首页 > 最新文献

2010 Proceedings IEEE INFOCOM最新文献

英文 中文
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication 随机差分DSSS:抗干扰无线广播通信
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462156
Yao Liu, P. Ning, H. Dai, An Liu
Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional anti-jamming techniques require that senders and receivers share a secret key in order to communicate with each other. However, such a requirement prevents these techniques from being effective for anti-jamming broadcast communication, where a jammer may learn the shared key from a compromised or malicious receiver and disrupt the reception at normal receivers. In this paper, we propose a Randomized Differential DSSS (RD-DSSS) scheme to achieve anti-jamming broadcast communication without shared keys. RD-DSSS encodes each bit of data using the correlation of unpredictable spreading codes. Specifically, bit ``0'' is encoded using two different spreading codes, which have low correlation with each other, while bit ``1'' is encoded using two identical spreading codes, which have high correlation. To defeat reactive jamming attacks, RD-DSSS uses multiple spreading code sequences to spread each message and rearranges the spread output before transmitting it. Our theoretical analysis and simulation results show that RD-DSSS can effectively defeat jamming attacks for anti-jamming broadcast communication without shared keys.
抗干扰对于需要可靠无线通信的应用至关重要。跳频扩频(FHSS)和直接序列扩频(DSSS)等扩频技术已被用于对抗干扰攻击。传统的抗干扰技术要求发送方和接收方共享密钥才能相互通信。然而,这样的要求使这些技术无法有效地用于抗干扰广播通信,其中干扰者可能从受损或恶意的接收器那里学习共享密钥,并破坏正常接收器的接收。在本文中,我们提出了一种随机差分DSSS (RD-DSSS)方案来实现无共享密钥的抗干扰广播通信。RD-DSSS使用不可预测的扩展码的相关性对每个数据位进行编码。其中,“0”位采用两种不同的扩频码编码,相关性较低;“1”位采用两种相同的扩频码编码,相关性较高。为了对抗被动干扰攻击,RD-DSSS使用多个扩频码序列对每条报文进行扩频,并在发送前对扩频输出进行重新排列。理论分析和仿真结果表明,RD-DSSS可以有效地挫败无共享密钥抗干扰广播通信的干扰攻击。
{"title":"Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication","authors":"Yao Liu, P. Ning, H. Dai, An Liu","doi":"10.1109/INFCOM.2010.5462156","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462156","url":null,"abstract":"Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional anti-jamming techniques require that senders and receivers share a secret key in order to communicate with each other. However, such a requirement prevents these techniques from being effective for anti-jamming broadcast communication, where a jammer may learn the shared key from a compromised or malicious receiver and disrupt the reception at normal receivers. In this paper, we propose a Randomized Differential DSSS (RD-DSSS) scheme to achieve anti-jamming broadcast communication without shared keys. RD-DSSS encodes each bit of data using the correlation of unpredictable spreading codes. Specifically, bit ``0'' is encoded using two different spreading codes, which have low correlation with each other, while bit ``1'' is encoded using two identical spreading codes, which have high correlation. To defeat reactive jamming attacks, RD-DSSS uses multiple spreading code sequences to spread each message and rearranges the spread output before transmitting it. Our theoretical analysis and simulation results show that RD-DSSS can effectively defeat jamming attacks for anti-jamming broadcast communication without shared keys.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"562 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116285637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 214
An Experimental Case for SIMO Random Access in Multi-hop Wireless Networks 多跳无线网络中SIMO随机接入的实验研究
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462252
Ahmed K. F. Khattab
In this paper, we demonstrate that multiple concurrent asynchronous and uncoordinated Single- Input Multiple-Output (SIMO) transmissions can successfully take place even though the respective receivers do not explicitly null out interfering signals. Thus motivated, we propose simple modifications to the widely deployed IEEE 802.11 MAC to enable multiple non-spatially-isolated SIMO sender-receiver pairs to share the medium. Namely, we propose to increase the physical carrier sensing threshold, disable virtual carrier sensing, and enable message in message packet detection. We use experiments to show that while increasing the peak transmission rate, spatial multiplexing schemes such as those employed by the IEEE 802.11n are highly non-robust to asynchronous and uncoordinated interferers. In contrast, we show that the proposed multi-flow SIMO MAC scheme alleviates the severe unfairness resulting from uncoordinated transmissions in 802.11 multi-hop networks.
