首页 > 最新文献

2010 Ninth IEEE International Symposium on Network Computing and Applications最新文献

英文 中文
Remote Reliable Services to Support Transactional Mobile Agents 支持事务性移动代理的远程可靠服务
Izabela Moise, M. Hurfin, Linda Zeghache, N. Badache
Mobile devices are now equipped with multiple sensors and networking capabilities. They can gather information about their surrounding environment and interact both with nearby nodes, using a dynamic and self-configurable ad-hoc network, and with distant nodes via the Internet. While the concept of mobile agent is appropriate to explore the ad-hoc network and autonomously discover service providers, it is not suitable for the implementation of strong distributed synchronization mechanisms. Moreover, the termination of a task assigned to an agent may be compromised if the persistence of the agent itself is not ensured. In the case of a transactional mobile agent, we identify two services, Availability of the Source and Atomic Commit, that have to be supplied by more powerful entities located outside the ad-hoc network, in a remote network, called the support network. We propose a solution where the two services are successively provided by an active entity called the leader. In the support network, crash failures may also occur. To guarantee reliability, the main actions performed by the leader are the subject of a consensus with all the other potential leaders. The proposed solution relies on a single agreement protocol that orders continuously all the new actions.
移动设备现在配备了多个传感器和网络功能。它们可以收集周围环境的信息,并使用动态和自配置的自组织网络与附近的节点进行交互,也可以通过Internet与远处的节点进行交互。移动代理的概念适合探索自组织网络和自主发现服务提供者,但不适合实现强分布式同步机制。此外,如果不能确保代理本身的持久性,则分配给代理的任务的终止可能会受到影响。在事务性移动代理的情况下,我们确定了两个服务,源的可用性和原子提交,它们必须由位于自组织网络之外的更强大的实体提供,位于称为支持网络的远程网络中。我们提出了一种解决方案,其中两个服务由称为leader的活动实体依次提供。在支持网络中,也可能发生崩溃故障。为了保证可靠性,领导者执行的主要行动必须与所有其他潜在领导者达成共识。所提出的解决方案依赖于单个协议协议,该协议连续命令所有新操作。
{"title":"Remote Reliable Services to Support Transactional Mobile Agents","authors":"Izabela Moise, M. Hurfin, Linda Zeghache, N. Badache","doi":"10.1109/NCA.2010.51","DOIUrl":"https://doi.org/10.1109/NCA.2010.51","url":null,"abstract":"Mobile devices are now equipped with multiple sensors and networking capabilities. They can gather information about their surrounding environment and interact both with nearby nodes, using a dynamic and self-configurable ad-hoc network, and with distant nodes via the Internet. While the concept of mobile agent is appropriate to explore the ad-hoc network and autonomously discover service providers, it is not suitable for the implementation of strong distributed synchronization mechanisms. Moreover, the termination of a task assigned to an agent may be compromised if the persistence of the agent itself is not ensured. In the case of a transactional mobile agent, we identify two services, Availability of the Source and Atomic Commit, that have to be supplied by more powerful entities located outside the ad-hoc network, in a remote network, called the support network. We propose a solution where the two services are successively provided by an active entity called the leader. In the support network, crash failures may also occur. To guarantee reliability, the main actions performed by the leader are the subject of a consensus with all the other potential leaders. The proposed solution relies on a single agreement protocol that orders continuously all the new actions.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131134119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
K-overlay: A Kautz Tree Structure for Video on Demand System K-overlay:视频点播系统的Kautz树结构
Ubaid Abbasi, T. Ahmed
In order to improve scalability and reduce maintenance overhead for Peer-to-Peer system, several architecture with constant degree and optimal diameter are proposed. However, the expected topology doesn’t effectively utilize the bandwidth capacity of peers. In this work, we propose K-overlay, an overlay scheme based on unbalanced Kautz graph with logdn diameter and constant in-degree. We define the degree of a digraph as the maximum number of arcs arriving at or leaving from any vertex. The diameter of a graph is the number of arc traversals that is sufficient to reach any vertex from any other vertex. K-overlay structure is based on two-fold mechanism. (1) Organization of peers in concentric circles to maximize the outgoing bandwidth of peers (2) Content delivery through parent as well as neighboring peers. Through formal analysis and comprehensive simulations, we show that our proposed architecture achieves optimal diameter and good connectivity as compared to existing overlay architecture like P2Cast.
