首页 > 最新文献

2010 Proceedings IEEE INFOCOM最新文献

英文 中文
High-Speed Per-Flow Traffic Measurement with Probabilistic Multiplicity Counting 基于概率多重计数的高速逐流流量测量
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461921
Peter Lieven, B. Scheuermann
On today's high-speed backbone network links, measuring per-flow traffic information has become very challenging. Maintaining exact per-flow packet counters on OC-192 or OC-768 links is not practically feasible due to computational and cost constrains. Packet sampling as implemented in today's routers results in large approximation errors. Here, we present Probabilistic Multiplicity Counting (PMC), a novel data structure that is capable of accounting traffic per flow probabilistically. The PMC algorithm is very simple and highly parallelizable, and therefore allows for efficient implementations in software and hardware. At the same time, it provides very accurate traffic statistics. We evaluate PMC with both artificial and real-world traffic data, demonstrating that it outperforms other approaches.
在今天的高速骨干网链路上,测量低流量信息变得非常具有挑战性。由于计算和成本的限制,在OC-192或OC-768链路上保持精确的per- low数据包计数器实际上是不可行的。在今天的路由器中实现的包采样会导致很大的近似误差。在这里,我们提出了概率多重计数(PMC),这是一种新的数据结构,能够以低概率的方式计算交通流量。PMC算法非常简单且具有高度并行性,因此允许在软件和硬件上实现客户端。同时,它提供了非常准确的交通统计数据。我们用人工和真实世界的交通数据来评估PMC,证明它优于其他方法。
{"title":"High-Speed Per-Flow Traffic Measurement with Probabilistic Multiplicity Counting","authors":"Peter Lieven, B. Scheuermann","doi":"10.1109/INFCOM.2010.5461921","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461921","url":null,"abstract":"On today's high-speed backbone network links, measuring per-flow traffic information has become very challenging. Maintaining exact per-flow packet counters on OC-192 or OC-768 links is not practically feasible due to computational and cost constrains. Packet sampling as implemented in today's routers results in large approximation errors. Here, we present Probabilistic Multiplicity Counting (PMC), a novel data structure that is capable of accounting traffic per flow probabilistically. The PMC algorithm is very simple and highly parallelizable, and therefore allows for efficient implementations in software and hardware. At the same time, it provides very accurate traffic statistics. We evaluate PMC with both artificial and real-world traffic data, demonstrating that it outperforms other approaches.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128189421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Approximate Models for General Cache Networks 通用缓存网络的近似模型
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461936
Elisha J. Rosensweig, J. Kurose, D. Towsley
Many systems employ caches to improve performance. While isolated caches have been studied in-depth, multi-cache systems are not well understood, especially in networks with arbitrary topologies. In order to gain insight into and manage these systems, a low-complexity algorithm for approximating their behavior is required. We propose a new algorithm, termed a-Net, that approximates the behavior of multi-cache networks by leveraging existing approximation algorithms for isolated LRU caches. We demonstrate the utility of a-Net using both per- cache and network-wide performance measures. We also perform factor analysis of the approximation error to identify system parameters that determine the precision of a-Net.
许多系统使用缓存来提高性能。虽然孤立缓存已经被深入研究,但多缓存系统还没有得到很好的理解,特别是在具有任意拓扑结构的网络中。为了深入了解和管理这些系统,需要一种低复杂度的算法来近似它们的行为。我们提出了一种新的算法,称为a- net,它通过利用现有的孤立LRU缓存的近似算法来近似多缓存网络的行为。我们使用每个缓存和网络范围的性能度量来演示a-Net的效用。我们还对近似误差进行了因子分析,以确定决定a-Net精度的系统参数。
{"title":"Approximate Models for General Cache Networks","authors":"Elisha J. Rosensweig, J. Kurose, D. Towsley","doi":"10.1109/INFCOM.2010.5461936","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461936","url":null,"abstract":"Many systems employ caches to improve performance. While isolated caches have been studied in-depth, multi-cache systems are not well understood, especially in networks with arbitrary topologies. In order to gain insight into and manage these systems, a low-complexity algorithm for approximating their behavior is required. We propose a new algorithm, termed a-Net, that approximates the behavior of multi-cache networks by leveraging existing approximation algorithms for isolated LRU caches. We demonstrate the utility of a-Net using both per- cache and network-wide performance measures. We also perform factor analysis of the approximation error to identify system parameters that determine the precision of a-Net.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128776606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 221
An Optimization Based Distributed Algorithm for Mobile Data Gathering in Wireless Sensor Networks 一种基于优化的无线传感器网络移动数据采集分布式算法
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462184
Miao Zhao, Yuanyuan Yang
Recent advances have shown a great potential of anchor based mobile data gathering in wireless sensor networks. In such a scheme, during each periodic data gathering tour, the mobile collector stays at each anchor point for a period of sojourn time and collects data from nearby sensors via multi-hop communications. We provide an optimization based distributed algorithm for such data gathering in this paper. We adopt network utility, which is a properly defined function, to characterize the data gathering performance, and formalize the problem as a network utility maximization problem under the constraint of guaranteed network lifetime. To efficiently solve the problem, we decompose it into two sets of subproblems and solve them in a distributed manner, which facilitates the scalable implementations. Finally, we provide numerical results to demonstrate the convergence of the proposed distributed algorithm.
