首页 > 最新文献

2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

英文 中文
Real time vehicular traffic estimation using cellular infrastructure 基于蜂窝基础设施的实时车辆交通估计
Manish Chaturvedi, S. Srivastava
Availability of city wide accurate traffic information enables optimal flow of vehicles in a road network. Intelligent Transportation Systems (ITS) play major role in generating fine grained traffic information. However, in developing countries like India, limited ITS infrastructure is available and city wide manual traffic surveys are the basic source of traffic information. Manual traffic surveys are carried out by government agencies once every year or even less frequently and this instantaneous traffic information is extrapolated to presume traffic condition in a region for the whole year. The generated traffic information has limited application and government generally use it for planning transportation infrastructure development. Cellular infrastructure is widely deployed in India. As per TRAI Press Release No. 38/2013, there are more than 867 million cellular connections in India and cellular density is reported to be more than 70% [1]. Aim of our work is to study feasibility of using cellular infrastructure to generate useful traffic information. Our preliminary experiment with a vehicle carrying GSM modem shows that it is possible to track regions through which vehicle traverses just by using raw data about cell ID updates. The experiment also establishes need for a sophisticated map matching algorithm for determining exact route of a vehicle. We develop a map matching algorithm which can work with large location errors and show using simulations that it is possible to generate useful traffic information such as origin-destination of a trip, route and duration of a trip with in reasonable error bounds even with location error of 250-500 meters. However, for generating accurate travel time estimates for individual road segments, lower location error bounds are needed.
城市范围内的准确交通信息的可用性使道路网络中的车辆流量达到最佳状态。智能交通系统(ITS)在生成细粒度交通信息方面发挥着重要作用。然而,在印度等发展中国家,智能交通系统的基础设施有限,城市范围内的人工交通调查是交通信息的基本来源。人工交通调查由政府机构每年进行一次,甚至更少,这些即时交通信息被推断为一个地区全年的交通状况。产生的交通信息应用有限,政府一般将其用于规划交通基础设施的发展。手机基础设施在印度被广泛部署。根据TRAI第38/2013号新闻稿,印度有超过8.67亿蜂窝连接,蜂窝密度据报道超过70%[1]。我们的工作目的是研究使用蜂窝基础设施生成有用交通信息的可行性。我们对携带GSM调制解调器的车辆进行的初步实验表明,仅通过使用有关手机ID更新的原始数据就可以跟踪车辆所经过的区域。实验还表明,需要一种复杂的地图匹配算法来确定车辆的精确路线。我们开发了一种地图匹配算法,该算法可以在较大的位置误差下工作,并通过模拟显示,即使在250-500米的位置误差范围内,也可以在合理的误差范围内生成有用的交通信息,如旅行的始发目的地,路线和旅行持续时间。然而,为了对单个路段产生准确的行程时间估计,需要较低的位置误差范围。
{"title":"Real time vehicular traffic estimation using cellular infrastructure","authors":"Manish Chaturvedi, S. Srivastava","doi":"10.1109/ANTS.2013.6802859","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802859","url":null,"abstract":"Availability of city wide accurate traffic information enables optimal flow of vehicles in a road network. Intelligent Transportation Systems (ITS) play major role in generating fine grained traffic information. However, in developing countries like India, limited ITS infrastructure is available and city wide manual traffic surveys are the basic source of traffic information. Manual traffic surveys are carried out by government agencies once every year or even less frequently and this instantaneous traffic information is extrapolated to presume traffic condition in a region for the whole year. The generated traffic information has limited application and government generally use it for planning transportation infrastructure development. Cellular infrastructure is widely deployed in India. As per TRAI Press Release No. 38/2013, there are more than 867 million cellular connections in India and cellular density is reported to be more than 70% [1]. Aim of our work is to study feasibility of using cellular infrastructure to generate useful traffic information. Our preliminary experiment with a vehicle carrying GSM modem shows that it is possible to track regions through which vehicle traverses just by using raw data about cell ID updates. The experiment also establishes need for a sophisticated map matching algorithm for determining exact route of a vehicle. We develop a map matching algorithm which can work with large location errors and show using simulations that it is possible to generate useful traffic information such as origin-destination of a trip, route and duration of a trip with in reasonable error bounds even with location error of 250-500 meters. However, for generating accurate travel time estimates for individual road segments, lower location error bounds are needed.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115760363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Disaster-aware service provisioning by exploiting multipath routing with manycasting in telecom networks 利用电信网络中的多路径路由和多播提供灾难感知服务
S. Savas, F. Dikbiyik, M. F. Habib, B. Mukherjee
Disasters may cause large-area failures in high-capacity telecom networks, leading to huge data loss. Survivable service provisioning is crucial to minimize the effects of network / datacenter failures and maintain critical services in case of a disaster. We propose a novel disaster-aware service-provisioning scheme that multiplexes service over multiple paths destined to multiple servers/datacenters with manycasting. Our scheme maintains some bandwidth (i.e., reduced service) after a disaster failure vs. no service at all. Numerical examples show that our approach offers high level of survivability against link and node failures that may be caused by disasters and post-disaster failures at no extra cost compared to the other survivable schemes.
