首页 > 最新文献

2013 Conference on Future Internet Communications (CFIC)最新文献

英文 中文
Analytic evaluation of power saving in cooperative communication 协作通信中节能的分析评价
Pub Date : 2013-05-15 DOI: 10.1109/CFIC.2013.6566321
D. Fiems, S. Andreev, Thomas Demoor, H. Bruneel, Y. Koucheryavy, K. De Turck
This paper addresses the effects of power saving mechanisms on cooperation in wireless networks. Cooperation by relaying data of other wireless nodes is crucial in (next-generation) wireless networks as it can greatly attribute to ensuring connectivity, reliability, performance, etc. As power saving relies on sleep mode, turning off the communication subsystem for predetermined amounts of time, it can greatly affect data relaying as a cooperator node may not be awake when there is data to relay. Rather than modelling one of the wireless protocols in detail, we construct a high-level queuing model capturing the two essential characteristics of cooperation and energy efficiency: relaying and sleep mode. The used analytical approach allows for accurate performance evaluation and enables us to investigate the trade-off between data relaying and energy efficiency.
本文研究了无线网络中节能机制对协作的影响。通过中继其他无线节点的数据进行合作在(下一代)无线网络中至关重要,因为它可以在很大程度上归功于确保连接性、可靠性和性能等。由于省电依赖于休眠模式,在预定的时间内关闭通信子系统,这可能会极大地影响数据中继,因为当有数据要中继时,合作节点可能不会唤醒。我们不是对某一无线协议进行详细建模,而是构建了一个高级排队模型,该模型捕捉了合作和能源效率的两个基本特征:中继和睡眠模式。所使用的分析方法允许进行准确的性能评估,并使我们能够调查数据中继和能源效率之间的权衡。
{"title":"Analytic evaluation of power saving in cooperative communication","authors":"D. Fiems, S. Andreev, Thomas Demoor, H. Bruneel, Y. Koucheryavy, K. De Turck","doi":"10.1109/CFIC.2013.6566321","DOIUrl":"https://doi.org/10.1109/CFIC.2013.6566321","url":null,"abstract":"This paper addresses the effects of power saving mechanisms on cooperation in wireless networks. Cooperation by relaying data of other wireless nodes is crucial in (next-generation) wireless networks as it can greatly attribute to ensuring connectivity, reliability, performance, etc. As power saving relies on sleep mode, turning off the communication subsystem for predetermined amounts of time, it can greatly affect data relaying as a cooperator node may not be awake when there is data to relay. Rather than modelling one of the wireless protocols in detail, we construct a high-level queuing model capturing the two essential characteristics of cooperation and energy efficiency: relaying and sleep mode. The used analytical approach allows for accurate performance evaluation and enables us to investigate the trade-off between data relaying and energy efficiency.","PeriodicalId":271890,"journal":{"name":"2013 Conference on Future Internet Communications (CFIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129245568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Nodes' misbehavior in Vehicular Delay-Tolerant Networks 车辆时延容忍网络中节点的错误行为
Pub Date : 2013-05-15 DOI: 10.1109/CFIC.2013.6566325
Naércio Magaia, P. Pereira, M. Correia
Vehicular Delay-Tolerant Networks (VDTNs) are composed of mobile nodes that communicate wirelessly with each other to forward data despite connectivity issues. This paper focuses on the problem of some nodes trying to impair the communication of a VDTN. In the paper we study the case of nodes that delay the forwarding of messages that is a particularly difficult to detect form of misbehavior. We study the impact of this form of misbehavior on eight VDTN routing protocols using a large set of simulations and two scenarios. The results show that depending on the type of misbehavior, message replication and intelligent selection of the next hop can help routing protocols to be resilient to node misbehavior.