在本文中,我们证明了多个并发异步和非协调的单输入多输出(SIMO)传输可以成功地发生,即使各自的接收器没有明确地消除干扰信号。因此,我们建议对广泛部署的IEEE 802.11 MAC进行简单修改,以使多个非空间隔离的SIMO发送方-接收方对能够共享介质。即,我们建议增加物理载波感知阈值,禁用虚拟载波感知,并启用消息包中的消息检测。我们通过实验表明,在提高峰值传输速率的同时,空间复用方案(如IEEE 802.11n所采用的方案)对异步和非协调干扰具有高度的非鲁棒性。相比之下,我们证明了所提出的多流SIMO MAC方案缓解了802.11多跳网络中由于不协调传输而导致的严重不公平。
{"title":"An Experimental Case for SIMO Random Access in Multi-hop Wireless Networks","authors":"Ahmed K. F. Khattab","doi":"10.1109/INFCOM.2010.5462252","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462252","url":null,"abstract":"In this paper, we demonstrate that multiple concurrent asynchronous and uncoordinated Single- Input Multiple-Output (SIMO) transmissions can successfully take place even though the respective receivers do not explicitly null out interfering signals. Thus motivated, we propose simple modifications to the widely deployed IEEE 802.11 MAC to enable multiple non-spatially-isolated SIMO sender-receiver pairs to share the medium. Namely, we propose to increase the physical carrier sensing threshold, disable virtual carrier sensing, and enable message in message packet detection. We use experiments to show that while increasing the peak transmission rate, spatial multiplexing schemes such as those employed by the IEEE 802.11n are highly non-robust to asynchronous and uncoordinated interferers. In contrast, we show that the proposed multi-flow SIMO MAC scheme alleviates the severe unfairness resulting from uncoordinated transmissions in 802.11 multi-hop networks.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks 基于CSMA/ ca的无线网络中退避不良节点的阶增益研究
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462002
Zhuo Lu, Wenye Wang, Cliff X. Wang
Backoff misbehavior, in which a wireless node deliberately manipulates its backoff time, can induce significant network problems, such as severe unfairness and denial-of-service. Although great progress has been made towards the design of countermeasures to backoff misbehavior, little attention has been focused on quantifying the gain of backoff misbehaviors. In this paper, we define and study two general classes of backoff misbehavior to assess the gain that misbehaving nodes can obtain. The first class, called continuous misbehavior, keeps manipulating the backoff time unless it is disabled by countermeasures. The second class is referred to as intermittent misbehavior, which tends to evade the detection by countermeasures by performing misbehavior sporadically. Our approach is to introduce a new performance metric, namely order gain, which is to characterize the performance benefits of misbehaving nodes in comparison to legitimate nodes. Through analytical studies, simulations, and experiments, we demonstrate the impact of a wide range of backoff misbehaviors on network performance with respect to the number of users in CSMA/CA-based wireless networks.