为了提高点对点系统的可扩展性和降低维护开销,提出了几种具有定度和最优直径的点对点系统架构。但是,预期的拓扑结构不能有效地利用对等体的带宽容量。本文提出了一种基于非平衡Kautz图的覆盖方案K-overlay。我们将有向图的度数定义为到达或离开任意顶点的最大弧数。图的直径是足以从任何其他顶点到达任何顶点的弧遍历次数。k -覆盖层结构基于双重机制。(1)组织同心圆的对等体,使对等体的出方向带宽最大化(2)通过父对等体和相邻对等体进行内容分发。通过形式化分析和综合仿真,我们表明,与现有的覆盖架构(如P2Cast)相比,我们提出的架构实现了最优直径和良好的连通性。
{"title":"K-overlay: A Kautz Tree Structure for Video on Demand System","authors":"Ubaid Abbasi, T. Ahmed","doi":"10.1109/NCA.2010.45","DOIUrl":"https://doi.org/10.1109/NCA.2010.45","url":null,"abstract":"In order to improve scalability and reduce maintenance overhead for Peer-to-Peer system, several architecture with constant degree and optimal diameter are proposed. However, the expected topology doesn’t effectively utilize the bandwidth capacity of peers. In this work, we propose K-overlay, an overlay scheme based on unbalanced Kautz graph with logdn diameter and constant in-degree. We define the degree of a digraph as the maximum number of arcs arriving at or leaving from any vertex. The diameter of a graph is the number of arc traversals that is sufficient to reach any vertex from any other vertex. K-overlay structure is based on two-fold mechanism. (1) Organization of peers in concentric circles to maximize the outgoing bandwidth of peers (2) Content delivery through parent as well as neighboring peers. Through formal analysis and comprehensive simulations, we show that our proposed architecture achieves optimal diameter and good connectivity as compared to existing overlay architecture like P2Cast.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124006181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ecosystem of Cloud Naming Systems: An Approach for the Management and Integration of Independent Cloud Name Spaces 云命名系统生态系统:一种独立云命名空间的管理与集成方法
A. Celesti, M. Villari, A. Puliafito
Cloud computing is a highly dynamic environment where resources can be composed with other ones to provide many kinds of services to clients. In such scenario naming and resource location become critical issues and the existing Domain Name System (DNS), considered alone, is not able to address the new emerging problems. A cloud environment offers a variety of concrete and abstracted entities which need to be identified, whose states can frequently change: a virtual resource, could be allocated, deallocated or moved from a context to another. Moreover, a cloud entity could hold one or more names, identifiers, and representations in various cloud contexts where name alterations could frequently occur. In such environment, the management and integration of independent cloud name spaces is then becoming more compelling. This paper aims to propose a cloud naming system able to address such problems, providing an implementation practice in a cloud federation use case.
云计算是一个高度动态的环境,其中资源可以与其他资源组合在一起,为客户端提供多种服务。在这种情况下,命名和资源定位成为关键问题,现有的域名系统(DNS)单独考虑,无法解决新出现的问题。云环境提供了各种需要识别的具体和抽象实体,这些实体的状态可能经常发生变化:虚拟资源可以被分配、释放或从一个上下文移动到另一个上下文。此外,云实体可以在经常发生名称更改的各种云上下文中保存一个或多个名称、标识符和表示。在这样的环境中,独立云名称空间的管理和集成变得更加迫切。本文旨在提出一种能够解决此类问题的云命名系统,并在云联合用例中提供实现实践。
{"title":"Ecosystem of Cloud Naming Systems: An Approach for the Management and Integration of Independent Cloud Name Spaces","authors":"A. Celesti, M. Villari, A. Puliafito","doi":"10.1109/NCA.2010.16","DOIUrl":"https://doi.org/10.1109/NCA.2010.16","url":null,"abstract":"Cloud computing is a highly dynamic environment where resources can be composed with other ones to provide many kinds of services to clients. In such scenario naming and resource location become critical issues and the existing Domain Name System (DNS), considered alone, is not able to address the new emerging problems. A cloud environment offers a variety of concrete and abstracted entities which need to be identified, whose states can frequently change: a virtual resource, could be allocated, deallocated or moved from a context to another. Moreover, a cloud entity could hold one or more names, identifiers, and representations in various cloud contexts where name alterations could frequently occur. In such environment, the management and integration of independent cloud name spaces is then becoming more compelling. This paper aims to propose a cloud naming system able to address such problems, providing an implementation practice in a cloud federation use case.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129289022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Six-Shot Multicast: A Location-Aware Strategy for Efficient Message Routing in MANETs 六播组播:一种基于位置感知的消息路由策略
B. Garbinato, A. Holzer, F. Vessaz
In this paper, we introduce six-shot multicast (6Shot), a location-aware multicast algorithm devised for mobile ad hoc networks. Multicast is a one-to-many communication scheme and has largely been studied in such networks. Indeed, this communication primitive can be used as a building block for popular services, such as data streaming or group communication. The particularity of 6Shot is the location- aware routing scheme of its implementation, which offers improved efficiency in terms of message overhead compared to existing algorithms, for a reasonable cost in terms of reliability.