车辆容忍延迟网络(VDTNs)由移动节点组成,这些移动节点相互无线通信以转发数据,尽管存在连接问题。本文主要研究了一些节点试图破坏VDTN通信的问题。在本文中,我们研究了节点延迟消息转发的情况,这是一种特别难以检测的不当行为形式。我们使用大量模拟和两种场景研究了这种形式的错误行为对八种VDTN路由协议的影响。结果表明,根据错误行为的类型,信息复制和下一跳的智能选择可以帮助路由协议对节点错误行为具有弹性。
{"title":"Nodes' misbehavior in Vehicular Delay-Tolerant Networks","authors":"Naércio Magaia, P. Pereira, M. Correia","doi":"10.1109/CFIC.2013.6566325","DOIUrl":"https://doi.org/10.1109/CFIC.2013.6566325","url":null,"abstract":"Vehicular Delay-Tolerant Networks (VDTNs) are composed of mobile nodes that communicate wirelessly with each other to forward data despite connectivity issues. This paper focuses on the problem of some nodes trying to impair the communication of a VDTN. In the paper we study the case of nodes that delay the forwarding of messages that is a particularly difficult to detect form of misbehavior. We study the impact of this form of misbehavior on eight VDTN routing protocols using a large set of simulations and two scenarios. The results show that depending on the type of misbehavior, message replication and intelligent selection of the next hop can help routing protocols to be resilient to node misbehavior.","PeriodicalId":271890,"journal":{"name":"2013 Conference on Future Internet Communications (CFIC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114797630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analytical characterisation of multi-path content delivery in Content Centric Networks 内容中心网络中多路径内容传递的分析表征
Pub Date : 2013-05-15 DOI: 10.1109/CFIC.2013.6566319
A. Udugama, Sameera Palipana, C. Goerg
Content Centric Networking (CCN) is an evolving paradigm in networking where communications are based on named content rather than the named hosts model of today's networks. Though CCN is capable of multi-path communications by design, no work has been done to characterise multi-path content transfers in CCN with an analytical model. In this work, we have developed an analytical model to evaluate the performance of multi-path content transfers in CCN. The performance of this model is then compared against a packet level CCN simulator built in OPNET. Round trip times, throughput and download times are obtained for both multi-path and single path to make comparisons of performances. The comparisons indicate that the results obtained from the simulator are in agreement with the results of the analytical model.
内容中心网络(CCN)是一种不断发展的网络范例,其中通信基于命名内容,而不是当今网络的命名主机模型。虽然CCN在设计上能够进行多路径通信,但没有工作可以用分析模型来表征CCN中的多路径内容传输。在这项工作中,我们开发了一个分析模型来评估CCN中多路径内容传输的性能。然后将该模型的性能与基于OPNET的数据包级CCN模拟器进行了比较。获取多路径和单路径的往返时间、吞吐量和下载时间,以便对性能进行比较。结果表明,仿真结果与解析模型的计算结果吻合较好。
{"title":"Analytical characterisation of multi-path content delivery in Content Centric Networks","authors":"A. Udugama, Sameera Palipana, C. Goerg","doi":"10.1109/CFIC.2013.6566319","DOIUrl":"https://doi.org/10.1109/CFIC.2013.6566319","url":null,"abstract":"Content Centric Networking (CCN) is an evolving paradigm in networking where communications are based on named content rather than the named hosts model of today's networks. Though CCN is capable of multi-path communications by design, no work has been done to characterise multi-path content transfers in CCN with an analytical model. In this work, we have developed an analytical model to evaluate the performance of multi-path content transfers in CCN. The performance of this model is then compared against a packet level CCN simulator built in OPNET. Round trip times, throughput and download times are obtained for both multi-path and single path to make comparisons of performances. The comparisons indicate that the results obtained from the simulator are in agreement with the results of the analytical model.","PeriodicalId":271890,"journal":{"name":"2013 Conference on Future Internet Communications (CFIC)","volume":"404 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Retrial queue of BMAP/PH/N type with customers balking, impatience and non-persistence BMAP/PH/N型重审队列,客户犹豫、不耐烦、不坚持
Pub Date : 2013-05-15 DOI: 10.1109/CFIC.2013.6566318
A. Dudin, V. Klimenok
We consider a multi-server retrial queueing system with the Batch Markovian Arrival Process and phase type service time distribution. Such a quite general queueing system suits for modeling, e.g., modern wireless communication networks. We assume that arriving customers, which do not succeed to start the service immediately upon arrival due to the lack of available servers, may leave the system forever (balk) or join the orbit for further retrials. Customers in the orbit are impatient (they may leave the system forever after exponentially distributed duration of the stay in the orbit) and non-persistent (they may leave the system forever after any unsuccessful attempt to reach the service). Approach by V. Ramaswami and D. Lucantoni for description of several independent Markov processes in parallel that allows to compute the stationary distribution of the system for large number of servers is used along with the results for multi-dimensional asymptotically quasi-Toeplitz Markov chains for computation of steady state distribution of the system states and some its performance measures.