退避不当行为是指无线节点故意操纵退避时间,这种行为会引发严重的网络问题,比如严重的不公平和拒绝服务。虽然在设计退避不当行为的对策方面已经取得了很大的进展,但对退避不当行为收益的量化研究却很少。在本文中,我们定义并研究了两类一般的回退不当行为,以评估不当行为节点可以获得的增益。第一类被称为连续不当行为,它会持续操纵退避时间,除非被对策禁用。第二类被称为间歇性不当行为,它倾向于通过偶尔执行不当行为来逃避对策的检测。我们的方法是引入一个新的性能指标,即顺序增益,它用来描述与正常节点相比,行为不端的节点的性能优势。通过分析研究、模拟和实验,我们证明了在基于CSMA/ ca的无线网络中,相对于用户数量,广泛的回退不当行为对网络性能的影响。
{"title":"On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks","authors":"Zhuo Lu, Wenye Wang, Cliff X. Wang","doi":"10.1109/INFCOM.2010.5462002","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462002","url":null,"abstract":"Backoff misbehavior, in which a wireless node deliberately manipulates its backoff time, can induce significant network problems, such as severe unfairness and denial-of-service. Although great progress has been made towards the design of countermeasures to backoff misbehavior, little attention has been focused on quantifying the gain of backoff misbehaviors. In this paper, we define and study two general classes of backoff misbehavior to assess the gain that misbehaving nodes can obtain. The first class, called continuous misbehavior, keeps manipulating the backoff time unless it is disabled by countermeasures. The second class is referred to as intermittent misbehavior, which tends to evade the detection by countermeasures by performing misbehavior sporadically. Our approach is to introduce a new performance metric, namely order gain, which is to characterize the performance benefits of misbehaving nodes in comparison to legitimate nodes. Through analytical studies, simulations, and experiments, we demonstrate the impact of a wide range of backoff misbehaviors on network performance with respect to the number of users in CSMA/CA-based wireless networks.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless Routing 有向图上的随机漫步:估计无线路由传输成本的理论框架
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462109
Yanhua Li, Zhi-Li Zhang
In this paper we develop a unified theoretical framework for estimating various transmission costs of packet forwarding in wireless networks. Our framework can be applied to the three routing paradigms, best path routing, opportunistic routing, and stateless routing, to which nearly all existing routing protocols belong. We illustrate how packet forwarding under each paradigm can be modeled as random walks on directed graphs (digraphs). By generalizing the theory of random walks that has primarily been developed for undirected graphs to digraphs, we show how various transmission costs can be formulated in terms of hitting times and hitting costs of random walks on digraphs. As representative examples, we apply the theory to three specific routing protocols, one under each paradigm. Extensive simulations demonstrate that the proposed digraph based analytical model can achieve more accurate transmission cost estimation over existing methods.
本文提出了一个统一的理论框架,用于估计无线网络中各种数据包转发的传输成本。我们的框架可以应用于三种路由范例:最佳路径路由、机会路由和无状态路由,几乎所有现有的路由协议都属于这三种路由范例。我们说明了每个范例下的数据包转发如何被建模为有向图(有向图)上的随机行走。通过将主要用于无向图的随机行走理论推广到有向图,我们展示了如何根据有向图上的随机行走的命中时间和命中成本来制定各种传输成本。作为代表性的例子,我们将该理论应用于三个特定的路由协议,每个范例下一个。大量的仿真结果表明,所提出的基于有向图的分析模型比现有的方法能够实现更精确的输电成本估算。
{"title":"Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless Routing","authors":"Yanhua Li, Zhi-Li Zhang","doi":"10.1109/INFCOM.2010.5462109","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462109","url":null,"abstract":"In this paper we develop a unified theoretical framework for estimating various transmission costs of packet forwarding in wireless networks. Our framework can be applied to the three routing paradigms, best path routing, opportunistic routing, and stateless routing, to which nearly all existing routing protocols belong. We illustrate how packet forwarding under each paradigm can be modeled as random walks on directed graphs (digraphs). By generalizing the theory of random walks that has primarily been developed for undirected graphs to digraphs, we show how various transmission costs can be formulated in terms of hitting times and hitting costs of random walks on digraphs. As representative examples, we apply the theory to three specific routing protocols, one under each paradigm. Extensive simulations demonstrate that the proposed digraph based analytical model can achieve more accurate transmission cost estimation over existing methods.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Transition from Heavy to Light Tails in Retransmission Durations 重传持续时间从重尾到轻尾的转换
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461910
Jian Tan, N. Shroff
Retransmissions serve as the basic building block that communication protocols use to achieve reliable data transfer. Until recently, the number of retransmissions were thought to follow a light tailed (in particular, a geometric) distribution. However, recent work seems to suggest that when the distribution of the packets have infinite support, retransmission-based protocols may result in heavy tailed delays and even possibly zero throughput. While this result is true even when the distribution of packet sizes are light-tailed, it requires the assumption that the packet sizes have infinite support. However, in reality, packet sizes are often bounded by the Maximum Transmission Unit (MTU), and thus the aforementioned result merits a deeper investigation. To that end, in this paper, we allow the distribution of the packet size L to have finite support. This packet is sent over an on-off channel {(A_i,U_i)} with alternating available A_i and unavailable U_i periods. If L≥A_i, the transmission fails and we wait for the next period A_(i+1) to retransmit the packet. The transmission duration is thus measured from the first attempt to a point when a channel available period larger than L. Under mild conditions, we show that the transmission duration distribution exhibits a transition from a power law main body to an exponential tail with Weibull type distributions between the two. The time scale to observe the power law main body is roughly equal to the average transmission duration of the longest packet. Both the power law main body and the exponential tail could dominate the overall performance. For example, the power law main body, if significant, may cause the channel throughput to be very close to zero. On the other hand, the exponential tail, if more evident, may imply that the system operates in a benign environment. These theoretical findings provide an understanding on why some empirical measurements suggest heavy tails and light tails for others (e.g., wireless networks). We use these results to further highlight the engineering implications from distributions with power law main bodies and light tails by analyzing two cases: (1) The throughput of on-off channels with retransmissions, where we show that even when packet sizes have small means and bounded support the variability in their sizes can greatly impact system performance. (2) The distribution of the number of jobs in an M/M/∞ queue with server failures. Here we show that retransmissions can cause long-range dependence and quantify the impact of the maximum job sizes on the long-range dependence.