灾难可能导致大容量电信网络大面积故障,造成大量数据丢失。可生存的服务供应对于最小化网络/数据中心故障的影响以及在发生灾难时维护关键服务至关重要。我们提出了一种新的灾难感知服务供应方案,该方案使用多播技术在通往多个服务器/数据中心的多条路径上复用服务。我们的方案在灾难失败后与根本没有服务相比,保留了一些带宽(即减少的服务)。数值实例表明,与其他可生存方案相比,我们的方法在不增加成本的情况下,提供了高水平的可生存性,以应对可能由灾害和灾后故障引起的链路和节点故障。
{"title":"Disaster-aware service provisioning by exploiting multipath routing with manycasting in telecom networks","authors":"S. Savas, F. Dikbiyik, M. F. Habib, B. Mukherjee","doi":"10.1109/ANTS.2013.6802863","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802863","url":null,"abstract":"Disasters may cause large-area failures in high-capacity telecom networks, leading to huge data loss. Survivable service provisioning is crucial to minimize the effects of network / datacenter failures and maintain critical services in case of a disaster. We propose a novel disaster-aware service-provisioning scheme that multiplexes service over multiple paths destined to multiple servers/datacenters with manycasting. Our scheme maintains some bandwidth (i.e., reduced service) after a disaster failure vs. no service at all. Numerical examples show that our approach offers high level of survivability against link and node failures that may be caused by disasters and post-disaster failures at no extra cost compared to the other survivable schemes.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131396549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Hazard control algorithms for heterogenous multi-agent cloud-enabled robotic network 异构多智能体云机器人网络的危害控制算法
Siddharth Srivastava, Aritra Sarkar, B. S. Manoj
Robots exploring unknown terrains autonomously always face the threat of getting isolated or lost from the rest. Geo-coordination technologies such as GPS cannot be used in extra terrestrial situations. Therefore, an inbuilt mechanism is needed in the robot that helps to track the robot's position and prevents it from getting off the network's coverage. We define hazard-control as the task of executing a series of decisions for recovering lost robots and bringing them back to the robotic swarm network. For a swarm of robots, this task involves communicating with other robots in the system to make sure that all the robots are within the range of the multi-hop network formed by the robots. If one robot goes away of the robotic network, hazard-control algorithms help the robots to recover the lost robot back in the network. We propose three robot-centric hazard control algorithms that help to get the lost robot in a robotic swarm back in the network: (i) Random Motion algorithm, (ii) Variable Spiral algorithm, and (iii) Motion Reversal algorithm. We study the performance of the proposed algorithms, compared their efficiency and identify the scenarios where each algorithm is most suited.
