首页 > 最新文献

2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)最新文献

英文 中文
Energy-efficient information dissemination based on received signal strength in wireless sensor networks 无线传感器网络中基于接收信号强度的节能信息传播
H. Hisamatsu, G. Hasegawa, M. Murata
Power-saving is one of the important issues in wireless sensor networks and many studies on power-saving in wireless sensor networks have been done. However, most of these studies have focused on saving power in gathering the information. In this paper, we tackle the issue of the energy-efficient information dissemination in wireless sensor networks. We propose method of disseminating information while optimizing electric power consumption in wireless sensor networks. Our new dissemination method employs flooding and uses the receiver signal strength to determine the broadcast timing. In our method, the node farthest from the sending node will rebroadcast the message first and a broadcast is canceled when a node scheduled to broadcast receives a duplicate of the scheduled message from other nodes. We evaluate our proposed method by simulation. As a result, it is found that the electric power consumption of the proposal method in the entire network is one-third that of the flooding method at the maximum. Furthermore, we show that the farther the transmitting distance of the wireless radio wave becomes, the more efficiently our method can disseminate information to the network.
节能是无线传感器网络中的一个重要问题,人们对无线传感器网络的节能进行了大量的研究。然而,这些研究大多侧重于在收集信息时节省电力。本文主要研究无线传感器网络中节能信息的传播问题。提出了一种在无线传感器网络中实现信息传播的同时优化电力消耗的方法。该方法采用泛洪技术,利用接收机信号强度确定广播时间。在我们的方法中,距离发送节点最远的节点将首先重播消息,当计划广播的节点从其他节点接收到计划消息的副本时,广播将被取消。我们通过仿真验证了所提出的方法。结果发现,提案法在全网内的用电量最大时仅为淹水法的三分之一。研究表明,无线电波的发射距离越远,该方法向网络传播信息的效率越高。
{"title":"Energy-efficient information dissemination based on received signal strength in wireless sensor networks","authors":"H. Hisamatsu, G. Hasegawa, M. Murata","doi":"10.1109/CQR.2015.7129080","DOIUrl":"https://doi.org/10.1109/CQR.2015.7129080","url":null,"abstract":"Power-saving is one of the important issues in wireless sensor networks and many studies on power-saving in wireless sensor networks have been done. However, most of these studies have focused on saving power in gathering the information. In this paper, we tackle the issue of the energy-efficient information dissemination in wireless sensor networks. We propose method of disseminating information while optimizing electric power consumption in wireless sensor networks. Our new dissemination method employs flooding and uses the receiver signal strength to determine the broadcast timing. In our method, the node farthest from the sending node will rebroadcast the message first and a broadcast is canceled when a node scheduled to broadcast receives a duplicate of the scheduled message from other nodes. We evaluate our proposed method by simulation. As a result, it is found that the electric power consumption of the proposal method in the entire network is one-third that of the flooding method at the maximum. Furthermore, we show that the farther the transmitting distance of the wireless radio wave becomes, the more efficiently our method can disseminate information to the network.","PeriodicalId":274592,"journal":{"name":"2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Traffic classification on mobile core network considering regularity of background traffic 考虑后台流量规律性的移动核心网流量分类
Masaki Suzuki, M. Watari, S. Ano, M. Tsuru
Recent widespread use of smartphones and rich multimedia contents has brought a considerable increase in mobile traffic. Therefore, the characteristics of smartphone traffic need to be considered when designing mobile core networks. Smartphone traffic is categorized by whether it is generated from user interaction (foreground (FG) traffic) or not (background (BG) traffic), and such traffic types can be managed differently to efficiently maintain the communication quality in the case of network congestion. However, it is difficult to distinguish such traffic types and their characteristics solely by IP addresses/port numbers. In addition, the increase in HTTPS traffic makes application-level packet inspection difficult. In this paper, we propose a traffic classification method on a mobile core network. The proposed method captures packets on the mobile core network, constructs TCP flows, and labels each flow by considering the regularity of BG traffic and the randomness of FG traffic using a Support Vector Machine (SVM) classifier with selected feature indexes obtained from the TCP/IP layer. Also, we attempt to restrict the indexes that can be obtained in the observation of the initial part of each TCP flow in order to reduce the calculation cost. The proposed method is evaluated in terms of the classification accuracy using experimental data through the Wi-Fi connections of smartphones. The full-index classifier using 40 indexes classifies FG and BG traffic with 97.2% accuracy and the shortcut-index classifier using restricted 36 indexes also indicates 94.4% accuracy.