考虑一个具有批处理马尔可夫到达过程和阶段型服务时间分配的多服务器重试排队系统。这种相当通用的排队系统适合于建模,例如现代无线通信网络。我们假设到达的客户,由于缺乏可用的服务器而无法在到达后立即成功启动服务,可能会永远离开系统(犹豫)或加入轨道以进行进一步的重试。轨道上的客户是不耐烦的(他们可能在停留在轨道上的时间呈指数分布后永远离开系统)和不持久的(他们可能在任何不成功的尝试到达服务后永远离开系统)。V. Ramaswami和D. Lucantoni对多个独立马尔可夫过程的并行描述方法,允许计算大量服务器系统的平稳分布,并将多维渐近拟toeplitz马尔可夫链的结果用于计算系统状态的稳态分布及其一些性能度量。
{"title":"Retrial queue of BMAP/PH/N type with customers balking, impatience and non-persistence","authors":"A. Dudin, V. Klimenok","doi":"10.1109/CFIC.2013.6566318","DOIUrl":"https://doi.org/10.1109/CFIC.2013.6566318","url":null,"abstract":"We consider a multi-server retrial queueing system with the Batch Markovian Arrival Process and phase type service time distribution. Such a quite general queueing system suits for modeling, e.g., modern wireless communication networks. We assume that arriving customers, which do not succeed to start the service immediately upon arrival due to the lack of available servers, may leave the system forever (balk) or join the orbit for further retrials. Customers in the orbit are impatient (they may leave the system forever after exponentially distributed duration of the stay in the orbit) and non-persistent (they may leave the system forever after any unsuccessful attempt to reach the service). Approach by V. Ramaswami and D. Lucantoni for description of several independent Markov processes in parallel that allows to compute the stationary distribution of the system for large number of servers is used along with the results for multi-dimensional asymptotically quasi-Toeplitz Markov chains for computation of steady state distribution of the system states and some its performance measures.","PeriodicalId":271890,"journal":{"name":"2013 Conference on Future Internet Communications (CFIC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114295961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards behaviour inference in smart environments 智能环境中的行为推理
Pub Date : 2013-05-15 DOI: 10.1109/CFIC.2013.6566324
M. Antunes, D. Gomes, R. Aguiar
Smart environments are physical places that are richly and invisibly populated with sensors, actuators and computational elements. The objective of such environments is to adapt themselves to its users in order to increase their comfort and usefulness. This paper proposes a platform, named APOLLO, capable of inferring behaviour rules from a smart environment and apply them to provide an intelligent space. The APOLLO platform is built upon a Service Oriented Architecture (SOA), in which collected context information is used to infer behaviour rules though statistical and machine learning techniques. The proposed platform is to be deployed in a home automation scenario.
智能环境是由传感器、执行器和计算元素组成的丰富且无形的物理场所。这种环境的目标是使其适应其用户,以增加其舒适度和实用性。本文提出了一个名为APOLLO的平台,该平台能够从智能环境中推断出行为规则,并将其应用于提供智能空间。APOLLO平台建立在面向服务的体系结构(SOA)之上,其中收集的上下文信息用于通过统计和机器学习技术推断行为规则。提议的平台将部署在家庭自动化场景中。
{"title":"Towards behaviour inference in smart environments","authors":"M. Antunes, D. Gomes, R. Aguiar","doi":"10.1109/CFIC.2013.6566324","DOIUrl":"https://doi.org/10.1109/CFIC.2013.6566324","url":null,"abstract":"Smart environments are physical places that are richly and invisibly populated with sensors, actuators and computational elements. The objective of such environments is to adapt themselves to its users in order to increase their comfort and usefulness. This paper proposes a platform, named APOLLO, capable of inferring behaviour rules from a smart environment and apply them to provide an intelligent space. The APOLLO platform is built upon a Service Oriented Architecture (SOA), in which collected context information is used to infer behaviour rules though statistical and machine learning techniques. The proposed platform is to be deployed in a home automation scenario.","PeriodicalId":271890,"journal":{"name":"2013 Conference on Future Internet Communications (CFIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127909904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the impact of the sensing rate of secondary users in Cognitive Radio Networks 认知无线网络中二次用户感知速率的影响
Pub Date : 2013-05-15 DOI: 10.1109/CFIC.2013.6566326
O. Salameh, K. De Turck, S. Wittevrongel, S. De Vuyst, H. Bruneel
The first phase in the operation of a Cognitive Radio Network (CRN) is the investigation of the availability of idle channels through channel sensing. In this paper we study the impact of the sensing rate of Secondary Users (SUs) in a CRN. We develop a continuous-time Markov chain (CTMC) to study the effect of the sensing rate σ on the performance measures of the CRN including the expected SU delay, the SU interruption probability, the probability a SU is discarded after entering the system and the SU blocking probability. The obtained results reveal that the sensing rate has a crucial impact on these measures.