自主探索未知地形的机器人总是面临着被孤立或与其他机器人失散的威胁。GPS等地理协调技术不能用于地外环境。因此,机器人需要一个内置的机制来帮助跟踪机器人的位置,并防止它脱离网络的覆盖范围。我们将危险控制定义为为找回丢失的机器人并将其带回机器人群网络而执行一系列决策的任务。对于一群机器人来说,该任务涉及到与系统中的其他机器人进行通信,以确保所有机器人都在机器人形成的多跳网络范围内。如果一个机器人离开了机器人网络,危险控制算法会帮助机器人在网络中找回丢失的机器人。我们提出了三种以机器人为中心的危险控制算法,以帮助在机器人群中丢失的机器人回到网络中:(i)随机运动算法,(ii)可变螺旋算法和(iii)运动反转算法。我们研究了所提出算法的性能,比较了它们的效率,并确定了每种算法最适合的场景。
{"title":"Hazard control algorithms for heterogenous multi-agent cloud-enabled robotic network","authors":"Siddharth Srivastava, Aritra Sarkar, B. S. Manoj","doi":"10.1109/ANTS.2013.6802882","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802882","url":null,"abstract":"Robots exploring unknown terrains autonomously always face the threat of getting isolated or lost from the rest. Geo-coordination technologies such as GPS cannot be used in extra terrestrial situations. Therefore, an inbuilt mechanism is needed in the robot that helps to track the robot's position and prevents it from getting off the network's coverage. We define hazard-control as the task of executing a series of decisions for recovering lost robots and bringing them back to the robotic swarm network. For a swarm of robots, this task involves communicating with other robots in the system to make sure that all the robots are within the range of the multi-hop network formed by the robots. If one robot goes away of the robotic network, hazard-control algorithms help the robots to recover the lost robot back in the network. We propose three robot-centric hazard control algorithms that help to get the lost robot in a robotic swarm back in the network: (i) Random Motion algorithm, (ii) Variable Spiral algorithm, and (iii) Motion Reversal algorithm. We study the performance of the proposed algorithms, compared their efficiency and identify the scenarios where each algorithm is most suited.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131315812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Disaster-aware data-center and content placement in cloud networks 云网络中的灾难感知数据中心和内容放置
Sifat Ferdousi, F. Dikbiyik, M. F. Habib, B. Mukherjee
Recent occurrences of disasters and targeted attacks have made disaster-resilient data-center network design an important issue. Network operators are investigating proactive and reactive measures to avoid huge data loss and service disruptions in case of a disaster. Disaster-aware data-center and content placement can mitigate the effects of such failures by avoiding placement in disaster-vulnerable locations. Compared to disaster-unaware approach, this approach can significantly reduce the risk, i.e., expected loss of content due to a disaster, in a cloud network.
最近发生的灾难和有针对性的攻击使得具有抗灾能力的数据中心网络设计成为一个重要问题。网络运营商正在研究主动和被动的措施,以避免在灾难发生时大量数据丢失和服务中断。能够感知灾难的数据中心和内容放置可以避免放置在易受灾难影响的位置,从而减轻此类故障的影响。与灾难不知情的方法相比,这种方法可以显著降低云网络中的风险,即由于灾难而导致的预期内容损失。
{"title":"Disaster-aware data-center and content placement in cloud networks","authors":"Sifat Ferdousi, F. Dikbiyik, M. F. Habib, B. Mukherjee","doi":"10.1109/ANTS.2013.6802881","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802881","url":null,"abstract":"Recent occurrences of disasters and targeted attacks have made disaster-resilient data-center network design an important issue. Network operators are investigating proactive and reactive measures to avoid huge data loss and service disruptions in case of a disaster. Disaster-aware data-center and content placement can mitigate the effects of such failures by avoiding placement in disaster-vulnerable locations. Compared to disaster-unaware approach, this approach can significantly reduce the risk, i.e., expected loss of content due to a disaster, in a cloud network.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115563297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Estimators for global information in mobile opportunistic network 移动机会网络中全局信息估计方法
Suvadip Batabyal, Parama Bhaumik
Lack of global knowledge in a delay tolerant network proves detrimental, for a replication based routing strategy, in terms of resource utilization. It has often been noticed that nodes keep on replicating a message although it has already been delivered to the destination since such information remains unknown to most of the nodes in the network. Moreover recovery mechanisms (like VACCINE for epidemic routing) take time to propagate and incur additional transmission overhead. Global information such as number of nodes in the network, node meeting schedule, and whether a message has already been delivered to the destination is vital for optimal network performance. In this paper we propose model for estimating some of these vital information and show that replication based routing algorithm like epidemic routing, can perform better with minimum resource utilization. First, we use a uniformly minimum variance unbiased estimator (UMVUE) to estimate the number of nodes in the network. Second, we estimate the number of replicas of any given message in the network, at any given instant (t). Third, we show that epidemic routing with a node population of N can perform best with only N/2 message replicas for any given message and that further replication only leads additional overhead without any performance improvement. We show the simulated results using random waypoint mobility model and Shanghai taxi trace.