最近智能手机的广泛使用和丰富的多媒体内容带来了相当大的移动流量增长。因此,在设计移动核心网时,需要考虑智能手机流量的特点。智能手机流量根据用户交互产生的流量(前台(FG)流量)和非用户交互产生的流量(后台(BG)流量)进行分类,可以对这两种流量进行不同的管理,从而在网络拥塞的情况下有效地保持通信质量。但是,仅通过IP地址/端口号很难区分这些流量类型及其特征。另外,HTTPS流量的增加使得应用层的报文检测变得困难。本文提出了一种基于移动核心网的流量分类方法。该方法捕获移动核心网的数据包,构建TCP流,并使用支持向量机(SVM)分类器结合从TCP/IP层获得的特征索引,考虑BG流量的规律性和FG流量的随机性,对每个流进行标记。此外,为了减少计算成本,我们试图限制在观察每个TCP流的初始部分时可以获得的索引。通过智能手机Wi-Fi连接的实验数据,对所提方法的分类精度进行了评估。使用40个指标的全索引分类器对FG和BG流量的分类准确率为97.2%,使用受限36个指标的快捷索引分类器对FG和BG流量的分类准确率也达到94.4%。
{"title":"Traffic classification on mobile core network considering regularity of background traffic","authors":"Masaki Suzuki, M. Watari, S. Ano, M. Tsuru","doi":"10.1109/CQR.2015.7129082","DOIUrl":"https://doi.org/10.1109/CQR.2015.7129082","url":null,"abstract":"Recent widespread use of smartphones and rich multimedia contents has brought a considerable increase in mobile traffic. Therefore, the characteristics of smartphone traffic need to be considered when designing mobile core networks. Smartphone traffic is categorized by whether it is generated from user interaction (foreground (FG) traffic) or not (background (BG) traffic), and such traffic types can be managed differently to efficiently maintain the communication quality in the case of network congestion. However, it is difficult to distinguish such traffic types and their characteristics solely by IP addresses/port numbers. In addition, the increase in HTTPS traffic makes application-level packet inspection difficult. In this paper, we propose a traffic classification method on a mobile core network. The proposed method captures packets on the mobile core network, constructs TCP flows, and labels each flow by considering the regularity of BG traffic and the randomness of FG traffic using a Support Vector Machine (SVM) classifier with selected feature indexes obtained from the TCP/IP layer. Also, we attempt to restrict the indexes that can be obtained in the observation of the initial part of each TCP flow in order to reduce the calculation cost. The proposed method is evaluated in terms of the classification accuracy using experimental data through the Wi-Fi connections of smartphones. The full-index classifier using 40 indexes classifies FG and BG traffic with 97.2% accuracy and the shortcut-index classifier using restricted 36 indexes also indicates 94.4% accuracy.","PeriodicalId":274592,"journal":{"name":"2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122007018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Benchmarking the session initiation protocol (SIP) 对会话发起协议(SIP)进行基准测试
Yueqing Zhang, Arthur Clouet, Oluseyi S. Awotayo, C. Davids, V. Gurbani
Measuring and comparing performance of an Internet multimedia signaling protocol across varying vendor implementations is a challenging task. Tests to measure the performance of the protocol as it is exhibited on a vendor device and conditions of the laboratory setup to run the tests have to be normalized such that no special favour is accorded to a particular vendor implementation. In this paper, we describe a performance benchmark to measure the performance of a device that includes a Session Initiation Protocol (SIP) proxy function. This benchmark is currently being standardized by the Internet Engineering Task Force (IETF). We implemented the algorithm that has been proposed in the IETF to measure the performance of a SIP server. We provide the test results of running the benchmark on Asterisk, the popular open source SIP private branch exchange (PBX).