重传是通信协议用来实现可靠数据传输的基本构件。直到最近,重传的数量被认为遵循轻尾(特别是几何)分布。然而,最近的研究似乎表明,当数据包的分发具有无限支持时,基于重传的协议可能导致严重的尾部延迟,甚至可能导致零吞吐量。虽然这个结果即使在包大小的分布是轻尾的情况下也是正确的,但它需要假设包大小有无限的支持。然而,在现实中,数据包的大小通常受到最大传输单元(MTU)的限制,因此上述结果值得更深入的研究。为此,在本文中,我们允许包大小L的分布具有有限的支持。该数据包通过一个开关通道{(A_i,U_i)}发送,交替使用可用的A_i和不可用的U_i周期。如果L≥A_i,传输失败,我们等待下一个周期A_(i+1)重新传输数据包。因此,从第一次尝试到信道可用周期大于l的点测量传输持续时间,在温和条件下,我们表明传输持续时间分布表现出从幂律主体到指数尾部的过渡,两者之间具有威布尔型分布。主体观察幂律的时间尺度大致等于最长数据包的平均传输时间。幂律主体和指数尾都能主导整体性能。例如,幂律主体,如果显著,可能导致信道吞吐量非常接近于零。另一方面,如果指数尾部更明显,则可能意味着系统在良性环境中运行。这些理论发现提供了一种理解,为什么一些经验性的测量结果显示了重尾和轻尾(例如,无线网络)。通过分析两种情况,我们利用这些结果进一步强调了具有幂律主体和轻尾分布的工程含义:(1)具有重传的开关通道的吞吐量,我们表明,即使数据包大小具有较小的平均值和有限的支持,其大小的可变性也会极大地影响系统性能。(2) M/M/∞中工作数量的分布;服务器故障队列。这里我们展示了重传会导致远程依赖,并量化了最大作业大小对远程依赖的影响。
{"title":"Transition from Heavy to Light Tails in Retransmission Durations","authors":"Jian Tan, N. Shroff","doi":"10.1109/INFCOM.2010.5461910","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461910","url":null,"abstract":"Retransmissions serve as the basic building block that communication protocols use to achieve reliable data transfer. Until recently, the number of retransmissions were thought to follow a light tailed (in particular, a geometric) distribution. However, recent work seems to suggest that when the distribution of the packets have infinite support, retransmission-based protocols may result in heavy tailed delays and even possibly zero throughput. While this result is true even when the distribution of packet sizes are light-tailed, it requires the assumption that the packet sizes have infinite support. However, in reality, packet sizes are often bounded by the Maximum Transmission Unit (MTU), and thus the aforementioned result merits a deeper investigation. To that end, in this paper, we allow the distribution of the packet size L to have finite support. This packet is sent over an on-off channel {(A_i,U_i)} with alternating available A_i and unavailable U_i periods. If L≥A_i, the transmission fails and we wait for the next period A_(i+1) to retransmit the packet. The transmission duration is thus measured from the first attempt to a point when a channel available period larger than L. Under mild conditions, we show that the transmission duration distribution exhibits a transition from a power law main body to an exponential tail with Weibull type distributions between the two. The time scale to observe the power law main body is roughly equal to the average transmission duration of the longest packet. Both the power law main body and the exponential tail could dominate the overall performance. For example, the power law main body, if significant, may cause the channel throughput to be very close to zero. On the other hand, the exponential tail, if more evident, may imply that the system operates in a benign environment. These theoretical findings provide an understanding on why some empirical measurements suggest heavy tails and light tails for others (e.g., wireless networks). We use these results to further highlight the engineering implications from distributions with power law main bodies and light tails by analyzing two cases: (1) The throughput of on-off channels with retransmissions, where we show that even when packet sizes have small means and bounded support the variability in their sizes can greatly impact system performance. (2) The distribution of the number of jobs in an M/M/∞ queue with server failures. Here we show that retransmissions can cause long-range dependence and quantify the impact of the maximum job sizes on the long-range dependence.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Cramer-Rao Bound Analysis of Localization Using Signal Strength Difference as Location Fingerprint 基于信号强度差作为定位指纹的Cramer-Rao定界分析
