首页 > 最新文献

2015 7th International Conference on Communication Systems and Networks (COMSNETS)最新文献

英文 中文
HAVEN: Holistic load balancing and auto scaling in the cloud HAVEN:云中的整体负载平衡和自动扩展
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098681
Rishabh Poddar, Anilkumar Vishnoi, V. Mann
Load balancing and auto scaling are important services in the cloud. Traditionally, load balancing is achieved through either hardware or software appliances. Hardware appliances perform well but have several drawbacks. They are fairly expensive and are typically bought for managing peaks even if average volumes are 10% of peak. Further, they lack flexibility in terms of adding custom load balancing algorithms. They also lack multi-tenancy support. To address these concerns, most public clouds have adopted software load balancers that typically also comprise an auto scaling service. However, software load balancers do not match the performance of hardware load balancers. In order to avoid a single point of failure, they also require complex clustering solutions which further drives their cost higher. In this context, we present HAVEN - a system for holistic load balancing and auto scaling in a multi-tenant cloud environment that is naturally distributed, and hence scalable. It supports multi-tenancy and takes into account the utilization levels of different resources as part of its load balancing and auto scaling algorithms. HAVEN leverages software-defined networking to ensure that while the load balancing algorithm (control plane) executes on a server running network controller software, the packets to be load balanced never leave the data plane. For this reason, HAVEN is able to provide performance at par with a hardware load balancer while still providing the flexibility and customizability of a software load balancer. We validate HAVEN on a hardware setup and our experiments confirm that it achieves high performance without any significant overheads.
负载平衡和自动扩展是云中的重要服务。传统上,负载平衡是通过硬件或软件设备实现的。硬件设备性能良好,但有几个缺点。它们相当昂贵,通常用于管理峰值,即使平均交易量是峰值的10%。此外,它们在添加自定义负载平衡算法方面缺乏灵活性。它们也缺乏多租户支持。为了解决这些问题,大多数公共云都采用了软件负载平衡器,通常还包括自动扩展服务。但是,软件负载平衡器的性能不能与硬件负载平衡器相匹配。为了避免单点故障,它们还需要复杂的集群解决方案,这进一步推高了它们的成本。在这种情况下,我们提出了HAVEN——一个在自然分布的多租户云环境中实现整体负载平衡和自动扩展的系统,因此具有可伸缩性。它支持多租户,并将不同资源的利用率水平作为其负载平衡和自动缩放算法的一部分。HAVEN利用软件定义网络,确保负载均衡算法(控制平面)在运行网络控制器软件的服务器上执行时,需要负载均衡的数据包永远不会离开数据平面。由于这个原因,HAVEN能够提供与硬件负载平衡器相当的性能,同时仍然提供软件负载平衡器的灵活性和可定制性。我们在硬件设置上验证了HAVEN,我们的实验证实它在没有任何重大开销的情况下实现了高性能。
{"title":"HAVEN: Holistic load balancing and auto scaling in the cloud","authors":"Rishabh Poddar, Anilkumar Vishnoi, V. Mann","doi":"10.1109/COMSNETS.2015.7098681","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098681","url":null,"abstract":"Load balancing and auto scaling are important services in the cloud. Traditionally, load balancing is achieved through either hardware or software appliances. Hardware appliances perform well but have several drawbacks. They are fairly expensive and are typically bought for managing peaks even if average volumes are 10% of peak. Further, they lack flexibility in terms of adding custom load balancing algorithms. They also lack multi-tenancy support. To address these concerns, most public clouds have adopted software load balancers that typically also comprise an auto scaling service. However, software load balancers do not match the performance of hardware load balancers. In order to avoid a single point of failure, they also require complex clustering solutions which further drives their cost higher. In this context, we present HAVEN - a system for holistic load balancing and auto scaling in a multi-tenant cloud environment that is naturally distributed, and hence scalable. It supports multi-tenancy and takes into account the utilization levels of different resources as part of its load balancing and auto scaling algorithms. HAVEN leverages software-defined networking to ensure that while the load balancing algorithm (control plane) executes on a server running network controller software, the packets to be load balanced never leave the data plane. For this reason, HAVEN is able to provide performance at par with a hardware load balancer while still providing the flexibility and customizability of a software load balancer. We validate HAVEN on a hardware setup and our experiments confirm that it achieves high performance without any significant overheads.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Impact of HTML5 persistent connectivity to power consumption for the mobile web HTML5持久连接对移动网络能耗的影响
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098682
G. Mandyam, N. Ehsan
With the advent of HTML5, the next generation of browser-based technologies for web developers, new connectivity paradigms have arisen that will allow web developers to move beyond HTTP-based stateless transactions. However, such new features do not transition seamlessly from the desktop to mobile browsers. Specifically, handheld devices with limited battery life can be impacted by persistent connectivity. In this work, two recent technologies (WebSockets and WebRTC) are examined with respect to power consumption. Based on this analysis, recommendations for improving battery life when using these technologies are provided.