测量和比较跨不同厂商实现的Internet多媒体信令协议的性能是一项具有挑战性的任务。为衡量在供应商设备上展示的协议性能而进行的测试和运行测试的实验室设置条件必须标准化,不得对特定供应商的实施给予特别优待。在本文中,我们描述了一个性能基准来衡量包含会话发起协议(SIP)代理功能的设备的性能。这个基准目前正在由互联网工程任务组(IETF)进行标准化。我们实现了IETF中提出的算法来测量SIP服务器的性能。我们提供了在Asterisk上运行基准测试的测试结果,Asterisk是一种流行的开源SIP专用分支交换机(PBX)。
{"title":"Benchmarking the session initiation protocol (SIP)","authors":"Yueqing Zhang, Arthur Clouet, Oluseyi S. Awotayo, C. Davids, V. Gurbani","doi":"10.1109/CQR.2015.7129087","DOIUrl":"https://doi.org/10.1109/CQR.2015.7129087","url":null,"abstract":"Measuring and comparing performance of an Internet multimedia signaling protocol across varying vendor implementations is a challenging task. Tests to measure the performance of the protocol as it is exhibited on a vendor device and conditions of the laboratory setup to run the tests have to be normalized such that no special favour is accorded to a particular vendor implementation. In this paper, we describe a performance benchmark to measure the performance of a device that includes a Session Initiation Protocol (SIP) proxy function. This benchmark is currently being standardized by the Internet Engineering Task Force (IETF). We implemented the algorithm that has been proposed in the IETF to measure the performance of a SIP server. We provide the test results of running the benchmark on Asterisk, the popular open source SIP private branch exchange (PBX).","PeriodicalId":274592,"journal":{"name":"2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121954479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An integrated signaling-encryption mechanism to reduce error propagation in wireless communications: performance analyses 减少无线通信中错误传播的集成信号加密机制:性能分析
M. Olama, M. Matalgah, M. Bobrek
Traditional encryption techniques require packet overhead, produce processing time delay, and suffer from severe quality of service deterioration due to fades and interference in wireless channels. These issues reduce the effective transmission data rate (throughput) considerably in wireless communications, where data rate with limited bandwidth is the main constraint. In this paper, performance evaluation analyses are conducted for an integrated signaling-encryption mechanism that is secure and enables improved throughput and probability of bit-error in wireless channels. This mechanism eliminates the drawbacks stated herein by encrypting only a small portion of an entire transmitted frame, while the rest is not subject to traditional encryption but goes through a signaling process (designed transformation) with the plaintext of the portion selected for encryption. We also propose to incorporate error correction coding solely on the small encrypted portion of the data to drastically improve the overall bit-error rate performance while not noticeably increasing the required bit-rate. We focus on validating the signaling-encryption mechanism utilizing Hamming and convolutional error correction coding by conducting an end-to-end system-level simulation-based study. The average probability of bit-error and throughput of the encryption mechanism are evaluated over standard Gaussian and Rayleigh fading-type channels and compared to the ones of the conventional advanced encryption standard (AES).