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462020
A. Hossain, Wee-Seng Soh
In this paper, we analyze the Cramer-Rao Lower Bound (CRLB) of localization using Signal Strength Difference (SSD) as location fingerprint. This analysis has a dual purpose. Firstly, the properties of the bound on localization error may help to design efficient localization algorithm. For example, utilizing one of the properties, we propose a way to define weights for a weighted K-Nearest Neighbor (K-NN) scheme which is shown to perform better than the K-NN algorithm. Secondly, it provides suggestions for a positioning system design by revealing error trends associated with the system deployment. In both cases, detailed analysis as well as experimental results are presented in order to support our claims.
本文以信号强度差(SSD)作为定位指纹,分析了定位的Cramer-Rao下界(CRLB)。这种分析有双重目的。首先,定位误差边界的性质有助于设计高效的定位算法。例如,利用其中一个属性,我们提出了一种方法来定义加权k -最近邻(K-NN)方案的权重,该方案被证明比K-NN算法执行得更好。其次,通过揭示与系统部署相关的误差趋势,为定位系统设计提供建议。在这两种情况下,详细的分析和实验结果提出,以支持我们的主张。
{"title":"Cramer-Rao Bound Analysis of Localization Using Signal Strength Difference as Location Fingerprint","authors":"A. Hossain, Wee-Seng Soh","doi":"10.1109/INFCOM.2010.5462020","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462020","url":null,"abstract":"In this paper, we analyze the Cramer-Rao Lower Bound (CRLB) of localization using Signal Strength Difference (SSD) as location fingerprint. This analysis has a dual purpose. Firstly, the properties of the bound on localization error may help to design efficient localization algorithm. For example, utilizing one of the properties, we propose a way to define weights for a weighted K-Nearest Neighbor (K-NN) scheme which is shown to perform better than the K-NN algorithm. Secondly, it provides suggestions for a positioning system design by revealing error trends associated with the system deployment. In both cases, detailed analysis as well as experimental results are presented in order to support our claims.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127583706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Approximate Models for General Cache Networks 通用缓存网络的近似模型
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461936
Elisha J. Rosensweig, J. Kurose, D. Towsley
Many systems employ caches to improve performance. While isolated caches have been studied in-depth, multi-cache systems are not well understood, especially in networks with arbitrary topologies. In order to gain insight into and manage these systems, a low-complexity algorithm for approximating their behavior is required. We propose a new algorithm, termed a-Net, that approximates the behavior of multi-cache networks by leveraging existing approximation algorithms for isolated LRU caches. We demonstrate the utility of a-Net using both per- cache and network-wide performance measures. We also perform factor analysis of the approximation error to identify system parameters that determine the precision of a-Net.
