实际方案。为了说明我们的方法的好处,我们提出了一个广泛的基于模拟的性能研究。
{"title":"Improving QoS in BitTorrent-like VoD Systems","authors":"Yan Yang, Alix L. H. Chow, L. Golubchik, Danielle Bragg","doi":"10.1109/INFCOM.2010.5462029","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462029","url":null,"abstract":"In recent years a number of research efforts have focused on effective use of P2P-based systems in providing large scale video streaming services. In particular, live streaming and Video-on-Demand (VoD) systems have attracted much interest. While previous efforts mainly focused on the common challenges faced by both types of applications, there are still a number of fundamental open questions in designing P2P-based VoD systems, which is the focus of our effort. Specifically, in this paper, we consider a BitTorrent-like VoD system and focus on the following questions: (1) how the lack of load balance, which typically exists in a P2P- based VoD system, affects the performance and what steps can be taken to remedy that, and (2) is a FCFS approach to serving requests at a peer sufficient or whether a Deadline-Aware Scheduling (DAS) approach can lead to performance improvements. Given the deadline considerations that exist in VoD systems, we also investigate approaches to avoiding unnecessary queueing time. For each of these questions, we first illustrate deficiencies of current approaches in adequately meeting streaming quality of service requirements. Motivated by this, we propose several practical schemes aimed at addressing these questions. To illustrate the benefits of our approach, we present an extensive simulation-based performance study.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"38 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
Asymmetry-Aware Real-Time Distributed Joint Resource Allocation in IEEE 802.22 WRANs IEEE 802.22 WRANs中不对称感知的实时分布式联合资源分配
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462171
Hyoil Kim, K. Shin
In IEEE 802.22 Wireless Regional Area Networks (WRANs), each Base Station (BS) solves a complex resource allocation problem of simultaneously determining the channel to reuse, power for adaptive coverage, and Consumer Premise Equipments (CPEs) to associate with, while maximizing the total downstream capacity of CPEs. Although joint power and channel allocation is a classical problem, resource allocation in WRANs faces two unique challenges that has not yet been addressed: (1) the presence of small-scale incumbents such as wireless microphones (WMs), and (2) asymmetric interference patterns between BSs using omnidirectional antennas and CPEs using directional antennas. In this paper, we capture this asymmetry in upstream/downstream communications to propose an accurate and realistic WRAN-WM coexistence model that increases spatial reuse of TV spectrum while protecting small-scale incumbents. Based on the proposed model, we formulate the resource allocation problem as a mixed-integer nonlinear programming (MINLP) which is NP-hard. To solve the problem in real-time, we propose a suboptimal algorithm based on the Genetic Algorithm (GA), and extend the basic GA algorithm to a fully-distributed GA algorithm (dGA) that distributes computational cost over the network and achieves scalability via local cooperation between neighboring BSs. Using extensive simulation, the proposed dGA is shown to perform as good as 99.4- 99.8% of the optimal solution, while reducing the computational cost significantly.