传统的加密技术需要数据包开销,产生处理时间延迟,并且由于无线信道的衰落和干扰导致服务质量严重下降。这些问题大大降低了无线通信中的有效传输数据速率(吞吐量),其中带宽有限的数据速率是主要制约因素。本文对一种安全、提高无线信道吞吐量和误码率的集成信令加密机制进行了性能评估分析。这种机制通过只加密整个传输帧的一小部分来消除本文所述的缺点,而其余部分不受传统加密的约束,而是通过一个信令过程(设计的转换),使用选择用于加密的部分的明文。我们还建议仅在数据的小加密部分上合并纠错编码,以大幅提高整体误码率性能,同时不会显着增加所需的比特率。我们专注于通过进行端到端系统级仿真研究来验证利用汉明和卷积纠错编码的信令加密机制。在标准高斯信道和瑞利信道中,对加密机制的平均误码率和吞吐量进行了评估,并与传统的高级加密标准(AES)进行了比较。
{"title":"An integrated signaling-encryption mechanism to reduce error propagation in wireless communications: performance analyses","authors":"M. Olama, M. Matalgah, M. Bobrek","doi":"10.1109/CQR.2015.7129081","DOIUrl":"https://doi.org/10.1109/CQR.2015.7129081","url":null,"abstract":"Traditional encryption techniques require packet overhead, produce processing time delay, and suffer from severe quality of service deterioration due to fades and interference in wireless channels. These issues reduce the effective transmission data rate (throughput) considerably in wireless communications, where data rate with limited bandwidth is the main constraint. In this paper, performance evaluation analyses are conducted for an integrated signaling-encryption mechanism that is secure and enables improved throughput and probability of bit-error in wireless channels. This mechanism eliminates the drawbacks stated herein by encrypting only a small portion of an entire transmitted frame, while the rest is not subject to traditional encryption but goes through a signaling process (designed transformation) with the plaintext of the portion selected for encryption. We also propose to incorporate error correction coding solely on the small encrypted portion of the data to drastically improve the overall bit-error rate performance while not noticeably increasing the required bit-rate. We focus on validating the signaling-encryption mechanism utilizing Hamming and convolutional error correction coding by conducting an end-to-end system-level simulation-based study. The average probability of bit-error and throughput of the encryption mechanism are evaluated over standard Gaussian and Rayleigh fading-type channels and compared to the ones of the conventional advanced encryption standard (AES).","PeriodicalId":274592,"journal":{"name":"2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116208074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nonparametric statistical methods to analyze the internet connectivity reliability 网络连接可靠性分析的非参数统计方法
D. Papadimitriou, D. Careglio
Facing computational complexity when modeling network reliability by means of parametric models and corresponding statistical methods, in the present study, we apply nonparametric statistical methods, such as the Kaplan-Meier survival probability estimator and the mean cumulative function, to characterize the dynamic properties (in particular, the stability properties) of the Internet routing paths and their relationship with the corresponding forwarding path(s). Providing systematic methodology for quantifying these properties aims at enabling reliability assessment of the Internet connectivity (also referred to as reachability in computer networking). The motivation for studying the dynamic properties (in particular, the stability properties) of the Internet routing paths and their relationship to forwarding paths stems from three main reasons. The first translates the fact that transient but frequent changes in the spatio-temporal properties of routing paths may affect the performance and operating conditions of the corresponding forwarding paths; hence, their reliability. The second reason is that frequent instabilities when observed for the same (subset of) path(s) that can be attributed to a spatially localized portion(s) of the Internet may reveal that the underlying physical topology is more prone to failures; hence, showing limited reliability. The third results from the increasing operational need to provide for a longer term estimation of the Internet routing-forwarding system performance and operating conditions using well-proven statistical analysis accounting for recurrence of events and correlation between instability events.
面对使用参数模型和相应的统计方法建模网络可靠性时的计算复杂性,本研究采用Kaplan-Meier生存概率估计和平均累积函数等非参数统计方法来表征互联网路由路径的动态特性(特别是稳定性特性)及其与相应转发路径的关系。为量化这些属性提供系统的方法,目的是使互联网连接(也称为计算机网络中的可达性)的可靠性评估成为可能。研究Internet路由路径的动态特性(特别是稳定性特性)及其与转发路径的关系,主要有三个原因。第一种解释是,路由路径的时空特性的短暂但频繁的变化可能影响相应转发路径的性能和运行条件;因此,他们的可靠性。第二个原因是,当观察到可归因于互联网空间局部化部分的相同(子集)路径时,频繁的不稳定性可能表明底层物理拓扑更容易发生故障;因此,显示有限的可靠性。第三个结果来自日益增长的运营需求,即使用经过充分验证的统计分析来提供对互联网路由转发系统性能和运行条件的长期估计,该统计分析考虑了事件的复发和不稳定事件之间的相关性。