随着HTML5(面向web开发人员的下一代基于浏览器的技术)的出现,新的连接范式已经出现,这将允许web开发人员超越基于http的无状态事务。然而,这些新特性并不能从桌面浏览器无缝过渡到移动浏览器。具体来说,电池寿命有限的手持设备可能会受到持久连接的影响。在这项工作中,研究了两种最新技术(WebSockets和WebRTC)的功耗。在此分析的基础上,提供了使用这些技术时提高电池寿命的建议。
{"title":"Impact of HTML5 persistent connectivity to power consumption for the mobile web","authors":"G. Mandyam, N. Ehsan","doi":"10.1109/COMSNETS.2015.7098682","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098682","url":null,"abstract":"With the advent of HTML5, the next generation of browser-based technologies for web developers, new connectivity paradigms have arisen that will allow web developers to move beyond HTTP-based stateless transactions. However, such new features do not transition seamlessly from the desktop to mobile browsers. Specifically, handheld devices with limited battery life can be impacted by persistent connectivity. In this work, two recent technologies (WebSockets and WebRTC) are examined with respect to power consumption. Based on this analysis, recommendations for improving battery life when using these technologies are provided.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117028918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Passing the torch: Role alternation for fair energy usage in D2D group communication 传递火炬:D2D群体通信中公平能源使用的角色转换
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098689
Sacha Trifunovic, Andreea Hossmann-Picu, T. Hossmann
By using device-to-device (D2D) communication, opportunistic networks promise to fill the gaps of the networking infrastructure in remote areas, to enable communication in emergency situations, and to inspire new applications. Yet, to become feasible in practice and accepted by users, it is crucial that the energy costs of D2D connections are small and shared fairly. Fairness, in particular, is a major issue with today's D2D technologies (Bluetooth, Wi-Fi Direct): since each connected peer must assume one of two different roles - access point/client, master/slave, the energy consumption inside a connected group is very asymmetric. While a large body of research exists on role assignment and topology control, the above issue of energy fairness is either not at all addressed (e.g. in the context of Bluetooth scatternets) or is addressed under fundamentally different conditions (e.g. in very dense and often static wireless sensor networks). In this paper, we tackle the fairness problem of the energy consumed in a group of D2D-connected nodes, by using role switching: the two types of roles are alternated among group members, thus producing a fairer cost sharing. First, we analyze contact traces for their group topologies and find that four simple motifs - clique, star, chain and NxM-clique - cover up to 94% of the aggregated lifetime of all connected groups. We then determine the optimal role switching strategies for these motifs by formulating the cycle of role assignments as an optimization problem. Since deriving the optimal cycle online, in a distributed manner is hardly possible in practice, we also propose two role switching heuristics for online use: a randomized switching scheme tunable for efficiency or fairness, and a deterministic scheme which additionally guarantees the group's connectivity. Finally, we evaluate our solutions on real contact traces and show that our heuristics find very good points of operation in the fairness-efficiency tradeoff.