本文介绍了一种针对移动自组织网络设计的位置感知组播算法——六播组播(6Shot)。组播是一种一对多的通信方式,在这种网络中得到了大量的研究。实际上,这种通信原语可以用作流行服务(如数据流或组通信)的构建块。6Shot的特殊之处在于其实现的位置感知路由方案,与现有算法相比,它在消息开销方面提供了更高的效率,而在可靠性方面却付出了合理的代价。
{"title":"Six-Shot Multicast: A Location-Aware Strategy for Efficient Message Routing in MANETs","authors":"B. Garbinato, A. Holzer, F. Vessaz","doi":"10.1109/NCA.2010.8","DOIUrl":"https://doi.org/10.1109/NCA.2010.8","url":null,"abstract":"In this paper, we introduce six-shot multicast (6Shot), a location-aware multicast algorithm devised for mobile ad hoc networks. Multicast is a one-to-many communication scheme and has largely been studied in such networks. Indeed, this communication primitive can be used as a building block for popular services, such as data streaming or group communication. The particularity of 6Shot is the location- aware routing scheme of its implementation, which offers improved efficiency in terms of message overhead compared to existing algorithms, for a reasonable cost in terms of reliability.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"218 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127327107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Advanced Hashing with Hybrid Key Duplication for IP Address Lookup 高级哈希与混合密钥复制的IP地址查找
Rujiroj Tiengtavat, Wei-Ming Lin
Hashing techniques have been widely adopted for general IP address lookup and specific network intrusion detection. In most current commonly used XOR-hashing algorithms, each of the hash key bits is usually explicitly XORed only at most once in the hash process, which may limit the amount of potential randomness that can be introduced by the hashing process. This paper further looks into various ways in duplicating and re-using key bits to maximize randomness needed in the hashing process so as to enhance the overall performance further.
散列技术已被广泛应用于一般IP地址查找和特定网络入侵检测。在大多数当前常用的xor散列算法中,每个散列密钥位通常在散列过程中最多只能显式地xor一次,这可能限制了散列过程可以引入的潜在随机性的数量。本文进一步研究了复制和重用密钥位的各种方法,以最大限度地提高哈希过程中所需的随机性,从而进一步提高整体性能。
{"title":"Advanced Hashing with Hybrid Key Duplication for IP Address Lookup","authors":"Rujiroj Tiengtavat, Wei-Ming Lin","doi":"10.1109/NCA.2010.48","DOIUrl":"https://doi.org/10.1109/NCA.2010.48","url":null,"abstract":"Hashing techniques have been widely adopted for general IP address lookup and specific network intrusion detection. In most current commonly used XOR-hashing algorithms, each of the hash key bits is usually explicitly XORed only at most once in the hash process, which may limit the amount of potential randomness that can be introduced by the hashing process. This paper further looks into various ways in duplicating and re-using key bits to maximize randomness needed in the hashing process so as to enhance the overall performance further.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128876788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly Detection with Wireless Sensor Networks 基于无线传感器网络的异常检测
N. Dessart, H. Fouchal, P. Hunel, Nicolas Vidot
The aim of this study is to suggest two automated techniques able to help medical staff to detect earlier than usual some diseases using wireless sensor networks (WSNs). In this context, a patient is equipped with physical sensors which sense health parameters. This WSN will perform some computations and will run an alarm when a disease is suspected. The first technique uses a population protocol to handle data exchanged between motes and provides an efficient algorithm to suggest that a disease is diagnosed on a patient. The algorithm is distributed, i.e., the decision may be done by any sensor dealing with the disease detection. The second technique uses a token algorithm where, some motes are denoted as masters. Each of them is in charge of deciding if a specific disease occurs. This technique is not totally distributed but enhances the network efficiency regarding to the energy consumption, the time execution and the number of exchanged messages.