许多系统使用缓存来提高性能。虽然孤立缓存已经被深入研究,但多缓存系统还没有得到很好的理解,特别是在具有任意拓扑结构的网络中。为了深入了解和管理这些系统,需要一种低复杂度的算法来近似它们的行为。我们提出了一种新的算法,称为a- net,它通过利用现有的孤立LRU缓存的近似算法来近似多缓存网络的行为。我们使用每个缓存和网络范围的性能度量来演示a-Net的效用。我们还对近似误差进行了因子分析,以确定决定a-Net精度的系统参数。
{"title":"Approximate Models for General Cache Networks","authors":"Elisha J. Rosensweig, J. Kurose, D. Towsley","doi":"10.1109/INFCOM.2010.5461936","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461936","url":null,"abstract":"Many systems employ caches to improve performance. While isolated caches have been studied in-depth, multi-cache systems are not well understood, especially in networks with arbitrary topologies. In order to gain insight into and manage these systems, a low-complexity algorithm for approximating their behavior is required. We propose a new algorithm, termed a-Net, that approximates the behavior of multi-cache networks by leveraging existing approximation algorithms for isolated LRU caches. We demonstrate the utility of a-Net using both per- cache and network-wide performance measures. We also perform factor analysis of the approximation error to identify system parameters that determine the precision of a-Net.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128776606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 221
A Bit-Stuffing Algorithm for Crosstalk Avoidance in High Speed Switching 高速交换串扰避免的位填充算法
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462140
Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, D. Lee
Motivated by the design of high speed switching fabrics, in this paper we propose a emph{bit-stuffing} algorithm for generating forbidden transition codes to mitigate the crosstalk effect between adjacent wires in long on-chip buses. We first model a bus with forbidden transition constraints as a forbidden transition channel, and derive the Shannon capacity of such a channel. Then we perform a worst case analysis and a probabilistic analysis for the bit-stuffing algorithm. We show by both theoretic analysis and simulations that the coding rate of the bit stuffing encoding scheme for independent and identically distributed (i.i.d.) Bernoulli input traffic is quite close to the Shannon capacity, and hence is much better than those of the existing forbidden transition codes in the literature, including the Fibonacci representation.
在高速交换结构设计的激励下,我们提出了一种emph{比特填充}算法来生成禁止转换码,以减轻长片上总线中相邻导线之间的串扰效应。首先,我们将一个具有禁止转换约束的总线建模为禁止转换通道,并推导出该通道的香农容量。然后对填充算法进行了最坏情况分析和概率分析。通过理论分析和仿真,证明了独立同分布(i.i.d)情况下比特填充编码方案的编码率。伯努利输入流量非常接近香农容量,因此比文献中现有的禁止转换码(包括斐波那契表示)要好得多。
{"title":"A Bit-Stuffing Algorithm for Crosstalk Avoidance in High Speed Switching","authors":"Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, D. Lee","doi":"10.1109/INFCOM.2010.5462140","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462140","url":null,"abstract":"Motivated by the design of high speed switching fabrics, in this paper we propose a emph{bit-stuffing} algorithm for generating forbidden transition codes to mitigate the crosstalk effect between adjacent wires in long on-chip buses. We first model a bus with forbidden transition constraints as a forbidden transition channel, and derive the Shannon capacity of such a channel. Then we perform a worst case analysis and a probabilistic analysis for the bit-stuffing algorithm. We show by both theoretic analysis and simulations that the coding rate of the bit stuffing encoding scheme for independent and identically distributed (i.i.d.) Bernoulli input traffic is quite close to the Shannon capacity, and hence is much better than those of the existing forbidden transition codes in the literature, including the Fibonacci representation.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Retiring Replicants: Congestion Control for Intermittently-Connected Networks 退役复制人:间歇连接网络的拥塞控制
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461934
N. Thompson, S. Nelson, Mehedi Bakht, T. Abdelzaher, R. Kravets
The widespread availability of mobile wireless devices offers growing opportunities for the formation of temporary networks with only intermittent connectivity. These intermittently-connected networks (ICNs) typically lack stable end-to-end paths. In order to improve the delivery rates of the networks, new store-carry-and-forward protocols have been proposed which often use message replication as a forwarding mechanism. Message replication is effective at improving delivery, but given the limited resources of ICN nodes, such as buffer space, bandwidth and energy, as well as the highly dynamic nature of these networks, replication can easily overwhelm node resources. In this work we propose a novel node-based replication management algorithm which addresses buffer congestion by dynamically limiting the replication a node performs during each encounter. The insight for our algorithm comes from a stochastic model of message delivery in ICNs with constrained buffer space. We show through simulation that our algorithm is effective, nearly tripling delivery rates in some scenarios, and imposes little overhead.