在IEEE 802.22无线区域网络(WRANs)中,每个基站(BS)解决了一个复杂的资源分配问题,即同时确定要重用的信道、用于自适应覆盖的功率和要关联的消费者前提设备(cpe),同时最大化cpe的总下游容量。虽然联合功率和信道分配是一个经典问题,但WRANs中的资源分配面临两个尚未解决的独特挑战:(1)无线麦克风(WMs)等小规模现有设备的存在;(2)使用全向天线的BSs和使用定向天线的cpe之间的不对称干扰模式。在本文中,我们抓住了上下游通信中的这种不对称性,提出了一个准确和现实的WRAN-WM共存模型,该模型在保护小规模现有运营商的同时增加了电视频谱的空间重用。基于该模型,我们将资源分配问题表述为np困难的混合整数非线性规划问题。为了实时解决这一问题,我们提出了一种基于遗传算法(GA)的次优算法,并将基本遗传算法扩展为全分布式遗传算法(dGA),该算法在网络上分配计算成本,并通过相邻BSs之间的局部协作实现可扩展性。通过大量的仿真,所提出的dGA的性能达到了最优解的99.4- 99.8%,同时显著降低了计算成本。
{"title":"Asymmetry-Aware Real-Time Distributed Joint Resource Allocation in IEEE 802.22 WRANs","authors":"Hyoil Kim, K. Shin","doi":"10.1109/INFCOM.2010.5462171","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462171","url":null,"abstract":"In IEEE 802.22 Wireless Regional Area Networks (WRANs), each Base Station (BS) solves a complex resource allocation problem of simultaneously determining the channel to reuse, power for adaptive coverage, and Consumer Premise Equipments (CPEs) to associate with, while maximizing the total downstream capacity of CPEs. Although joint power and channel allocation is a classical problem, resource allocation in WRANs faces two unique challenges that has not yet been addressed: (1) the presence of small-scale incumbents such as wireless microphones (WMs), and (2) asymmetric interference patterns between BSs using omnidirectional antennas and CPEs using directional antennas. In this paper, we capture this asymmetry in upstream/downstream communications to propose an accurate and realistic WRAN-WM coexistence model that increases spatial reuse of TV spectrum while protecting small-scale incumbents. Based on the proposed model, we formulate the resource allocation problem as a mixed-integer nonlinear programming (MINLP) which is NP-hard. To solve the problem in real-time, we propose a suboptimal algorithm based on the Genetic Algorithm (GA), and extend the basic GA algorithm to a fully-distributed GA algorithm (dGA) that distributes computational cost over the network and achieves scalability via local cooperation between neighboring BSs. Using extensive simulation, the proposed dGA is shown to perform as good as 99.4- 99.8% of the optimal solution, while reducing the computational cost significantly.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"61 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131879449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Topology Discovery for Virtual Local Area Networks 虚拟局域网拓扑发现
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462267
Hassan Gobjuka
In this paper we investigate the problem of finding the physical layer topology of large, heterogeneous networks that comprises multiple VLANs and may include uncooperative network nodes. We prove that finding a layer-2 network topology for a given incomplete input is an NP-hard problem even when the network comprises only two VLANs and the network contains one loop and deciding whether a given input defines a unique VLANs topology is a co-NP-hard problem. We design several heuristic algorithms to find VLANs topology. Our first algorithm is designed for geographically wide-spread networks that may contain uncooperative devices. For such networks the algorithm discovers the topology for each VLAN then merges them to infer the network topology in O(n^3) time, where $n$ is the number of internal network nodes. Our second algorithm is designed for smaller, active networks where each device in the network provides access to their MIB and few AFT entries are missing. For such networks, the algorithm finds the unique topology of VLANs in O(n^3) time. We have implemented both the algorithms described in this paper and conducted extensive experiments on multiple networks. Our experiments demonstrate that our approach is quite practical and discovers the accurate VLANs topology of large and heterogeneous networks whose input may not necessarily be complete. To the best of our knowledge, this is the first paper investigating topology discovery for VLANs.