通过使用设备对设备(D2D)通信,机会网络有望填补偏远地区网络基础设施的空白,实现紧急情况下的通信,并激发新的应用。然而,为了在实践中变得可行并被用户接受,D2D连接的能源成本小且公平分摊是至关重要的。公平是当今D2D技术(蓝牙、Wi-Fi Direct)的一个主要问题:由于每个连接的对等体必须承担两个不同角色中的一个——接入点/客户端、主/从端,因此连接组内的能量消耗非常不对称。虽然存在大量关于角色分配和拓扑控制的研究,但上述能量公平问题要么根本没有解决(例如在蓝牙散射网的背景下),要么在根本不同的条件下解决(例如在非常密集且通常是静态的无线传感器网络中)。在本文中,我们通过角色转换来解决一组d2d连接节点的能源消耗的公平性问题:两种类型的角色在组成员之间交替,从而产生更公平的成本分摊。首先,我们分析了它们的组拓扑的接触轨迹,发现四个简单的基元-团,星,链和nxm -团-覆盖了所有连接组的总寿命的94%。然后,我们通过将角色分配周期作为优化问题来确定这些母题的最优角色转换策略。由于在实践中以分布式方式在线导出最优周期几乎是不可能的,我们还提出了两种在线使用的角色交换启发式方法:一种可调整效率或公平性的随机交换方案,以及一种额外保证组连通性的确定性方案。最后,我们在真实的接触轨迹上评估了我们的解决方案,并表明我们的启发式方法在公平-效率权衡中找到了非常好的操作点。
{"title":"Passing the torch: Role alternation for fair energy usage in D2D group communication","authors":"Sacha Trifunovic, Andreea Hossmann-Picu, T. Hossmann","doi":"10.1109/COMSNETS.2015.7098689","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098689","url":null,"abstract":"By using device-to-device (D2D) communication, opportunistic networks promise to fill the gaps of the networking infrastructure in remote areas, to enable communication in emergency situations, and to inspire new applications. Yet, to become feasible in practice and accepted by users, it is crucial that the energy costs of D2D connections are small and shared fairly. Fairness, in particular, is a major issue with today's D2D technologies (Bluetooth, Wi-Fi Direct): since each connected peer must assume one of two different roles - access point/client, master/slave, the energy consumption inside a connected group is very asymmetric. While a large body of research exists on role assignment and topology control, the above issue of energy fairness is either not at all addressed (e.g. in the context of Bluetooth scatternets) or is addressed under fundamentally different conditions (e.g. in very dense and often static wireless sensor networks). In this paper, we tackle the fairness problem of the energy consumed in a group of D2D-connected nodes, by using role switching: the two types of roles are alternated among group members, thus producing a fairer cost sharing. First, we analyze contact traces for their group topologies and find that four simple motifs - clique, star, chain and NxM-clique - cover up to 94% of the aggregated lifetime of all connected groups. We then determine the optimal role switching strategies for these motifs by formulating the cycle of role assignments as an optimization problem. Since deriving the optimal cycle online, in a distributed manner is hardly possible in practice, we also propose two role switching heuristics for online use: a randomized switching scheme tunable for efficiency or fairness, and a deterministic scheme which additionally guarantees the group's connectivity. Finally, we evaluate our solutions on real contact traces and show that our heuristics find very good points of operation in the fairness-efficiency tradeoff.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"2 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114038075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Asymptotic outage analysis of incremental decode and forward cognitive radio relay network 增量解码和前向认知无线电中继网络的渐近中断分析
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098670
Subhajit Majhi, Adrish Banerjee
In this paper, we consider a secondary incremental relaying (IR) network that operates simultaneously with multiple primary receivers in the same frequency band under spectrum sharing constraints. The IR network consists of multiple decode-and-forward (DF) relays and employs opportunistic relay selection for cooperation. We analyze the outage probability of the network where the selected relay opts to cooperate when the destination fails to decode the direct transmission from source.We derive the expression of asymptotic outage probability, diversity gain and coding gain. The diversity gain was found to be the same as that of a non-spectrum sharing system. Furthermore, we investigate the impact of number of relays and primary-to-secondary network distance on outage probability and coding gains, which is validated through numerical simulation.