认知无线网络(CRN)运行的第一阶段是通过信道感知来研究空闲信道的可用性。本文研究了CRN中辅助用户(su)感知速率的影响。我们建立了一个连续时间马尔可夫链(CTMC)来研究感知速率σ对CRN性能指标的影响,包括期望SU延迟、SU中断概率、SU进入系统后被丢弃的概率和SU阻塞概率。得到的结果表明,传感速率对这些措施有至关重要的影响。
{"title":"On the impact of the sensing rate of secondary users in Cognitive Radio Networks","authors":"O. Salameh, K. De Turck, S. Wittevrongel, S. De Vuyst, H. Bruneel","doi":"10.1109/CFIC.2013.6566326","DOIUrl":"https://doi.org/10.1109/CFIC.2013.6566326","url":null,"abstract":"The first phase in the operation of a Cognitive Radio Network (CRN) is the investigation of the availability of idle channels through channel sensing. In this paper we study the impact of the sensing rate of Secondary Users (SUs) in a CRN. We develop a continuous-time Markov chain (CTMC) to study the effect of the sensing rate σ on the performance measures of the CRN including the expected SU delay, the SU interruption probability, the probability a SU is discarded after entering the system and the SU blocking probability. The obtained results reveal that the sensing rate has a crucial impact on these measures.","PeriodicalId":271890,"journal":{"name":"2013 Conference on Future Internet Communications (CFIC)","volume":"49 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132026484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigating brute-force attacks on Bloom-filter based forwarding 减少基于Bloom-filter转发的暴力攻击
Pub Date : 2013-05-15 DOI: 10.1109/CFIC.2013.6566320
B. Alzahrani, V. Vassilakis, M. Reed
The in-packet Bloom filter forwarding mechanism is a source routing approach used in Information-centric networking (ICN). This mechanism is vulnerable to brute-force attacks that can be used for distributed denial-of-service (DDoS) attacks and unsolicited messages (spam). In this paper we analytically calculate the probability of brute-force attacks and determine the time required by the attacker to launch a successful attack. We find that using scenarios reported by other researchers this type of attacks is achievable in few seconds, which is unacceptable. The paper proposes a solution to mitigate the brute-force attacks by significantly increasing the time before a successful attack. Consequently, it is possible to change link identifiers before the attacker can adapt to the changes. We evaluate the proposed solution in terms of network security and scalability.
包内布隆过滤器转发机制是一种用于信息中心网络(ICN)的源路由方法。这种机制容易受到暴力攻击,这种攻击可用于分布式拒绝服务(DDoS)攻击和未经请求的消息(垃圾邮件)。本文分析计算了暴力攻击的概率,并确定了攻击者成功发起攻击所需的时间。我们发现,使用其他研究人员报告的场景,这种类型的攻击可以在几秒钟内实现,这是不可接受的。本文提出了一种通过显著增加攻击成功前的时间来减轻暴力攻击的解决方案。因此,在攻击者能够适应更改之前,更改链接标识符是可能的。我们从网络安全性和可扩展性方面评估了所提出的解决方案。
{"title":"Mitigating brute-force attacks on Bloom-filter based forwarding","authors":"B. Alzahrani, V. Vassilakis, M. Reed","doi":"10.1109/CFIC.2013.6566320","DOIUrl":"https://doi.org/10.1109/CFIC.2013.6566320","url":null,"abstract":"The in-packet Bloom filter forwarding mechanism is a source routing approach used in Information-centric networking (ICN). This mechanism is vulnerable to brute-force attacks that can be used for distributed denial-of-service (DDoS) attacks and unsolicited messages (spam). In this paper we analytically calculate the probability of brute-force attacks and determine the time required by the attacker to launch a successful attack. We find that using scenarios reported by other researchers this type of attacks is achievable in few seconds, which is unacceptable. The paper proposes a solution to mitigate the brute-force attacks by significantly increasing the time before a successful attack. Consequently, it is possible to change link identifiers before the attacker can adapt to the changes. We evaluate the proposed solution in terms of network security and scalability.","PeriodicalId":271890,"journal":{"name":"2013 Conference on Future Internet Communications (CFIC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123105724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Local messages for smartphones 智能手机本地短信
Pub Date : 2013-05-15 DOI: 10.1109/CFIC.2013.6566322
D. Namiot, M. Schneps-Schneppe
This paper describes a new model for local messaging based on the network proximity. We present a novelty mobile mashup which combines Wi-Fi proximity measurements with Cloud Messaging. Our mobile mashup combines passive monitoring for smart phones and cloud based messaging for mobile operational systems. Passive monitoring can determine the location of mobile subscribers (mobile phones, actually) without the active participation of mobile users. This paper describes how to combine the passive monitoring and notifications.