最近的进展表明,基于锚点的移动数据采集在无线传感器网络中具有巨大的潜力。在该方案中,移动采集器在每次周期性的数据采集过程中,在每个锚点停留一段时间,通过多跳通信从附近的传感器采集数据。本文提出了一种基于优化的分布式数据采集算法。我们采用适当定义的网络效用函数来表征数据采集性能,并将问题形式化为保证网络寿命约束下的网络效用最大化问题。为了有效地解决该问题,我们将其分解为两组子问题,并以分布式的方式进行求解,从而便于可扩展的实现。最后,给出了数值结果来证明所提出的分布式算法的收敛性。
{"title":"An Optimization Based Distributed Algorithm for Mobile Data Gathering in Wireless Sensor Networks","authors":"Miao Zhao, Yuanyuan Yang","doi":"10.1109/INFCOM.2010.5462184","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462184","url":null,"abstract":"Recent advances have shown a great potential of anchor based mobile data gathering in wireless sensor networks. In such a scheme, during each periodic data gathering tour, the mobile collector stays at each anchor point for a period of sojourn time and collects data from nearby sensors via multi-hop communications. We provide an optimization based distributed algorithm for such data gathering in this paper. We adopt network utility, which is a properly defined function, to characterize the data gathering performance, and formalize the problem as a network utility maximization problem under the constraint of guaranteed network lifetime. To efficiently solve the problem, we decompose it into two sets of subproblems and solve them in a distributed manner, which facilitates the scalable implementations. Finally, we provide numerical results to demonstrate the convergence of the proposed distributed algorithm.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130743805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Counting RFID Tags Efficiently and Anonymously 高效、匿名的RFID标签计数
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461944
Hao Han, Bo Sheng, C. C. Tan, Qun A. Li, W. Mao, Sanglu Lu
Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem in RFID systems is how to quickly estimate the number of distinct tags without reading each tag individually. This problem plays a crucial role in many real-time monitoring and privacy-preserving applications. In this paper, we present an efficient and anonymous scheme for tag population estimation. This scheme leverages the position of the first reply from a group of tags in a frame. Results from mathematical analysis and extensive simulation demonstrate that our scheme outperforms other protocols proposed in the previous work.