本文考虑了在频谱共享约束下,与同一频段的多个主接收机同时工作的二次增量中继(IR)网络。红外网络由多个解码转发(DF)中继组成,并采用机会中继选择进行合作。我们分析了当目标端无法解码来自源端的直接传输时,所选中继选择合作的网络中断概率。导出了渐近中断概率、分集增益和编码增益的表达式。发现分集增益与非频谱共享系统相同。此外,我们还研究了中继数量和主从网络距离对中断概率和编码增益的影响,并通过数值模拟验证了这一点。
{"title":"Asymptotic outage analysis of incremental decode and forward cognitive radio relay network","authors":"Subhajit Majhi, Adrish Banerjee","doi":"10.1109/COMSNETS.2015.7098670","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098670","url":null,"abstract":"In this paper, we consider a secondary incremental relaying (IR) network that operates simultaneously with multiple primary receivers in the same frequency band under spectrum sharing constraints. The IR network consists of multiple decode-and-forward (DF) relays and employs opportunistic relay selection for cooperation. We analyze the outage probability of the network where the selected relay opts to cooperate when the destination fails to decode the direct transmission from source.We derive the expression of asymptotic outage probability, diversity gain and coding gain. The diversity gain was found to be the same as that of a non-spectrum sharing system. Furthermore, we investigate the impact of number of relays and primary-to-secondary network distance on outage probability and coding gains, which is validated through numerical simulation.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128968290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Edge level vehicular traffic estimation using cellular infrastructure and other sources 使用蜂窝基础设施和其他来源的边缘级车辆交通估计
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098718
Manish Chaturvedi, S. Srivastava
Intelligent Transportation Systems (ITS) play major role in generating fine grained vehicular traffic information for city wide or larger region. However, in developing countries like India, limited ITS infrastructure is available. On the other hand, cellular infrastructure is widely deployed in India with more than 867 million cellular connections and more than 70% cellular teledensity [1]. Also, on some major arterial roads, video cameras are deployed for surveillance purpose. The aim of this study is to assess feasibility of using these alternate sources to generate accurate traffic information for all the edges in a road network. The simulation results show that, even with large location error of 250-500 meters, edge level vehicle flow estimation with good accuracy (less than 10% error) is feasible using cellular network data. Using cellular network data alone, the edges can be classified as congested or uncongested. For edge level speed estimation, we propose a simple and novel approach for fusing widely available but erroneous flow data from cellular network with the spatially sparse but accurate flow-speed data from other sources (e.g. loop detectors or video cameras). The simulation results show that edge level speed estimation with good accuracy (less than 15% median error) is feasible using the proposed approach.
智能交通系统(ITS)在生成城市乃至更大范围内的细粒度车辆交通信息方面发挥着重要作用。然而,在印度等发展中国家,智能交通系统的基础设施有限。另一方面,印度广泛部署蜂窝基础设施,蜂窝连接数超过8.67亿,蜂窝电话密度超过70%[1]。此外,在一些主要的主干道上,部署了摄像机进行监视。本研究的目的是评估使用这些替代来源为道路网络中所有边缘生成准确交通信息的可行性。仿真结果表明,在定位误差在250 ~ 500米的情况下,利用蜂窝网络数据进行边缘级车辆流估计,具有较好的精度(误差小于10%)。单独使用蜂窝网络数据,边缘可以分为拥塞或非拥塞。对于边缘水平速度估计,我们提出了一种简单而新颖的方法,将来自蜂窝网络的广泛可用但错误的流量数据与来自其他来源(例如环路检测器或摄像机)的空间稀疏但准确的流量数据融合在一起。仿真结果表明,该方法具有较好的边缘水平速度估计精度(中值误差小于15%)。
{"title":"Edge level vehicular traffic estimation using cellular infrastructure and other sources","authors":"Manish Chaturvedi, S. Srivastava","doi":"10.1109/COMSNETS.2015.7098718","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098718","url":null,"abstract":"Intelligent Transportation Systems (ITS) play major role in generating fine grained vehicular traffic information for city wide or larger region. However, in developing countries like India, limited ITS infrastructure is available. On the other hand, cellular infrastructure is widely deployed in India with more than 867 million cellular connections and more than 70% cellular teledensity [1]. Also, on some major arterial roads, video cameras are deployed for surveillance purpose. The aim of this study is to assess feasibility of using these alternate sources to generate accurate traffic information for all the edges in a road network. The simulation results show that, even with large location error of 250-500 meters, edge level vehicle flow estimation with good accuracy (less than 10% error) is feasible using cellular network data. Using cellular network data alone, the edges can be classified as congested or uncongested. For edge level speed estimation, we propose a simple and novel approach for fusing widely available but erroneous flow data from cellular network with the spatially sparse but accurate flow-speed data from other sources (e.g. loop detectors or video cameras). The simulation results show that edge level speed estimation with good accuracy (less than 15% median error) is feasible using the proposed approach.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115417793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social power for privacy protected opportunistic networks 保护隐私的社会权力保护机会主义网络
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098697
Bernhard Distl, S. Neuhaus
Opportunistic networking poses a trade off. On the one hand, social links and the structure inherent in the opportunistic network are private information and should thus be protected. On the other hand, such information can be used to improve performance or security. We present an algorithm that can solve this dilemma: we can recognize pre-established social links among nodes without revealing private information, thus enabling privacy and performance and security. Our algorithm uses a hash-based approach for identity protection to reliably and efficiently detect existing social links in an anonymous environment. We implemented our algorithm in a smartphone application and evaluate its performance. Friendship detection time grows linearly with the number of friendships; for example, with 500 friendships, detection typically takes about 90 ms.