{"title":"Nonparametric statistical methods to analyze the internet connectivity reliability","authors":"D. Papadimitriou, D. Careglio","doi":"10.1109/CQR.2015.7129083","DOIUrl":"https://doi.org/10.1109/CQR.2015.7129083","url":null,"abstract":"Facing computational complexity when modeling network reliability by means of parametric models and corresponding statistical methods, in the present study, we apply nonparametric statistical methods, such as the Kaplan-Meier survival probability estimator and the mean cumulative function, to characterize the dynamic properties (in particular, the stability properties) of the Internet routing paths and their relationship with the corresponding forwarding path(s). Providing systematic methodology for quantifying these properties aims at enabling reliability assessment of the Internet connectivity (also referred to as reachability in computer networking). The motivation for studying the dynamic properties (in particular, the stability properties) of the Internet routing paths and their relationship to forwarding paths stems from three main reasons. The first translates the fact that transient but frequent changes in the spatio-temporal properties of routing paths may affect the performance and operating conditions of the corresponding forwarding paths; hence, their reliability. The second reason is that frequent instabilities when observed for the same (subset of) path(s) that can be attributed to a spatially localized portion(s) of the Internet may reveal that the underlying physical topology is more prone to failures; hence, showing limited reliability. The third results from the increasing operational need to provide for a longer term estimation of the Internet routing-forwarding system performance and operating conditions using well-proven statistical analysis accounting for recurrence of events and correlation between instability events.","PeriodicalId":274592,"journal":{"name":"2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129630834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improving strategy for LTE downlink scheduling algorithms based on QoS requirement 基于QoS要求的LTE下行链路调度算法改进策略
Zhipeng Jiang, Wei Zhang, Suixiang Gao, Lei Zhou
LTE is an all IP network. The scheduling in its downlink channels is a key problem. Although many algorithms have been designed and analyzed, the QoS for the users in poor channel conditions are not enough to be ensured sometimes. We design a method to enhance the capacity of the system, which is a modifying strategy available for most existing algorithms. Our intuition is to allocate more resources to the users in poorer channel conditions without declining the QoS of the users in better channel. Simulations show that our strategy can satisfy the QoS for more users.
LTE是一种全IP网络。其下行信道的调度是一个关键问题。虽然已经设计和分析了许多算法,但有时在信道条件较差的情况下,用户的QoS得不到足够的保证。我们设计了一种提高系统容量的方法,这是一种对大多数现有算法可用的修改策略。我们的直觉是将更多的资源分配给信道条件较差的用户,而不降低信道条件较好的用户的QoS。仿真结果表明,该策略可以满足更多用户的QoS要求。
{"title":"An improving strategy for LTE downlink scheduling algorithms based on QoS requirement","authors":"Zhipeng Jiang, Wei Zhang, Suixiang Gao, Lei Zhou","doi":"10.1109/CQR.2015.7129079","DOIUrl":"https://doi.org/10.1109/CQR.2015.7129079","url":null,"abstract":"LTE is an all IP network. The scheduling in its downlink channels is a key problem. Although many algorithms have been designed and analyzed, the QoS for the users in poor channel conditions are not enough to be ensured sometimes. We design a method to enhance the capacity of the system, which is a modifying strategy available for most existing algorithms. Our intuition is to allocate more resources to the users in poorer channel conditions without declining the QoS of the users in better channel. Simulations show that our strategy can satisfy the QoS for more users.","PeriodicalId":274592,"journal":{"name":"2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124658609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Receiver-driven congestion control for content oriented application with multiple sources 面向内容的多源应用的接收器驱动拥塞控制
Yusaku Hayamizu, M. Yamamoto
In content oriented application, such as P2P, a user does not care about where content is obtained and a content file can be downloaded from anywhere it is obtained. In some P2P systems, e.g. BitTorrent, a content file is divided into small parts, chunks, and each chunk is downloaded from anywhere. In this many-to-one communication style, one TCP session is set up for each pair of a sender and a receiver. If these sessions go through the same bottleneck link, many-to-one communication might obtain unfairly large throughput. In this paper, we propose a new receiver-driven congestion control for this many-to-one communications. Our proposed congestion control detects bottleneck-sharing flows and clusters them. Window coupling technique is applied for these clustered flows, which enables these flows to obtain fair aggregated throughput. Our simulation results show that our proposed receiver-driven congestion control fairly shares a bottleneck link with regular TCP.