射频识别(RFID)技术因其在库存控制和目标跟踪等方面的广泛应用而受到广泛关注。RFID系统中的一个重要问题是如何在不单独读取每个标签的情况下快速估计不同标签的数量。这个问题在许多实时监控和隐私保护应用中起着至关重要的作用。在本文中,我们提出了一种高效且匿名的标签总体估计方案。该方案利用帧中一组标签的第一个应答的位置。数学分析和广泛的仿真结果表明,我们的方案优于以往工作中提出的其他协议。
{"title":"Counting RFID Tags Efficiently and Anonymously","authors":"Hao Han, Bo Sheng, C. C. Tan, Qun A. Li, W. Mao, Sanglu Lu","doi":"10.1109/INFCOM.2010.5461944","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461944","url":null,"abstract":"Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem in RFID systems is how to quickly estimate the number of distinct tags without reading each tag individually. This problem plays a crucial role in many real-time monitoring and privacy-preserving applications. In this paper, we present an efficient and anonymous scheme for tag population estimation. This scheme leverages the position of the first reply from a group of tags in a frame. Results from mathematical analysis and extensive simulation demonstrate that our scheme outperforms other protocols proposed in the previous work.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 164
Resource Allocation in Multi-cell OFDMA-based Relay Networks 基于ofdma的多小区中继网络中的资源分配
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462037
Yao Hua, Qian Zhang, Z. Niu
Cooperative relay networks combined with Orthogonal Frequency Division Multiplexing Access (OFDMA) technology has been widely recognized as a promising candidate for future cellular infrastructure due to the performance enhancement by flexible resource allocation schemes. The majority of the existing schemes aim to optimize single cell performance gain. However, the higher frequency reuse factor and smaller cell size requirement lead to severe inter-cell interference problem. Therefore, the multi-cell resource allocation of subcarrier, time scheduling and power should be jointly considered to alleviate the severe inter-cell interference problem. In this paper, the joint resource allocation problem is formulated. Considering the high complexity of the optimal solution, a two-stage resource allocation scheme is proposed. In the first stage, all of the users in each cell are selected sequentially and the joint subcarrier allocation and scheduling is conducted for the selected users without considering the interference. In the second stage, the optimal power control is performed by geometric programming method. Simulation results show that the proposed the interference-aware resource allocation scheme improves the system capacity compared with existing schemes. Especially, the edge users achieve more benefit.
结合正交频分复用接入(OFDMA)技术的协同中继网络由于其灵活的资源分配方案提高了性能,已被广泛认为是未来蜂窝基础设施的一个有前途的候选网络。现有的大多数方案旨在优化单个单元的性能增益。然而,较高的频率复用系数和较小的小区尺寸要求导致了严重的小区间干扰问题。因此,应综合考虑子载波的多小区资源分配、时间调度和功率等问题,以缓解严重的小区间干扰问题。本文提出了联合资源分配问题。考虑到最优解的复杂性,提出了一种两阶段资源分配方案。第一阶段,在不考虑干扰的情况下,依次选择每个小区中的所有用户,对所选用户进行联合子载波分配和调度;第二阶段采用几何规划方法进行最优功率控制。仿真结果表明,与现有方案相比,提出的干扰感知资源分配方案提高了系统容量。特别是边缘用户获得了更多的利益。
{"title":"Resource Allocation in Multi-cell OFDMA-based Relay Networks","authors":"Yao Hua, Qian Zhang, Z. Niu","doi":"10.1109/INFCOM.2010.5462037","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462037","url":null,"abstract":"Cooperative relay networks combined with Orthogonal Frequency Division Multiplexing Access (OFDMA) technology has been widely recognized as a promising candidate for future cellular infrastructure due to the performance enhancement by flexible resource allocation schemes. The majority of the existing schemes aim to optimize single cell performance gain. However, the higher frequency reuse factor and smaller cell size requirement lead to severe inter-cell interference problem. Therefore, the multi-cell resource allocation of subcarrier, time scheduling and power should be jointly considered to alleviate the severe inter-cell interference problem. In this paper, the joint resource allocation problem is formulated. Considering the high complexity of the optimal solution, a two-stage resource allocation scheme is proposed. In the first stage, all of the users in each cell are selected sequentially and the joint subcarrier allocation and scheduling is conducted for the selected users without considering the interference. In the second stage, the optimal power control is performed by geometric programming method. Simulation results show that the proposed the interference-aware resource allocation scheme improves the system capacity compared with existing schemes. Especially, the edge users achieve more benefit.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129306433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Topological Properties Affect the Power of Network Coding in Decentralized Broadcast 拓扑特性对分散广播网络编码能力的影响
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462081
Di Niu, Baochun Li
There exists a certain level of ambiguity regarding whether network coding can further improve download performance in P2P content distribution systems, as compared to commonly applied heuristics such as rarest first protocols. In this paper, we revisit the problem of broadcasting multiple data blocks from a single source in an overlay network using gossip-like protocols. Our new finding reveals that the marginal benefit of network coding critically depends on the dynamics of network topologies. We show that although network coding is optimal as a block selection mechanism, simple non-coding protocols are close to optimal in complete and random graphs, leading to marginal benefits of network coding. However, network coding demonstrates salient benefits in clustered and time-varying topologies, which are common in real-world systems with ISP-locality mechanisms implemented. Through both theoretical analysis and simulation results, we unveil the underlying reasons behind discrepancies in the power of network coding under different scenarios.