本研究的目的是提出两种自动化技术,能够帮助医务人员使用无线传感器网络(WSNs)比通常更早地发现某些疾病。在这种情况下,患者配备了感知健康参数的物理传感器。该WSN将执行一些计算,并在怀疑出现疾病时发出警报。第一种技术使用人口协议来处理在mote之间交换的数据,并提供一种有效的算法来建议在患者身上诊断出疾病。该算法是分布式的,即决策可以由任何处理疾病检测的传感器来完成。第二种技术使用令牌算法,其中一些笔记被表示为主笔记。他们每个人都负责决定是否发生某种特定的疾病。这种技术不是完全分布式的,但在能耗、执行时间和交换消息数量方面提高了网络效率。
{"title":"Anomaly Detection with Wireless Sensor Networks","authors":"N. Dessart, H. Fouchal, P. Hunel, Nicolas Vidot","doi":"10.1109/NCA.2010.36","DOIUrl":"https://doi.org/10.1109/NCA.2010.36","url":null,"abstract":"The aim of this study is to suggest two automated techniques able to help medical staff to detect earlier than usual some diseases using wireless sensor networks (WSNs). In this context, a patient is equipped with physical sensors which sense health parameters. This WSN will perform some computations and will run an alarm when a disease is suspected. The first technique uses a population protocol to handle data exchanged between motes and provides an efficient algorithm to suggest that a disease is diagnosed on a patient. The algorithm is distributed, i.e., the decision may be done by any sensor dealing with the disease detection. The second technique uses a token algorithm where, some motes are denoted as masters. Each of them is in charge of deciding if a specific disease occurs. This technique is not totally distributed but enhances the network efficiency regarding to the energy consumption, the time execution and the number of exchanged messages.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Multi-core Approach to Providing Fault Tolerance for Non-deterministic Services 为不确定性服务提供容错的多核方法
Balazs Gerofi, Y. Ishikawa
With the advent of multi- and many-core architectures, new opportunities in fault-tolerant computing have become available. In this paper we propose a novel process replication method that provides transparent failover of non-deterministic TCP services by utilizing spare CPU cores. Our method does not require any changes to the TCP protocol, does not require any changes to the client software, and unlike existing solutions, it does not require any changes to the server applications either. We measure performance overhead on two real-world applications, a multimedia streaming service and an Internet Relay Chat daemon and show that the imposed overhead is minimal as the price of seamless failover. Our prototype implementation consists of a kernel module for Linux 2.6 without any changes to the existing kernel code.