在本文中,我们研究了寻找由多个vlan组成并可能包括不合作网络节点的大型异构网络的物理层拓扑的问题。我们证明了即使网络只包含两个vlan且网络包含一个环路,为给定的不完整输入寻找二层网络拓扑也是一个np困难问题,并且确定给定输入是否定义了唯一的vlan拓扑是一个协同np困难问题。我们设计了几种启发式算法来查找vlan拓扑结构。我们的第一个算法是为可能包含不合作设备的地理上广泛分布的网络设计的。对于这样的网络,算法发现每个VLAN的拓扑结构,然后将它们合并,在O(n^3)时间内推断出网络拓扑结构,其中$n$为内部网络节点的数量。我们的第二种算法是为较小的活动网络设计的,其中网络中的每个设备都提供对其MIB的访问,并且很少缺少AFT条目。对于这种网络,该算法在O(n^3)时间内找到vlan的唯一拓扑。我们已经实现了本文中描述的两种算法,并在多个网络上进行了广泛的实验。我们的实验表明,我们的方法是非常实用的,并且发现了输入不一定完整的大型异构网络的准确vlan拓扑。据我们所知,这是第一篇研究vlan拓扑发现的论文。
{"title":"Topology Discovery for Virtual Local Area Networks","authors":"Hassan Gobjuka","doi":"10.1109/INFCOM.2010.5462267","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462267","url":null,"abstract":"In this paper we investigate the problem of finding the physical layer topology of large, heterogeneous networks that comprises multiple VLANs and may include uncooperative network nodes. We prove that finding a layer-2 network topology for a given incomplete input is an NP-hard problem even when the network comprises only two VLANs and the network contains one loop and deciding whether a given input defines a unique VLANs topology is a co-NP-hard problem. We design several heuristic algorithms to find VLANs topology. Our first algorithm is designed for geographically wide-spread networks that may contain uncooperative devices. For such networks the algorithm discovers the topology for each VLAN then merges them to infer the network topology in O(n^3) time, where $n$ is the number of internal network nodes. Our second algorithm is designed for smaller, active networks where each device in the network provides access to their MIB and few AFT entries are missing. For such networks, the algorithm finds the unique topology of VLANs in O(n^3) time. We have implemented both the algorithms described in this paper and conducted extensive experiments on multiple networks. Our experiments demonstrate that our approach is quite practical and discovers the accurate VLANs topology of large and heterogeneous networks whose input may not necessarily be complete. To the best of our knowledge, this is the first paper investigating topology discovery for VLANs.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks 各向异性传感器网络中虚拟标尺的构造距离估计
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461928
Yun Wang, Kai Li, Jie Wu
Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in sensor networks. Compared with isotropic networks, anisotropic networks are more intractable in that their properties vary according to the directions of measurement. Anisotropic properties result from various factors, such as geographic shapes, irregular radio patterns, node densities, and impacts from obstacles. In this paper, we study the problem of measuring irregularity of sensor networks and evaluating its impact on distance estimation. In particular, we establish a new metric to measure irregularity along a path in sensor networks, and identify turning nodes where a considered path is inflected. Furthermore, we develop an approach to construct a virtual ruler for distance estimation between any pair of sensor nodes. The construction of a virtual ruler is carried out according to distance measurements among beacon nodes. However, it does not require beacon nodes to be deployed uniformly throughout sensor networks. Compared with existing methods, our approach neither assumes global knowledge of boundary recognition nor relies on uniform distribution of beacon nodes. Therefore, this approach is robust and applicable in practical environments. Simulation results show that our approach outperforms some previous methods, such as DVDistance and PDM.
距离估计是无线传感器网络许多功能的基础,近年来得到了广泛的研究。距离估计的一个关键挑战是处理传感器网络中的各向异性问题。与各向同性网络相比,各向异性网络由于其性质随测量方向的不同而变化,因此更加难以处理。各向异性是由多种因素造成的,如地理形状、不规则射电模式、节点密度和障碍物的影响。本文研究了传感器网络不规则性的测量问题,并评估了其对距离估计的影响。特别是,我们建立了一个新的度量来测量传感器网络中沿路径的不规则性,并识别考虑路径弯曲的转弯节点。此外,我们还提出了一种构造虚拟标尺的方法来估计任意对传感器节点之间的距离。根据信标节点间的距离测量来构造虚拟标尺。然而,它不要求信标节点在整个传感器网络中统一部署。与现有方法相比,我们的方法既不假设边界识别的全局知识,也不依赖于信标节点的均匀分布。因此,该方法健壮且适用于实际环境。仿真结果表明,该方法优于现有的DVDistance和PDM方法。