与常用的启发式方法(如稀有第一协议)相比,关于网络编码是否能进一步提高P2P内容分发系统中的下载性能,存在一定程度的模糊性。在本文中,我们重新审视了使用八卦类协议在覆盖网络中广播来自单个源的多个数据块的问题。我们的新发现表明,网络编码的边际效益严重依赖于网络拓扑的动态。研究表明,虽然网络编码作为一种块选择机制是最优的,但简单的非编码协议在完全图和随机图上接近最优,导致网络编码的边际效益。然而,网络编码在集群和时变拓扑中显示出显著的优势,这在实现了isp局部性机制的现实系统中很常见。通过理论分析和仿真结果,揭示了不同场景下网络编码能力差异的深层原因。
{"title":"Topological Properties Affect the Power of Network Coding in Decentralized Broadcast","authors":"Di Niu, Baochun Li","doi":"10.1109/INFCOM.2010.5462081","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462081","url":null,"abstract":"There exists a certain level of ambiguity regarding whether network coding can further improve download performance in P2P content distribution systems, as compared to commonly applied heuristics such as rarest first protocols. In this paper, we revisit the problem of broadcasting multiple data blocks from a single source in an overlay network using gossip-like protocols. Our new finding reveals that the marginal benefit of network coding critically depends on the dynamics of network topologies. We show that although network coding is optimal as a block selection mechanism, simple non-coding protocols are close to optimal in complete and random graphs, leading to marginal benefits of network coding. However, network coding demonstrates salient benefits in clustered and time-varying topologies, which are common in real-world systems with ISP-locality mechanisms implemented. Through both theoretical analysis and simulation results, we unveil the underlying reasons behind discrepancies in the power of network coding under different scenarios.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128180785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks 基于CSMA/ ca的无线网络中退避不良节点的阶增益研究
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462002
Zhuo Lu, Wenye Wang, Cliff X. Wang
Backoff misbehavior, in which a wireless node deliberately manipulates its backoff time, can induce significant network problems, such as severe unfairness and denial-of-service. Although great progress has been made towards the design of countermeasures to backoff misbehavior, little attention has been focused on quantifying the gain of backoff misbehaviors. In this paper, we define and study two general classes of backoff misbehavior to assess the gain that misbehaving nodes can obtain. The first class, called continuous misbehavior, keeps manipulating the backoff time unless it is disabled by countermeasures. The second class is referred to as intermittent misbehavior, which tends to evade the detection by countermeasures by performing misbehavior sporadically. Our approach is to introduce a new performance metric, namely order gain, which is to characterize the performance benefits of misbehaving nodes in comparison to legitimate nodes. Through analytical studies, simulations, and experiments, we demonstrate the impact of a wide range of backoff misbehaviors on network performance with respect to the number of users in CSMA/CA-based wireless networks.
退避不当行为是指无线节点故意操纵退避时间,这种行为会引发严重的网络问题,比如严重的不公平和拒绝服务。虽然在设计退避不当行为的对策方面已经取得了很大的进展,但对退避不当行为收益的量化研究却很少。在本文中,我们定义并研究了两类一般的回退不当行为,以评估不当行为节点可以获得的增益。第一类被称为连续不当行为,它会持续操纵退避时间,除非被对策禁用。第二类被称为间歇性不当行为,它倾向于通过偶尔执行不当行为来逃避对策的检测。我们的方法是引入一个新的性能指标,即顺序增益,它用来描述与正常节点相比,行为不端的节点的性能优势。通过分析研究、模拟和实验,我们证明了在基于CSMA/ ca的无线网络中,相对于用户数量,广泛的回退不当行为对网络性能的影响。
{"title":"On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks","authors":"Zhuo Lu, Wenye Wang, Cliff X. Wang","doi":"10.1109/INFCOM.2010.5462002","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462002","url":null,"abstract":"Backoff misbehavior, in which a wireless node deliberately manipulates its backoff time, can induce significant network problems, such as severe unfairness and denial-of-service. Although great progress has been made towards the design of countermeasures to backoff misbehavior, little attention has been focused on quantifying the gain of backoff misbehaviors. In this paper, we define and study two general classes of backoff misbehavior to assess the gain that misbehaving nodes can obtain. The first class, called continuous misbehavior, keeps manipulating the backoff time unless it is disabled by countermeasures. The second class is referred to as intermittent misbehavior, which tends to evade the detection by countermeasures by performing misbehavior sporadically. Our approach is to introduce a new performance metric, namely order gain, which is to characterize the performance benefits of misbehaving nodes in comparison to legitimate nodes. Through analytical studies, simulations, and experiments, we demonstrate the impact of a wide range of backoff misbehaviors on network performance with respect to the number of users in CSMA/CA-based wireless networks.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless Routing 有向图上的随机漫步:估计无线路由传输成本的理论框架