机会主义的人际关系网带来了一种权衡。一方面,机会主义网络中固有的社会联系和结构是私人信息,因此应该受到保护。另一方面,这些信息可用于提高性能或安全性。我们提出了一种可以解决这一困境的算法:我们可以在不泄露私人信息的情况下识别节点之间预先建立的社会联系,从而实现隐私、性能和安全。我们的算法使用基于哈希的身份保护方法来可靠有效地检测匿名环境中的现有社交链接。我们在一个智能手机应用程序中实现了我们的算法并评估了它的性能。友谊检测时间随友谊数量线性增长;例如,对于500个朋友,检测通常需要90毫秒。
{"title":"Social power for privacy protected opportunistic networks","authors":"Bernhard Distl, S. Neuhaus","doi":"10.1109/COMSNETS.2015.7098697","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098697","url":null,"abstract":"Opportunistic networking poses a trade off. On the one hand, social links and the structure inherent in the opportunistic network are private information and should thus be protected. On the other hand, such information can be used to improve performance or security. We present an algorithm that can solve this dilemma: we can recognize pre-established social links among nodes without revealing private information, thus enabling privacy and performance and security. Our algorithm uses a hash-based approach for identity protection to reliably and efficiently detect existing social links in an anonymous environment. We implemented our algorithm in a smartphone application and evaluate its performance. Friendship detection time grows linearly with the number of friendships; for example, with 500 friendships, detection typically takes about 90 ms.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance analysis of parameters affecting power efficiency in networks 影响网络功率效率的参数性能分析
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098690
Antar S.H. Abdul-Qawy, A. Potluri
Networking devices in ISP networks and data centers have been deployed in an over-provisioning and redundant manner to meet the worst case traffic loads and to quickly recover from failures. These devices are idle or semi-idle most of the time with full power consumption. Today, there is widespread interest in techniques that help in reducing energy waste and achieving high levels of energy-efficiency. Solutions proposed in literature are either topology-oriented (ESTOP) or traffic-oriented (ESTA). In this paper, we propose a Hybrid Heuristic for Green Networking (HHGN) that exploits the parameters considered in both ESTOP and ESTA to identify a subset of network elements that can be switched off such that the power saving is maximized under network connectivity and edge bandwidth utilization constraints. We introduce two new heuristics, w-BFLP (weighted Betweenness, Flow, Links, Power) and w-BFP (weighted Betweenness, Flow, Power), that sort the nodes and the edges respectively in increasing order of their importance in the topology. Nodes and edges are then switched off from the least important until the connectivity threshold or maximum bandwidth utilization constraint on the edges as specified by the user is reached. We compare our approach with ESTOP and ESTA for edge optimization in terms of power gain, mean utilization of edge bandwidth, percentage of sleeping edges, fairness index, trade-off between power gain and edge utilization, and increase in the length of re-computed paths for real ISP and FatTree topologies using different power models. Experimental results show that HHGN gives the best performance independent of power models, traffic matrices and topologies tested.