本文提出了一种基于网络接近度的本地消息传递模型。我们提出了一种新颖的移动混搭,它结合了Wi-Fi接近测量和云消息。我们的移动mashup结合了针对智能手机的被动监控和针对移动操作系统的基于云的消息传递。被动监测可以在没有移动用户积极参与的情况下确定移动用户(实际上是移动电话)的位置。本文介绍了如何将被动监控和通知相结合。
{"title":"Local messages for smartphones","authors":"D. Namiot, M. Schneps-Schneppe","doi":"10.1109/CFIC.2013.6566322","DOIUrl":"https://doi.org/10.1109/CFIC.2013.6566322","url":null,"abstract":"This paper describes a new model for local messaging based on the network proximity. We present a novelty mobile mashup which combines Wi-Fi proximity measurements with Cloud Messaging. Our mobile mashup combines passive monitoring for smart phones and cloud based messaging for mobile operational systems. Passive monitoring can determine the location of mobile subscribers (mobile phones, actually) without the active participation of mobile users. This paper describes how to combine the passive monitoring and notifications.","PeriodicalId":271890,"journal":{"name":"2013 Conference on Future Internet Communications (CFIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132700820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Light-weight time synchronization for Wireless Sensor Networks 无线传感器网络的轻量级时间同步
Pub Date : 2013-05-15 DOI: 10.1109/CFIC.2013.6566323
Frederico Gonçalves, L. Suresh, Ricardo Lopes Pereira, J. Trindade, T. Vazão
Using a Wireless Sensor Network (WSN) for monitoring single source events, such as volcanic activity, involves many challenges. One of these challenges is that of accurate timer synchronization of the data collecting nodes, so as to ensure that there is a consistent view of the data retrieval times. In this paper we discuss a novel approach for an one-way time synchronization protocol that relies on the use of cross-layer timing information to estimate the accumulated delay since a block of data is created until it is received at the sink node. The accumulated delay is computed using the Application, Network and Link layers in the 802.11b technology. At each node which belongs to a route a Protocol Data Unit (PDU) inserted between the User Datagram Protocol (UDP) header and the application payload, is manipulated in order to accumulate the calculated delay. This delay is iteratively incremented along the path until it is finally provided to the receiving application. The developed protocol provides a fairly accurate estimation of the delay a message experiences through a WSN, adding no extra packets and little data overhead. Our experimental evaluation showed that it is able to determine the end-to-end delay of most messages with an error inferior to 700μs in one hop scenarios and to 1500μs in two hops scenarios.