{"title":"Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks","authors":"Yun Wang, Kai Li, Jie Wu","doi":"10.1109/INFCOM.2010.5461928","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461928","url":null,"abstract":"Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in sensor networks. Compared with isotropic networks, anisotropic networks are more intractable in that their properties vary according to the directions of measurement. Anisotropic properties result from various factors, such as geographic shapes, irregular radio patterns, node densities, and impacts from obstacles. In this paper, we study the problem of measuring irregularity of sensor networks and evaluating its impact on distance estimation. In particular, we establish a new metric to measure irregularity along a path in sensor networks, and identify turning nodes where a considered path is inflected. Furthermore, we develop an approach to construct a virtual ruler for distance estimation between any pair of sensor nodes. The construction of a virtual ruler is carried out according to distance measurements among beacon nodes. However, it does not require beacon nodes to be deployed uniformly throughout sensor networks. Compared with existing methods, our approach neither assumes global knowledge of boundary recognition nor relies on uniform distribution of beacon nodes. Therefore, this approach is robust and applicable in practical environments. Simulation results show that our approach outperforms some previous methods, such as DVDistance and PDM.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124268791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless Networks 齐次无线网络中计算3连通m控制集的一种新的常因子逼近
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462105
Donghyun Kim, Wei Wang, Xianyue Li, Zhao Zhang, Weili Wu
In this paper, we study the problem of constructing quality fault-tolerant Connected Dominating Sets (CDSs)in homogeneous wireless networks, which can be defined as minimum k-Connected m-Dominating Set ((k;m)-CDS) problem in Unit Disk Graphs (UDGs). We found that every existing approximation algorithm for this problem is incomplete for k >= 3 in a sense that it does not generate a feasible solution in some UDGs. Based on these observations, we propose a new polynomial time approximation algorithm for computing (3;m)-CDSs. We also show that our algorithm is correct and its approximation ratio is a constant.
本文研究了齐次无线网络中质量容错连通控制集(cds)的构造问题,该问题可定义为单位磁盘图(udg)中的最小k-连通m-控制集((k;m)-CDS)问题。我们发现,对于k >= 3,所有现有的逼近算法都是不完备的,即在某些udg中不能产生可行解。基于这些观察,我们提出了一种新的多项式时间近似算法来计算(3;m)- cds。我们还证明了我们的算法是正确的,它的近似比是一个常数。
{"title":"A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless Networks","authors":"Donghyun Kim, Wei Wang, Xianyue Li, Zhao Zhang, Weili Wu","doi":"10.1109/INFCOM.2010.5462105","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462105","url":null,"abstract":"In this paper, we study the problem of constructing quality fault-tolerant Connected Dominating Sets (CDSs)in homogeneous wireless networks, which can be defined as minimum k-Connected m-Dominating Set ((k;m)-CDS) problem in Unit Disk Graphs (UDGs). We found that every existing approximation algorithm for this problem is incomplete for k >= 3 in a sense that it does not generate a feasible solution in some UDGs. Based on these observations, we propose a new polynomial time approximation algorithm for computing (3;m)-CDSs. We also show that our algorithm is correct and its approximation ratio is a constant.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132484508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping 基于交换跳径的节点故障弹性匿名通信协议
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462114
Fengjun Li, Bo Luo, Peng Liu, C. Chu
With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are highly desired. Existing approaches either rely on a relative small set of pre-selected relay servers to redirect the messages, or use structured peer-to-peer systems to multicast messages among a set of relay groups. The pre-selection approaches provide good anonymity, but suffer from node failures and scalability problem. The peer-to-peer approaches are subject to node churns and high maintenance overhead, which are the intrinsic problems of P2P systems. In this paper, we present CAT, a node-failure-resilient anonymous communication protocol. In this protocol, relay servers are randomly assigned to relay groups. The initiator of a connection selects a set of relay groups instead of relay servers to set up anonymous paths. A valid path consists of relay servers, one from each selected relay group. The initiator explores valid anonymous paths via a probing process. Since the relative positions of relay servers in the path are commutative, there exist multiple anonymous yet commutative paths, which form an anonymous tunnel. When a connection encounters a node failure, it quickly switches to a nearest backup path in the tunnel through ``path hopping'''', without tampering the initiator or renegotiating the keys. Hence, the protocol is resilient to node failures. We also show that the protocol provides good anonymity even when facing types of active and passive attacks. Finally, the operating cost of CAT is analyzed and shown to be similar to other node-based anonymous communication protocols.