ISP网络和数据中心的网络设备都采用了过量冗余的部署方式,以满足最坏情况下的流量负荷,并能快速从故障中恢复。这些设备大部分时间处于空闲或半空闲状态,且功耗为满。今天,人们对有助于减少能源浪费和实现高水平能源效率的技术有着广泛的兴趣。文献中提出的解决方案要么是面向拓扑(ESTOP),要么是面向流量(ESTA)。在本文中,我们提出了一种绿色网络的混合启发式(HHGN),它利用ESTOP和ESTA中考虑的参数来确定可以关闭的网络元素子集,从而在网络连接和边缘带宽利用约束下最大限度地节省电力。我们引入了两个新的启发式算法w-BFLP (weighted Betweenness, Flow, Links, Power)和w-BFP (weighted Betweenness, Flow, Power),它们分别按照节点和边在拓扑中的重要性递增顺序进行排序。然后从最不重要的节点和边开始关闭,直到达到用户指定的边上的连接阈值或最大带宽利用约束。我们将我们的方法与ESTOP和ESTA在功率增益、边缘带宽的平均利用率、休眠边的百分比、公平性指数、功率增益和边缘利用率之间的权衡以及使用不同功率模型的真实ISP和FatTree拓扑重新计算路径长度的增加方面进行了比较。实验结果表明,HHGN在与功率模型、流量矩阵和拓扑无关的情况下都具有最佳性能。
{"title":"Performance analysis of parameters affecting power efficiency in networks","authors":"Antar S.H. Abdul-Qawy, A. Potluri","doi":"10.1109/COMSNETS.2015.7098690","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098690","url":null,"abstract":"Networking devices in ISP networks and data centers have been deployed in an over-provisioning and redundant manner to meet the worst case traffic loads and to quickly recover from failures. These devices are idle or semi-idle most of the time with full power consumption. Today, there is widespread interest in techniques that help in reducing energy waste and achieving high levels of energy-efficiency. Solutions proposed in literature are either topology-oriented (ESTOP) or traffic-oriented (ESTA). In this paper, we propose a Hybrid Heuristic for Green Networking (HHGN) that exploits the parameters considered in both ESTOP and ESTA to identify a subset of network elements that can be switched off such that the power saving is maximized under network connectivity and edge bandwidth utilization constraints. We introduce two new heuristics, w-BFLP (weighted Betweenness, Flow, Links, Power) and w-BFP (weighted Betweenness, Flow, Power), that sort the nodes and the edges respectively in increasing order of their importance in the topology. Nodes and edges are then switched off from the least important until the connectivity threshold or maximum bandwidth utilization constraint on the edges as specified by the user is reached. We compare our approach with ESTOP and ESTA for edge optimization in terms of power gain, mean utilization of edge bandwidth, percentage of sleeping edges, fairness index, trade-off between power gain and edge utilization, and increase in the length of re-computed paths for real ISP and FatTree topologies using different power models. Experimental results show that HHGN gives the best performance independent of power models, traffic matrices and topologies tested.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114235737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BlinkToSCoAP: An end-to-end security framework for the Internet of Things BlinkToSCoAP:物联网的端到端安全框架
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098708
G. Peretti, V. Lakkundi, M. Zorzi
The emergence of Internet of Things and the availability of inexpensive sensor devices and platforms capable of wireless communications enable a wide range of applications such as intelligent home and building automation, mobile healthcare, smart logistics, distributed monitoring, smart grids, energy management, asset tracking to name a few. These devices are expected to employ Constrained Application Protocol for the integration of such applications with the Internet, which includes User Datagram Protocol binding with Datagram Transport Layer Security protocol to provide end-to-end security. This paper presents a framework called BlinkToSCoAP, obtained through the integration of three software libraries implementing lightweight versions of DTLS, CoAP and 6LoWPAN protocols over TinyOS. Furthermore, a detailed experimental campaign is presented that evaluates the performance of DTLS security blocks. The experiments analyze BlinkToSCoAP messages exchanged between two Zolertia Z1 devices, allowing evaluations in terms of memory footprint, energy consumption, latency and packet overhead. The results obtained indicate that securing CoAP with DTLS in Internet of Things is certainly feasible without incurring much overhead.