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462109
Yanhua Li, Zhi-Li Zhang
In this paper we develop a unified theoretical framework for estimating various transmission costs of packet forwarding in wireless networks. Our framework can be applied to the three routing paradigms, best path routing, opportunistic routing, and stateless routing, to which nearly all existing routing protocols belong. We illustrate how packet forwarding under each paradigm can be modeled as random walks on directed graphs (digraphs). By generalizing the theory of random walks that has primarily been developed for undirected graphs to digraphs, we show how various transmission costs can be formulated in terms of hitting times and hitting costs of random walks on digraphs. As representative examples, we apply the theory to three specific routing protocols, one under each paradigm. Extensive simulations demonstrate that the proposed digraph based analytical model can achieve more accurate transmission cost estimation over existing methods.
本文提出了一个统一的理论框架,用于估计无线网络中各种数据包转发的传输成本。我们的框架可以应用于三种路由范例:最佳路径路由、机会路由和无状态路由,几乎所有现有的路由协议都属于这三种路由范例。我们说明了每个范例下的数据包转发如何被建模为有向图(有向图)上的随机行走。通过将主要用于无向图的随机行走理论推广到有向图,我们展示了如何根据有向图上的随机行走的命中时间和命中成本来制定各种传输成本。作为代表性的例子,我们将该理论应用于三个特定的路由协议,每个范例下一个。大量的仿真结果表明,所提出的基于有向图的分析模型比现有的方法能够实现更精确的输电成本估算。
{"title":"Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless Routing","authors":"Yanhua Li, Zhi-Li Zhang","doi":"10.1109/INFCOM.2010.5462109","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462109","url":null,"abstract":"In this paper we develop a unified theoretical framework for estimating various transmission costs of packet forwarding in wireless networks. Our framework can be applied to the three routing paradigms, best path routing, opportunistic routing, and stateless routing, to which nearly all existing routing protocols belong. We illustrate how packet forwarding under each paradigm can be modeled as random walks on directed graphs (digraphs). By generalizing the theory of random walks that has primarily been developed for undirected graphs to digraphs, we show how various transmission costs can be formulated in terms of hitting times and hitting costs of random walks on digraphs. As representative examples, we apply the theory to three specific routing protocols, one under each paradigm. Extensive simulations demonstrate that the proposed digraph based analytical model can achieve more accurate transmission cost estimation over existing methods.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A Bit-Stuffing Algorithm for Crosstalk Avoidance in High Speed Switching 高速交换串扰避免的位填充算法
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462140
Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, D. Lee
Motivated by the design of high speed switching fabrics, in this paper we propose a emph{bit-stuffing} algorithm for generating forbidden transition codes to mitigate the crosstalk effect between adjacent wires in long on-chip buses. We first model a bus with forbidden transition constraints as a forbidden transition channel, and derive the Shannon capacity of such a channel. Then we perform a worst case analysis and a probabilistic analysis for the bit-stuffing algorithm. We show by both theoretic analysis and simulations that the coding rate of the bit stuffing encoding scheme for independent and identically distributed (i.i.d.) Bernoulli input traffic is quite close to the Shannon capacity, and hence is much better than those of the existing forbidden transition codes in the literature, including the Fibonacci representation.