移动无线设备的广泛使用为形成只有间歇性连接的临时网络提供了越来越多的机会。这些间歇性连接的网络(icn)通常缺乏稳定的端到端路径。为了提高网络的传输速率,人们提出了新的存储-携带-转发协议,这些协议通常使用消息复制作为转发机制。消息复制在改进传递方面是有效的,但是考虑到ICN节点的有限资源(如缓冲空间、带宽和能量)以及这些网络的高度动态特性,复制很容易使节点资源不堪重负。在这项工作中,我们提出了一种新的基于节点的复制管理算法,该算法通过动态限制节点在每次遇到时执行的复制来解决缓冲区拥塞问题。我们的算法的洞察力来自具有约束缓冲空间的icn中的消息传递的随机模型。我们通过模拟表明,我们的算法是有效的,在某些情况下,几乎是三倍的交付率,并施加很少的开销。
{"title":"Retiring Replicants: Congestion Control for Intermittently-Connected Networks","authors":"N. Thompson, S. Nelson, Mehedi Bakht, T. Abdelzaher, R. Kravets","doi":"10.1109/INFCOM.2010.5461934","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461934","url":null,"abstract":"The widespread availability of mobile wireless devices offers growing opportunities for the formation of temporary networks with only intermittent connectivity. These intermittently-connected networks (ICNs) typically lack stable end-to-end paths. In order to improve the delivery rates of the networks, new store-carry-and-forward protocols have been proposed which often use message replication as a forwarding mechanism. Message replication is effective at improving delivery, but given the limited resources of ICN nodes, such as buffer space, bandwidth and energy, as well as the highly dynamic nature of these networks, replication can easily overwhelm node resources. In this work we propose a novel node-based replication management algorithm which addresses buffer congestion by dynamically limiting the replication a node performs during each encounter. The insight for our algorithm comes from a stochastic model of message delivery in ICNs with constrained buffer space. We show through simulation that our algorithm is effective, nearly tripling delivery rates in some scenarios, and imposes little overhead.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Counting RFID Tags Efficiently and Anonymously 高效、匿名的RFID标签计数
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461944
Hao Han, Bo Sheng, C. C. Tan, Qun A. Li, W. Mao, Sanglu Lu
Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem in RFID systems is how to quickly estimate the number of distinct tags without reading each tag individually. This problem plays a crucial role in many real-time monitoring and privacy-preserving applications. In this paper, we present an efficient and anonymous scheme for tag population estimation. This scheme leverages the position of the first reply from a group of tags in a frame. Results from mathematical analysis and extensive simulation demonstrate that our scheme outperforms other protocols proposed in the previous work.
射频识别(RFID)技术因其在库存控制和目标跟踪等方面的广泛应用而受到广泛关注。RFID系统中的一个重要问题是如何在不单独读取每个标签的情况下快速估计不同标签的数量。这个问题在许多实时监控和隐私保护应用中起着至关重要的作用。在本文中,我们提出了一种高效且匿名的标签总体估计方案。该方案利用帧中一组标签的第一个应答的位置。数学分析和广泛的仿真结果表明,我们的方案优于以往工作中提出的其他协议。
{"title":"Counting RFID Tags Efficiently and Anonymously","authors":"Hao Han, Bo Sheng, C. C. Tan, Qun A. Li, W. Mao, Sanglu Lu","doi":"10.1109/INFCOM.2010.5461944","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461944","url":null,"abstract":"Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem in RFID systems is how to quickly estimate the number of distinct tags without reading each tag individually. This problem plays a crucial role in many real-time monitoring and privacy-preserving applications. In this paper, we present an efficient and anonymous scheme for tag population estimation. This scheme leverages the position of the first reply from a group of tags in a frame. Results from mathematical analysis and extensive simulation demonstrate that our scheme outperforms other protocols proposed in the previous work.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 164
期刊
2010 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1