物联网的出现以及具有无线通信能力的廉价传感器设备和平台的可用性使各种应用成为可能,例如智能家居和楼宇自动化、移动医疗保健、智能物流、分布式监控、智能电网、能源管理、资产跟踪等等。预计这些设备将采用约束应用协议将这些应用程序与Internet集成,其中包括用户数据报协议与数据报传输层安全协议绑定,以提供端到端安全性。本文提出了一个名为BlinkToSCoAP的框架,该框架通过集成在TinyOS上实现轻量级版本的DTLS、CoAP和6LoWPAN协议的三个软件库而获得。此外,还提出了一个详细的实验活动来评估DTLS安全块的性能。实验分析了两个Zolertia Z1设备之间交换的BlinkToSCoAP消息,允许在内存占用、能耗、延迟和数据包开销方面进行评估。结果表明,在物联网中使用DTLS对CoAP进行安全保护是可行的,而且不会产生太多的开销。
{"title":"BlinkToSCoAP: An end-to-end security framework for the Internet of Things","authors":"G. Peretti, V. Lakkundi, M. Zorzi","doi":"10.1109/COMSNETS.2015.7098708","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098708","url":null,"abstract":"The emergence of Internet of Things and the availability of inexpensive sensor devices and platforms capable of wireless communications enable a wide range of applications such as intelligent home and building automation, mobile healthcare, smart logistics, distributed monitoring, smart grids, energy management, asset tracking to name a few. These devices are expected to employ Constrained Application Protocol for the integration of such applications with the Internet, which includes User Datagram Protocol binding with Datagram Transport Layer Security protocol to provide end-to-end security. This paper presents a framework called BlinkToSCoAP, obtained through the integration of three software libraries implementing lightweight versions of DTLS, CoAP and 6LoWPAN protocols over TinyOS. Furthermore, a detailed experimental campaign is presented that evaluates the performance of DTLS security blocks. The experiments analyze BlinkToSCoAP messages exchanged between two Zolertia Z1 devices, allowing evaluations in terms of memory footprint, energy consumption, latency and packet overhead. The results obtained indicate that securing CoAP with DTLS in Internet of Things is certainly feasible without incurring much overhead.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114458516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Routing with adaptive flooding in heterogeneous mobile networks 异构移动网络中的自适应泛洪路由
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098694
A. Seetharam, Simon Heimlicher, J. Kurose, Wei Wei
In practice, Mobile Ad Hoc Networks (MANETs) must operate efficiently under a wide range of node mobility and link quality regimes. Stateful protocols such as OLSR are suitable for networks connected by stable paths, but are outperformed by stateless flooding in sparse and rapidly changing networks. Neither routing nor flooding alone perform well in heterogeneous networks comprised of both stable and highly dynamic components. Rather than design a new protocol for routing in heterogeneous mobile networks from scratch, we use an approach that leverages prior work by operating nodes individually as routers or flooders and switching mode in response to changing network conditions. We present two greedy algorithms, k-flood and adaptive-flood, that dynamically classify nodes as routers or flooders. Our simulations show that nodes can effectively adapt their individual operation as routers/flooders, achieving performance equivalent to, and in some cases significantly better than, that of network-wide routing or flooding alone.
在实践中,移动自组网(manet)必须在大范围的节点移动性和链路质量机制下高效运行。有状态协议(如OLSR)适用于由稳定路径连接的网络,但在稀疏和快速变化的网络中,无状态泛洪协议的性能要好得多。在由稳定和高动态组件组成的异构网络中,单独的路由和泛洪都不能很好地发挥作用。我们不是从零开始为异构移动网络中的路由设计一个新的协议,而是使用一种方法,利用先前的工作,将操作节点单独作为路由器或泛洪器,并根据不断变化的网络条件切换模式。提出了两种贪婪算法k-flood和adaptive-flood,可以动态地将节点划分为路由器或泛洪器。我们的模拟表明,节点可以有效地适应它们作为路由器/泛洪器的单独操作,实现与网络范围路由或泛洪器相同的性能,并且在某些情况下显着优于单独的性能。
{"title":"Routing with adaptive flooding in heterogeneous mobile networks","authors":"A. Seetharam, Simon Heimlicher, J. Kurose, Wei Wei","doi":"10.1109/COMSNETS.2015.7098694","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098694","url":null,"abstract":"In practice, Mobile Ad Hoc Networks (MANETs) must operate efficiently under a wide range of node mobility and link quality regimes. Stateful protocols such as OLSR are suitable for networks connected by stable paths, but are outperformed by stateless flooding in sparse and rapidly changing networks. Neither routing nor flooding alone perform well in heterogeneous networks comprised of both stable and highly dynamic components. Rather than design a new protocol for routing in heterogeneous mobile networks from scratch, we use an approach that leverages prior work by operating nodes individually as routers or flooders and switching mode in response to changing network conditions. We present two greedy algorithms, k-flood and adaptive-flood, that dynamically classify nodes as routers or flooders. Our simulations show that nodes can effectively adapt their individual operation as routers/flooders, achieving performance equivalent to, and in some cases significantly better than, that of network-wide routing or flooding alone.