在高速交换结构设计的激励下,我们提出了一种emph{比特填充}算法来生成禁止转换码,以减轻长片上总线中相邻导线之间的串扰效应。首先,我们将一个具有禁止转换约束的总线建模为禁止转换通道,并推导出该通道的香农容量。然后对填充算法进行了最坏情况分析和概率分析。通过理论分析和仿真,证明了独立同分布(i.i.d)情况下比特填充编码方案的编码率。伯努利输入流量非常接近香农容量,因此比文献中现有的禁止转换码(包括斐波那契表示)要好得多。
{"title":"A Bit-Stuffing Algorithm for Crosstalk Avoidance in High Speed Switching","authors":"Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, D. Lee","doi":"10.1109/INFCOM.2010.5462140","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462140","url":null,"abstract":"Motivated by the design of high speed switching fabrics, in this paper we propose a emph{bit-stuffing} algorithm for generating forbidden transition codes to mitigate the crosstalk effect between adjacent wires in long on-chip buses. We first model a bus with forbidden transition constraints as a forbidden transition channel, and derive the Shannon capacity of such a channel. Then we perform a worst case analysis and a probabilistic analysis for the bit-stuffing algorithm. We show by both theoretic analysis and simulations that the coding rate of the bit stuffing encoding scheme for independent and identically distributed (i.i.d.) Bernoulli input traffic is quite close to the Shannon capacity, and hence is much better than those of the existing forbidden transition codes in the literature, including the Fibonacci representation.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Truthful Least-Priced-Path Routing in Opportunistic Spectrum Access Networks 机会频谱接入网中的真实最小价格路径路由
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461945
Tao Shu, M. Krunz
We study the problem of finding the least-priced path (LPP) between a source and a destination in opportunistic spectrum access (OSA) networks. This problem is motivated by economic considerations, whereby spectrum opportunities are sold/leased to secondary radios (SRs). This incurs a communication cost, e.g., for traffic relaying. As the beneficiary of these services, the end user must compensate the service-providing SRs for their spectrum cost. To give an incentive (i.e., profit) for SRs to report their true cost, typically the payment to a SR should be higher than the actual cost. However, from an end user's perspective, unnecessary overpayment should be avoided. So we are interested in the optimal route selection and payment determination mechanism that minimizes the price tag of the selected route and at the same time guarantees truthful cost reports from SRs. This setup is in contrast to the conventional truthful least-cost path (LCP) problem, where the interest is to find the minimum-cost route. The LPP problem is investigated with and without capacity constraints at individual SRs. For both cases, our algorithmic solutions can be executed in polynomial time. The effectiveness of our algorithms in terms of price saving is verified through extensive simulations.
研究了机会频谱接入(OSA)网络中源端和目标端之间的最低价格路径(LPP)问题。这个问题是由经济考虑引起的,因此频谱机会被出售/租赁给二级无线电(SRs)。这就产生了通信成本,例如流量中继。作为这些业务的受益者,终端用户必须补偿提供业务的sr的频谱成本。为了激励SR报告其真实成本(即利润),通常支付给SR的费用应该高于实际成本。然而,从最终用户的角度来看,应该避免不必要的多付。因此,我们对最优路线选择和支付决定机制感兴趣,该机制可以使所选路线的价格标签最小化,同时保证sr的真实成本报告。这种设置与传统的真实最小代价路径(LCP)问题相反,LCP问题的目的是找到最小代价路径。研究了在单个srr上有和没有容量约束的LPP问题。对于这两种情况,我们的算法解决方案可以在多项式时间内执行。通过大量的仿真验证了我们的算法在节省价格方面的有效性。
{"title":"Truthful Least-Priced-Path Routing in Opportunistic Spectrum Access Networks","authors":"Tao Shu, M. Krunz","doi":"10.1109/INFCOM.2010.5461945","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461945","url":null,"abstract":"We study the problem of finding the least-priced path (LPP) between a source and a destination in opportunistic spectrum access (OSA) networks. This problem is motivated by economic considerations, whereby spectrum opportunities are sold/leased to secondary radios (SRs). This incurs a communication cost, e.g., for traffic relaying. As the beneficiary of these services, the end user must compensate the service-providing SRs for their spectrum cost. To give an incentive (i.e., profit) for SRs to report their true cost, typically the payment to a SR should be higher than the actual cost. However, from an end user's perspective, unnecessary overpayment should be avoided. So we are interested in the optimal route selection and payment determination mechanism that minimizes the price tag of the selected route and at the same time guarantees truthful cost reports from SRs. This setup is in contrast to the conventional truthful least-cost path (LCP) problem, where the interest is to find the minimum-cost route. The LPP problem is investigated with and without capacity constraints at individual SRs. For both cases, our algorithmic solutions can be executed in polynomial time. The effectiveness of our algorithms in terms of price saving is verified through extensive simulations.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":" 36","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2010 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1