随着多核和多核体系结构的出现,在容错计算方面出现了新的机会。在本文中,我们提出了一种新的进程复制方法,该方法利用空闲的CPU内核为不确定的TCP服务提供透明的故障转移。我们的方法不需要对TCP协议进行任何更改,不需要对客户端软件进行任何更改,而且与现有的解决方案不同,它也不需要对服务器应用程序进行任何更改。我们测量了两个实际应用程序的性能开销,一个是多媒体流媒体服务,另一个是Internet Relay Chat守护进程,结果表明,作为无缝故障转移的代价,强加的开销是最小的。我们的原型实现由Linux 2.6的内核模块组成,没有对现有的内核代码进行任何更改。
{"title":"A Multi-core Approach to Providing Fault Tolerance for Non-deterministic Services","authors":"Balazs Gerofi, Y. Ishikawa","doi":"10.1109/NCA.2010.42","DOIUrl":"https://doi.org/10.1109/NCA.2010.42","url":null,"abstract":"With the advent of multi- and many-core architectures, new opportunities in fault-tolerant computing have become available. In this paper we propose a novel process replication method that provides transparent failover of non-deterministic TCP services by utilizing spare CPU cores. Our method does not require any changes to the TCP protocol, does not require any changes to the client software, and unlike existing solutions, it does not require any changes to the server applications either. We measure performance overhead on two real-world applications, a multimedia streaming service and an Internet Relay Chat daemon and show that the imposed overhead is minimal as the price of seamless failover. Our prototype implementation consists of a kernel module for Linux 2.6 without any changes to the existing kernel code.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133454679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance Model of Gossip-Based Update Propagation 基于八卦的更新传播性能模型
Imad Antonios, R. Dhar, Feng Zhang, L. Lipsky
We consider the problem of propagating an update to nodes in a distributed system using two gossiping protocols. The first is an idealized algorithm with static and dynamic knowledge of the system, and the second is a simple randomized algorithm. We construct a theoretical model that allows us to derive work and completion time statistics under varying transmission delay distributions. Numerical results are obtained for both exponential and nonexponential transmission times using linear-algebraic queueing theory techniques. Additionally, we present the results of simulation experiments showing that under node churn assumptions, the randomized algorithm's performance is qualitatively different than in a fault-free system.
我们考虑使用两种八卦协议将更新传播到分布式系统中的节点的问题。前者是一种具有系统静态和动态知识的理想算法,后者是一种简单的随机化算法。我们建立了一个理论模型,使我们能够在不同的传输延迟分布下获得工作和完成时间统计。利用线性代数排队理论技术得到了指数和非指数传输时间的数值结果。此外,我们给出的仿真实验结果表明,在节点流失假设下,随机化算法的性能与无故障系统的性能有质的不同。
{"title":"A Performance Model of Gossip-Based Update Propagation","authors":"Imad Antonios, R. Dhar, Feng Zhang, L. Lipsky","doi":"10.1109/NCA.2010.23","DOIUrl":"https://doi.org/10.1109/NCA.2010.23","url":null,"abstract":"We consider the problem of propagating an update to nodes in a distributed system using two gossiping protocols. The first is an idealized algorithm with static and dynamic knowledge of the system, and the second is a simple randomized algorithm. We construct a theoretical model that allows us to derive work and completion time statistics under varying transmission delay distributions. Numerical results are obtained for both exponential and nonexponential transmission times using linear-algebraic queueing theory techniques. Additionally, we present the results of simulation experiments showing that under node churn assumptions, the randomized algorithm's performance is qualitatively different than in a fault-free system.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114227347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Clustering Algorithms for Lossy Wireless Sensor Networks 有损无线传感器网络的分布式聚类算法
Zhexi Pan, Yuanyuan Yang, Dawei Gong
Recent experimental studies have revealed that a large percentage of wireless links are lossy and unreliable for data delivery in wireless sensor networks (WSNs). Such findings raise new challenges for the design of clustering algorithms in WSNs in terms of data reliability and energy efficiency. In this paper, we propose distributed clustering algorithms for WSNs by taking into account of the lossy nature of wireless links. We first formulate the one-hop clustering problem that maintains reliability as well as saves energy into an integer program and prove its NP-hardness. We then propose a metricbased distributed clustering algorithm to solve the problem. We adopt a metric called selection weight for each sensor node that can indicate both link qualities around the node and its capability of being a cluster head. We further extend the algorithm to multi-hop clustering to achieve better scalability. Extensive simulations have been conducted under a realistic link model and the results demonstrate that the proposed clustering algorithm can reduce the total energy consumption in the network and prolong network lifetime significantly compared to a typical distributed clustering algorithm, HEED, that does not consider lossy links.