使用无线传感器网络(WSN)监测单一源事件,如火山活动,涉及许多挑战。其中一个挑战是数据收集节点的精确计时器同步,以确保有一致的数据检索时间视图。在本文中,我们讨论了一种单向时间同步协议的新方法,该协议依赖于使用跨层定时信息来估计从数据块创建到接收节点的累积延迟。累积延迟是使用802.11b技术中的应用、网络和链路层来计算的。在属于一条路由的每个节点上,都有一个插入在用户数据报协议(UDP)报头和应用程序有效负载之间的协议数据单元(PDU)被操作,以便累积计算出的延迟。此延迟沿着路径迭代递增,直到最终提供给接收应用程序。所开发的协议提供了对消息通过WSN经历的延迟的相当准确的估计,不增加额外的数据包和很少的数据开销。我们的实验评估表明,该方法能够确定大多数消息的端到端延迟,在单跳情况下误差小于700μs,在两跳情况下误差小于1500μs。
{"title":"Light-weight time synchronization for Wireless Sensor Networks","authors":"Frederico Gonçalves, L. Suresh, Ricardo Lopes Pereira, J. Trindade, T. Vazão","doi":"10.1109/CFIC.2013.6566323","DOIUrl":"https://doi.org/10.1109/CFIC.2013.6566323","url":null,"abstract":"Using a Wireless Sensor Network (WSN) for monitoring single source events, such as volcanic activity, involves many challenges. One of these challenges is that of accurate timer synchronization of the data collecting nodes, so as to ensure that there is a consistent view of the data retrieval times. In this paper we discuss a novel approach for an one-way time synchronization protocol that relies on the use of cross-layer timing information to estimate the accumulated delay since a block of data is created until it is received at the sink node. The accumulated delay is computed using the Application, Network and Link layers in the 802.11b technology. At each node which belongs to a route a Protocol Data Unit (PDU) inserted between the User Datagram Protocol (UDP) header and the application payload, is manipulated in order to accumulate the calculated delay. This delay is iteratively incremented along the path until it is finally provided to the receiving application. The developed protocol provides a fairly accurate estimation of the delay a message experiences through a WSN, adding no extra packets and little data overhead. Our experimental evaluation showed that it is able to determine the end-to-end delay of most messages with an error inferior to 700μs in one hop scenarios and to 1500μs in two hops scenarios.","PeriodicalId":271890,"journal":{"name":"2013 Conference on Future Internet Communications (CFIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125185205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Guaranteed greedy routing in overlay networks 覆盖网络中的保证贪婪路由
Pub Date : 2013-05-15 DOI: 10.1109/CFIC.2013.6566327
D. Milic, T. Braun
Greedy routing can be used in mobile ad-hoc networks as geographic routing protocol. This paper proposes to use greedy routing also in overlay networks by positioning overlay nodes into a multi-dimensional Euclidean space. Greedy routing can only be applied when a routing decision makes progress towards the final destination. Our proposed overlay network is built such that there will be always progress at each forwarding node. This is achieved by constructing at each node a so-called nearest neighbor convex set (NNCS). NNCSs can be used for various applications such as multicast routing, service discovery and Quality-of-Service routing. NNCS has been compared with Pastry, another topology-aware overlay network. NNCS has superior relative path stretches indicating the optimality of a path.
贪婪路由可以作为地理路由协议应用于移动自组网中。本文通过将覆盖节点定位到多维欧氏空间,提出了贪婪路由在覆盖网络中的应用。贪婪路由只能在路由决策向最终目的地前进时应用。我们提出的覆盖网络是这样构建的:在每个转发节点上总是有进度。这是通过在每个节点上构造一个所谓的最近邻凸集(nnc)来实现的。nncs可用于多种应用,如组播路由、服务发现和服务质量路由。NNCS与另一种拓扑感知覆盖网络Pastry进行了比较。nnc具有优越的相对路径延伸,表明路径的最优性。
{"title":"Guaranteed greedy routing in overlay networks","authors":"D. Milic, T. Braun","doi":"10.1109/CFIC.2013.6566327","DOIUrl":"https://doi.org/10.1109/CFIC.2013.6566327","url":null,"abstract":"Greedy routing can be used in mobile ad-hoc networks as geographic routing protocol. This paper proposes to use greedy routing also in overlay networks by positioning overlay nodes into a multi-dimensional Euclidean space. Greedy routing can only be applied when a routing decision makes progress towards the final destination. Our proposed overlay network is built such that there will be always progress at each forwarding node. This is achieved by constructing at each node a so-called nearest neighbor convex set (NNCS). NNCSs can be used for various applications such as multicast routing, service discovery and Quality-of-Service routing. NNCS has been compared with Pastry, another topology-aware overlay network. NNCS has superior relative path stretches indicating the optimality of a path.","PeriodicalId":271890,"journal":{"name":"2013 Conference on Future Internet Communications (CFIC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134493673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 Conference on Future Internet Communications (CFIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1