对于基于复制的路由策略来说,就资源利用率而言,延迟容忍网络中缺乏全局知识是有害的。人们经常注意到,尽管消息已经传递到目的地,但节点仍在继续复制消息,因为网络中的大多数节点仍然不知道这些信息。此外,恢复机制(如用于流行病路由的疫苗)需要时间来传播并产生额外的传播开销。全局信息,如网络中的节点数量、节点会议安排以及消息是否已经传递到目的地,对于优化网络性能至关重要。在本文中,我们提出了一个估计这些重要信息的模型,并证明了基于复制的路由算法,如流行病路由,可以在最小的资源利用率下实现更好的性能。首先,我们使用一致最小方差无偏估计器(UMVUE)来估计网络中的节点数量。其次,我们估计了网络中任何给定消息在任何给定时刻(t)的副本数量。第三,我们表明,对于任何给定消息,节点群为N的流行路由在只有N/2个消息副本的情况下表现最佳,并且进一步的复制只会导致额外的开销,而不会带来任何性能改进。利用随机航路点移动模型和上海出租车轨迹给出了仿真结果。
{"title":"Estimators for global information in mobile opportunistic network","authors":"Suvadip Batabyal, Parama Bhaumik","doi":"10.1109/ANTS.2013.6802843","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802843","url":null,"abstract":"Lack of global knowledge in a delay tolerant network proves detrimental, for a replication based routing strategy, in terms of resource utilization. It has often been noticed that nodes keep on replicating a message although it has already been delivered to the destination since such information remains unknown to most of the nodes in the network. Moreover recovery mechanisms (like VACCINE for epidemic routing) take time to propagate and incur additional transmission overhead. Global information such as number of nodes in the network, node meeting schedule, and whether a message has already been delivered to the destination is vital for optimal network performance. In this paper we propose model for estimating some of these vital information and show that replication based routing algorithm like epidemic routing, can perform better with minimum resource utilization. First, we use a uniformly minimum variance unbiased estimator (UMVUE) to estimate the number of nodes in the network. Second, we estimate the number of replicas of any given message in the network, at any given instant (t). Third, we show that epidemic routing with a node population of N can perform best with only N/2 message replicas for any given message and that further replication only leads additional overhead without any performance improvement. We show the simulated results using random waypoint mobility model and Shanghai taxi trace.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129593368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using timers to switch-off TCAM banks in routers 使用定时器关闭路由器中的TCAM组
S. Raman, Kamakoti Veezhinathan, B. Venkat, G. Raina
Ternary Content Addressable Memory (TCAM) is the de-facto standard for route lookup in routers. While TCAMs support fast packet header lookup, they also consume high power. In this paper, we propose algorithms to save power in routers by dynamically switching-on/off TCAM banks based on their usage. Using three timers that monitor the usage of TCAMs, we remove unused entries and save TCAM space. As a result, unused TCAM banks in distributed linecards of routers can be switched-off. The algorithm used to switch-on the TCAM banks ensures that no packets are lost during header lookup, but introduces extra lookup delay. We show that by introducing parallel search for header lookup, the additional delay can be avoided. Simulations, conducted in software, serve to highlight that it is indeed possible to achieve power savings by using the proposed algorithms. The proposed methods are mainly applicable for campus and enterprise networks, where compaction of prefixes can be readily achieved.
三元内容可寻址存储器(TCAM)是路由器中路由查找的事实上的标准。虽然tcam支持快速的包头查找,但它们也消耗很高的功率。在本文中,我们提出了一种算法,通过根据TCAM组的使用情况动态地打开/关闭TCAM组来节省路由器的功耗。使用三个监视TCAM使用情况的计时器,我们删除未使用的条目并节省TCAM空间。因此,可以关闭路由器的分布式线路卡中未使用的TCAM组。用于打开TCAM库的算法确保在报头查找期间没有数据包丢失,但引入了额外的查找延迟。我们表明,通过引入并行搜索头查找,可以避免额外的延迟。在软件中进行的模拟表明,使用所提出的算法确实可以实现节能。本文提出的方法主要适用于校园网和企业网,在校园网和企业网中,可以很容易地实现前缀的压缩。
{"title":"Using timers to switch-off TCAM banks in routers","authors":"S. Raman, Kamakoti Veezhinathan, B. Venkat, G. Raina","doi":"10.1109/ANTS.2013.6802846","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802846","url":null,"abstract":"Ternary Content Addressable Memory (TCAM) is the de-facto standard for route lookup in routers. While TCAMs support fast packet header lookup, they also consume high power. In this paper, we propose algorithms to save power in routers by dynamically switching-on/off TCAM banks based on their usage. Using three timers that monitor the usage of TCAMs, we remove unused entries and save TCAM space. As a result, unused TCAM banks in distributed linecards of routers can be switched-off. The algorithm used to switch-on the TCAM banks ensures that no packets are lost during header lookup, but introduces extra lookup delay. We show that by introducing parallel search for header lookup, the additional delay can be avoided. Simulations, conducted in software, serve to highlight that it is indeed possible to achieve power savings by using the proposed algorithms. The proposed methods are mainly applicable for campus and enterprise networks, where compaction of prefixes can be readily achieved.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132042732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User control of quality of experience in home networks using SDN 用户对使用SDN家庭网络体验质量的控制