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123800078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Link pattern prediction in opportunistic networks with kernel regression 基于核回归的机会网络链路模式预测
Pub Date : 2015-05-04 DOI: 10.1109/COMSNETS.2015.7098684
Di Huang, Sanfeng Zhang, P. Hui, Zhou Chen
Opportunistic networks (OppNets) have emerged as prospective network architecture due to the popularization of mobile devices and little monetary cost. Routing is the major concern in designing OppNets. The main obstacle for routing protocol design in OppNets is little knowledge of future link patterns, which leads to blind and unpredictable packet forwarding behavior. To achieve better packet delivery rate, OppNets have to retain and deliver multiple copies of a message, which consumes more devices' energy and causes a lackluster OppNets service. To this end, we aim at the prediction of future link patterns to explore mobile connectivity. In this paper, we propose PreKR-the kernel regression based estimation framework for link pattern prediction. We initially extract best features that can represent the network evolution. Then we models historical structural features by kernel regression with the output of link probability. Experimental results show that our method outperforms state-of-the-art prediction methods up to 25%. We also find that both reachability prediction and high degree nodes prediction reach more than 90% accuracy. In the end, we propose heterogeneous architecture for PreKR deployment and investigate two prospective OppNets applications to show how PreKR improve system performance.
由于移动设备的普及和低成本,机会网络(OppNets)已成为未来的网络架构。路由是设计OppNets的主要关注点。OppNets中路由协议设计的主要障碍是对未来链路模式知之甚少,这导致了盲目和不可预测的数据包转发行为。为了达到更高的报文发送速率,OppNets必须保留和发送一个消息的多个副本,这消耗了更多的设备能量,导致OppNets的业务表现不佳。为此,我们的目标是预测未来的链接模式,以探索移动连接。本文提出了基于prekr核回归的链路模式预测估计框架。我们首先提取可以代表网络演化的最佳特征。然后利用核回归对历史结构特征进行建模,输出链路概率。实验结果表明,我们的方法比目前最先进的预测方法高出25%。我们还发现,可达性预测和高节点预测的准确率都在90%以上。最后,我们提出了PreKR部署的异构架构,并研究了两种潜在的OppNets应用,以展示PreKR如何提高系统性能。
{"title":"Link pattern prediction in opportunistic networks with kernel regression","authors":"Di Huang, Sanfeng Zhang, P. Hui, Zhou Chen","doi":"10.1109/COMSNETS.2015.7098684","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098684","url":null,"abstract":"Opportunistic networks (OppNets) have emerged as prospective network architecture due to the popularization of mobile devices and little monetary cost. Routing is the major concern in designing OppNets. The main obstacle for routing protocol design in OppNets is little knowledge of future link patterns, which leads to blind and unpredictable packet forwarding behavior. To achieve better packet delivery rate, OppNets have to retain and deliver multiple copies of a message, which consumes more devices' energy and causes a lackluster OppNets service. To this end, we aim at the prediction of future link patterns to explore mobile connectivity. In this paper, we propose PreKR-the kernel regression based estimation framework for link pattern prediction. We initially extract best features that can represent the network evolution. Then we models historical structural features by kernel regression with the output of link probability. Experimental results show that our method outperforms state-of-the-art prediction methods up to 25%. We also find that both reachability prediction and high degree nodes prediction reach more than 90% accuracy. In the end, we propose heterogeneous architecture for PreKR deployment and investigate two prospective OppNets applications to show how PreKR improve system performance.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130440844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2015 7th International Conference on Communication Systems and Networks (COMSNETS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1