最近的实验研究表明,在无线传感器网络(WSNs)中,有很大比例的无线链路存在损耗和不可靠的数据传输。这些发现对WSNs聚类算法的设计在数据可靠性和能效方面提出了新的挑战。在本文中,我们提出了一种考虑到无线链路损耗特性的分布式聚类算法。首先将保持可靠性和节约能量的一跳聚类问题转化为整数规划,并证明了其np -硬度。然后我们提出了一种基于度量的分布式聚类算法来解决这个问题。我们对每个传感器节点采用一种称为选择权重的度量,该度量可以表明节点周围的链路质量及其作为簇头的能力。我们进一步将该算法扩展到多跳集群,以获得更好的可扩展性。在实际链路模型下进行了大量的仿真,结果表明,与不考虑有损链路的典型分布式聚类算法HEED相比,本文提出的聚类算法可以显著降低网络总能耗,延长网络寿命。
{"title":"Distributed Clustering Algorithms for Lossy Wireless Sensor Networks","authors":"Zhexi Pan, Yuanyuan Yang, Dawei Gong","doi":"10.1109/NCA.2010.12","DOIUrl":"https://doi.org/10.1109/NCA.2010.12","url":null,"abstract":"Recent experimental studies have revealed that a large percentage of wireless links are lossy and unreliable for data delivery in wireless sensor networks (WSNs). Such findings raise new challenges for the design of clustering algorithms in WSNs in terms of data reliability and energy efficiency. In this paper, we propose distributed clustering algorithms for WSNs by taking into account of the lossy nature of wireless links. We first formulate the one-hop clustering problem that maintains reliability as well as saves energy into an integer program and prove its NP-hardness. We then propose a metricbased distributed clustering algorithm to solve the problem. We adopt a metric called selection weight for each sensor node that can indicate both link qualities around the node and its capability of being a cluster head. We further extend the algorithm to multi-hop clustering to achieve better scalability. Extensive simulations have been conducted under a realistic link model and the results demonstrate that the proposed clustering algorithm can reduce the total energy consumption in the network and prolong network lifetime significantly compared to a typical distributed clustering algorithm, HEED, that does not consider lossy links.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Redundancy Infrastructure for Service-Oriented Wireless Sensor Networks 面向服务的无线传感器网络冗余基础结构
Jana Neumann, N. Hoeller, C. Reinke, V. Linnemann
Transfering the paradigm of service-oriented architecture (SOA) to sensor networks became an important research area in the last years. Amongst others, a couple of approaches deal with the flexible and robust service discovery and usage of services which takes the unsteady nature of WSNs into account. However, the approaches do not consider the case that services may get unavailable during their activity phase because of node failures. In this case, already collected or computed data will get lost and the service request of the service consumer remains unanswered. In this paper, we propose a redundancy infrastructure for service-oriented WSNs which deals with this special problem. The framework consists of an adaptive data replication technique and a service recovery solution. Whereas the replication technique ensures the survival beyond node failures, the recovery protocol restarts a failed service using the replicated data and enables the service to continue its functionality.
将面向服务的体系结构(SOA)范式转移到传感器网络中成为近年来的一个重要研究领域。其中,考虑到无线传感器网络的不稳定特性,有几种方法处理灵活和健壮的服务发现和服务使用。然而,这些方法没有考虑服务在活动阶段可能由于节点故障而不可用的情况。在这种情况下,已经收集或计算的数据将丢失,并且服务使用者的服务请求仍未得到答复。本文针对这一特殊问题,提出了一种面向服务的无线传感器网络冗余基础结构。该框架由自适应数据复制技术和服务恢复解决方案组成。复制技术确保节点故障后的生存,而恢复协议使用复制的数据重新启动失败的服务,并使服务能够继续其功能。
{"title":"Redundancy Infrastructure for Service-Oriented Wireless Sensor Networks","authors":"Jana Neumann, N. Hoeller, C. Reinke, V. Linnemann","doi":"10.1109/NCA.2010.50","DOIUrl":"https://doi.org/10.1109/NCA.2010.50","url":null,"abstract":"Transfering the paradigm of service-oriented architecture (SOA) to sensor networks became an important research area in the last years. Amongst others, a couple of approaches deal with the flexible and robust service discovery and usage of services which takes the unsteady nature of WSNs into account. However, the approaches do not consider the case that services may get unavailable during their activity phase because of node failures. In this case, already collected or computed data will get lost and the service request of the service consumer remains unanswered. In this paper, we propose a redundancy infrastructure for service-oriented WSNs which deals with this special problem. The framework consists of an adaptive data replication technique and a service recovery solution. Whereas the replication technique ensures the survival beyond node failures, the recovery protocol restarts a failed service using the replicated data and enables the service to continue its functionality.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116004378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2010 Ninth IEEE International Symposium on Network Computing and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1