在面向内容的应用程序中,例如P2P,用户不关心从哪里获取内容,内容文件可以从任何地方下载。在一些P2P系统中,例如BitTorrent,一个内容文件被分成小块,每个块都可以从任何地方下载。在这种多对一的通信风格中,为每一对发送方和接收方建立一个TCP会话。如果这些会话经过相同的瓶颈链路,那么多对一通信可能会获得不公平的大吞吐量。在本文中,我们提出了一种新的接收端驱动的多对一通信拥塞控制。我们提出的拥塞控制检测瓶颈共享流并将它们聚类。对这些聚集的流应用窗口耦合技术,使这些流获得公平的聚合吞吐量。仿真结果表明,我们提出的接收端驱动的拥塞控制与常规TCP共享一个瓶颈链路。
{"title":"Receiver-driven congestion control for content oriented application with multiple sources","authors":"Yusaku Hayamizu, M. Yamamoto","doi":"10.1109/CQR.2015.7129085","DOIUrl":"https://doi.org/10.1109/CQR.2015.7129085","url":null,"abstract":"In content oriented application, such as P2P, a user does not care about where content is obtained and a content file can be downloaded from anywhere it is obtained. In some P2P systems, e.g. BitTorrent, a content file is divided into small parts, chunks, and each chunk is downloaded from anywhere. In this many-to-one communication style, one TCP session is set up for each pair of a sender and a receiver. If these sessions go through the same bottleneck link, many-to-one communication might obtain unfairly large throughput. In this paper, we propose a new receiver-driven congestion control for this many-to-one communications. Our proposed congestion control detects bottleneck-sharing flows and clusters them. Window coupling technique is applied for these clustered flows, which enables these flows to obtain fair aggregated throughput. Our simulation results show that our proposed receiver-driven congestion control fairly shares a bottleneck link with regular TCP.","PeriodicalId":274592,"journal":{"name":"2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116122470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PCI reduction method suitable for type-II HARQ with SR-ARQ PCI复位法适用于伴有SR-ARQ的ii型HARQ
Fumiki Uzawa, T. Koyama, K. Mitsuyama, N. Iai, K. Aoki, T. Hiraguri
Hybrid automatic repeat request (HARQ) can make efficient and reliable transmission possible for radio communications. However, in the HARQ scheme, packet control information (PCI), such as HARQ block identifiers (HARQ block ids) in selective repeat ARQ (SR-ARQ), are required and the reduction of PCI overhead is an issue. In particular, type-II HARQ handles a large amount of PCI because it includes the HARQ block ids and sub-block ids. The sub-block id identifies the set of parity bits in the HARQ block of the corresponding sub-block, and is used to combine the sub-blocks. This report proposes a method of PCI reduction suitable for type-II HARQ with SR-ARQ. The method can inform the HARQ block id and sub-block id of each HARQ block by sending only the information on how many HARQ blocks are contained in each 1st, 2nd, 3rd, and 4th transmission group. The estimated size of reduced PCI and simulation results of our TDD communication system confirms that the proposed method greatly reduces PCI and improves data throughput compared to a conventional method.
混合自动重复请求(HARQ)可以使无线电通信的高效可靠传输成为可能。然而,在HARQ方案中,在选择性重复ARQ (SR-ARQ)中需要数据包控制信息(PCI),例如HARQ块标识符(HARQ块id),并且PCI开销的减少是一个问题。特别是,ii型HARQ处理大量的PCI,因为它包括HARQ块id和子块id。子块id标识相应子块的HARQ块中的奇偶校验位集合,用于组合子块。本报告提出了一种适用于伴有SR-ARQ的ii型HARQ的PCI复位方法。该方法可以通过只发送每个第1、2、3、4个传输组中包含多少个HARQ块的信息来通知每个HARQ块的HARQ块id和子块id。减少PCI的估计大小和我们的TDD通信系统的仿真结果证实,与传统方法相比,所提出的方法大大降低了PCI,提高了数据吞吐量。
{"title":"PCI reduction method suitable for type-II HARQ with SR-ARQ","authors":"Fumiki Uzawa, T. Koyama, K. Mitsuyama, N. Iai, K. Aoki, T. Hiraguri","doi":"10.1109/CQR.2015.7129086","DOIUrl":"https://doi.org/10.1109/CQR.2015.7129086","url":null,"abstract":"Hybrid automatic repeat request (HARQ) can make efficient and reliable transmission possible for radio communications. However, in the HARQ scheme, packet control information (PCI), such as HARQ block identifiers (HARQ block ids) in selective repeat ARQ (SR-ARQ), are required and the reduction of PCI overhead is an issue. In particular, type-II HARQ handles a large amount of PCI because it includes the HARQ block ids and