随着对互联网用户隐私的担忧日益增加,对合作伙伴或第三方隐藏参与者身份的匿名通信系统非常受欢迎。现有的方法要么依赖于一组相对较小的预先选择的中继服务器来重定向消息,要么使用结构化的点对点系统在一组中继组之间多播消息。预选方法提供了良好的匿名性,但存在节点故障和可伸缩性问题。点对点方法存在节点频繁和维护开销大的问题,这是P2P系统固有的问题。本文提出了一种节点故障弹性匿名通信协议CAT。在该协议中,中继服务器被随机分配给中继组。连接发起方选择一组中继组而不是中继服务器来建立匿名路径。有效路径由多个中继服务器组成,每个中继服务器来自所选的中继组。发起者通过探测过程探索有效的匿名路径。由于中继服务器在路径中的相对位置是可交换的,因此存在多条匿名但可交换的路径,形成匿名隧道。当连接遇到节点故障时,它通过“路径跳变''''”迅速切换到隧道中最近的备份路径,而不会篡改发起者或重新协商密钥。因此,该协议对节点故障具有弹性。我们还表明,即使面对各种主动和被动攻击,该协议也提供了良好的匿名性。最后,分析了CAT的运行成本,并表明其与其他基于节点的匿名通信协议相似。
{"title":"A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping","authors":"Fengjun Li, Bo Luo, Peng Liu, C. Chu","doi":"10.1109/INFCOM.2010.5462114","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462114","url":null,"abstract":"With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are highly desired. Existing approaches either rely on a relative small set of pre-selected relay servers to redirect the messages, or use structured peer-to-peer systems to multicast messages among a set of relay groups. The pre-selection approaches provide good anonymity, but suffer from node failures and scalability problem. The peer-to-peer approaches are subject to node churns and high maintenance overhead, which are the intrinsic problems of P2P systems. In this paper, we present CAT, a node-failure-resilient anonymous communication protocol. In this protocol, relay servers are randomly assigned to relay groups. The initiator of a connection selects a set of relay groups instead of relay servers to set up anonymous paths. A valid path consists of relay servers, one from each selected relay group. The initiator explores valid anonymous paths via a probing process. Since the relative positions of relay servers in the path are commutative, there exist multiple anonymous yet commutative paths, which form an anonymous tunnel. When a connection encounters a node failure, it quickly switches to a nearest backup path in the tunnel through ``path hopping'''', without tampering the initiator or renegotiating the keys. Hence, the protocol is resilient to node failures. We also show that the protocol provides good anonymity even when facing types of active and passive attacks. Finally, the operating cost of CAT is analyzed and shown to be similar to other node-based anonymous communication protocols.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134417521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks 有损IEEE 802.11无线网络中视频流质量评估指标
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461979
An Chan, K. Zeng, P. Mohapatra, Sung-Ju Lee, S. Banerjee
Peak Signal-to-Noise Ratio (PSNR) is the simplest and the most widely used video quality evaluation methodology. However, traditional PSNR calculations do not take the packet loss into account. This shortcoming, which is amplified in wireless networks, contributes to the inaccuracy in evaluating video streaming quality in wireless communications. Such inaccuracy in PSNR calculations adversely affects the development of video communications in wireless networks. This paper proposes a novel video quality evaluation methodology. As it not only considers the PSNR of a video, but also with modifications to handle the packet loss issue, we name this evaluation method MPSNR. MPSNR rectifies the inaccuracies in traditional PSNR computation, and helps us to approximate subjective video quality, Mean Opinion Score (MOS), more accurately. Using PSNR values calculated from MPSNR and simple network measurements, we apply linear regression techniques to derive two specific objective video quality metrics, PSNR-based Objective MOS (POMOS) and Rates-based Objective MOS (ROMOS). Through extensive experiments and human subjective tests, we show that the two metrics demonstrate high correlation with MOS. POMOS takes the averaged PSNR value of a video calculated from MPSNR as the only input. Despite its simplicity, it has a Pearson correlation of 0.8664 with the MOS. By adding a few other simple network measurements, such as the proportion of distorted frames in a video, ROMOS achieves an even higher Pearson correlation (0.9350) with the MOS. Compared with the PSNR metric from the traditional PSNR calculations, our metrics evaluate video streaming quality in wireless networks with a much higher accuracy while retaining the simplicity of PSNR calculation.