sub-block ids. The sub-block id identifies the set of parity bits in the HARQ block of the corresponding sub-block, and is used to combine the sub-blocks. This report proposes a method of PCI reduction suitable for type-II HARQ with SR-ARQ. The method can inform the HARQ block id and sub-block id of each HARQ block by sending only the information on how many HARQ blocks are contained in each 1st, 2nd, 3rd, and 4th transmission group. The estimated size of reduced PCI and simulation results of our TDD communication system confirms that the proposed method greatly reduces PCI and improves data throughput compared to a conventional method.","PeriodicalId":274592,"journal":{"name":"2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115637504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing attacks for modbus/TCP protocol in a real-time cyber physical system test bed 在实时网络物理系统测试台上实现modbus/TCP协议攻击
Bo Chen, Nishant Pattanaik, A. Goulart, K. Butler-Purry, D. Kundur
To understand security vulnerabilities of communication protocols used in power systems, a real-time framework can be developed to conduct vulnerability studies. The framework should implement protection mechanisms against vulnerabilities and study their effectiveness. In this paper, a realtime cyber-physical framework or test bed is presented. It integrates a real-time power system simulator and a communication system simulator to study the cyber and physical system vulnerabilities in smart power grids. The power system simulation is implemented using the Real-Time Digital Simulator (RTDS®) power grid simulator, with LabVIEW and PXI modules that simulate the supervisory control and data acquisition (SCADA) system and intelligent electronic devices (IEDs). The communication system simulation is implemented using Opnet's System-in-the-Loop (SITL) simulator and open source Linux tools and servers. Results of two cyber-attacks on the Modbus/TCP protocol are discussed and improvements to the test bed for protocol attack detection and mitigation are proposed.
为了了解电力系统通信协议的安全漏洞,可以开发一个实时框架进行漏洞研究。该框架应实施针对脆弱性的保护机制,并研究其有效性。本文提出了一种实时网络物理框架或测试平台。它集成了实时电力系统模拟器和通信系统模拟器,研究智能电网中的网络和物理系统漏洞。电力系统仿真使用实时数字模拟器(RTDS®)电网模拟器实现,使用LabVIEW和PXI模块模拟监控和数据采集(SCADA)系统和智能电子设备(ied)。通信系统仿真是使用Opnet的系统在环(SITL)模拟器和开源Linux工具和服务器实现的。讨论了针对Modbus/TCP协议的两次网络攻击的结果,并对协议攻击检测和缓解测试平台提出了改进意见。
{"title":"Implementing attacks for modbus/TCP protocol in a real-time cyber physical system test bed","authors":"Bo Chen, Nishant Pattanaik, A. Goulart, K. Butler-Purry, D. Kundur","doi":"10.1109/CQR.2015.7129084","DOIUrl":"https://doi.org/10.1109/CQR.2015.7129084","url":null,"abstract":"To understand security vulnerabilities of communication protocols used in power systems, a real-time framework can be developed to conduct vulnerability studies. The framework should implement protection mechanisms against vulnerabilities and study their effectiveness. In this paper, a realtime cyber-physical framework or test bed is presented. It integrates a real-time power system simulator and a communication system simulator to study the cyber and physical system vulnerabilities in smart power grids. The power system simulation is implemented using the Real-Time Digital Simulator (RTDS®) power grid simulator, with LabVIEW and PXI modules that simulate the supervisory control and data acquisition (SCADA) system and intelligent electronic devices (IEDs). The communication system simulation is implemented using Opnet's System-in-the-Loop (SITL) simulator and open source Linux tools and servers. Results of two cyber-attacks on the Modbus/TCP protocol are discussed and improvements to the test bed for protocol attack detection and mitigation are proposed.","PeriodicalId":274592,"journal":{"name":"2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128060288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
期刊
2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1