峰值信噪比(PSNR)是最简单、应用最广泛的视频质量评价方法。然而,传统的PSNR计算不考虑丢包。这一缺点在无线网络中被放大,导致了无线通信中视频流质量评估的不准确性。这种PSNR计算的不准确性影响了无线网络中视频通信的发展。本文提出了一种新的视频质量评价方法。由于它不仅考虑了视频的PSNR,而且还进行了修改以处理丢包问题,因此我们将这种评估方法命名为MPSNR。MPSNR修正了传统PSNR计算的不准确性,并帮助我们更准确地近似主观视频质量,即平均意见评分(Mean Opinion Score, MOS)。利用从MPSNR和简单网络测量中计算的PSNR值,我们应用线性回归技术推导出两个特定的客观视频质量指标,基于PSNR的目标MOS (POMOS)和基于率的目标MOS (ROMOS)。通过广泛的实验和人类主观测试,我们表明这两个指标与MOS高度相关。POMOS将由MPSNR计算出的视频平均PSNR值作为唯一输入。尽管它很简单,但它与MOS的Pearson相关性为0.8664。通过添加一些其他简单的网络测量,例如视频中扭曲帧的比例,ROMOS与MOS实现了更高的Pearson相关性(0.9350)。与传统PSNR计算的PSNR度量相比,我们的度量在保持PSNR计算的简单性的同时,以更高的精度评估无线网络中的视频流质量。
{"title":"Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks","authors":"An Chan, K. Zeng, P. Mohapatra, Sung-Ju Lee, S. Banerjee","doi":"10.1109/INFCOM.2010.5461979","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461979","url":null,"abstract":"Peak Signal-to-Noise Ratio (PSNR) is the simplest and the most widely used video quality evaluation methodology. However, traditional PSNR calculations do not take the packet loss into account. This shortcoming, which is amplified in wireless networks, contributes to the inaccuracy in evaluating video streaming quality in wireless communications. Such inaccuracy in PSNR calculations adversely affects the development of video communications in wireless networks. This paper proposes a novel video quality evaluation methodology. As it not only considers the PSNR of a video, but also with modifications to handle the packet loss issue, we name this evaluation method MPSNR. MPSNR rectifies the inaccuracies in traditional PSNR computation, and helps us to approximate subjective video quality, Mean Opinion Score (MOS), more accurately. Using PSNR values calculated from MPSNR and simple network measurements, we apply linear regression techniques to derive two specific objective video quality metrics, PSNR-based Objective MOS (POMOS) and Rates-based Objective MOS (ROMOS). Through extensive experiments and human subjective tests, we show that the two metrics demonstrate high correlation with MOS. POMOS takes the averaged PSNR value of a video calculated from MPSNR as the only input. Despite its simplicity, it has a Pearson correlation of 0.8664 with the MOS. By adding a few other simple network measurements, such as the proportion of distorted frames in a video, ROMOS achieves an even higher Pearson correlation (0.9350) with the MOS. Compared with the PSNR metric from the traditional PSNR calculations, our metrics evaluate video streaming quality in wireless networks with a much higher accuracy while retaining the simplicity of PSNR calculation.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131566062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
期刊
2010 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1