Himal Kumar, H. Gharakheili, V. Sivaraman
Home networks are becoming increasingly complex, with many household devices (PCs tablets, phones, media gateways, smart TVs) and diverse user applications (browsing, video streaming, peer-to-peer, VoIP, gaming) sharing the single broadband access link. In today's architecture the traffic streams compete for bandwidth on a best-effort basis, resulting in poor quality of experience for users. In this paper, we leverage the emerging paradigm of software defined networking (SDN) to enable the ISP to expose some controls to the users to manage service quality for specific devices and applications in their household. Our contributions are to develop an architecture and interface for delegation of such control to the user, and to demonstrate its value via experiments in a laboratory test-bed using three representative applications: video, web-browsing, and large downloads.
家庭网络正变得越来越复杂,许多家庭设备(pc、平板电脑、电话、媒体网关、智能电视)和各种用户应用(浏览、视频流、点对点、VoIP、游戏)共享单个宽带接入链路。在今天的架构中,流量流以最大努力为基础竞争带宽,导致用户体验质量差。在本文中,我们利用软件定义网络(SDN)的新兴范例,使ISP能够向用户公开一些控制,以管理其家庭中特定设备和应用程序的服务质量。我们的贡献是开发一种架构和接口,将这种控制委托给用户,并通过在实验室测试台上使用三个代表性应用程序(视频、web浏览和大型下载)的实验来展示其价值。
{"title":"User control of quality of experience in home networks using SDN","authors":"Himal Kumar, H. Gharakheili, V. Sivaraman","doi":"10.1109/ANTS.2013.6802847","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802847","url":null,"abstract":"Home networks are becoming increasingly complex, with many household devices (PCs tablets, phones, media gateways, smart TVs) and diverse user applications (browsing, video streaming, peer-to-peer, VoIP, gaming) sharing the single broadband access link. In today's architecture the traffic streams compete for bandwidth on a best-effort basis, resulting in poor quality of experience for users. In this paper, we leverage the emerging paradigm of software defined networking (SDN) to enable the ISP to expose some controls to the users to manage service quality for specific devices and applications in their household. Our contributions are to develop an architecture and interface for delegation of such control to the user, and to demonstrate its value via experiments in a laboratory test-bed using three representative applications: video, web-browsing, and large downloads.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Distance realization problem in Network Tomography: A heuristic approach 网络断层扫描中的距离实现问题:一种启发式方法
Vanniarajan Chellappan, K. Krithivasan
This paper proposes a heuristic approach for the distance realization problem, which arises in Network Tomography. Network Tomography is the study of estimating internal network structure and link-level performance from end-to-end measurements. A distance realization problem is to reconstruct a graph or topology from its distance matrix, i.e., the matrix containing the pairwise distances between the terminal nodes. The graph, thus realized from the pairwise distances of terminal nodes, can either be a tree or a general graph. There are efficient polynomial algorithms developed for the case of tree realization. However, the problem of finding optimal realization (i.e., the total length of the graph realized is minimum) of distance matrix for a general graph is shown to be NP-hard. Our proposed heuristic approach for distance realization consists of three stages: (i) find a closer tree realizable distance matrix based on the shortest paths, (ii) construct a tree and (iii) fix the differences between the tree realizable distance matrix and the original distance matrix. It also attempts to maximize the `entropy of betweenness-centrality' measure in the network while satisfying the distance constraints.
针对网络层析成像中出现的距离实现问题,提出了一种启发式方法。网络断层扫描是从端到端测量估计内部网络结构和链路级性能的研究。距离实现问题是从距离矩阵重构图或拓扑,即包含终端节点之间成对距离的矩阵。通过终端节点的成对距离实现的图既可以是树图,也可以是一般图。对于树的实现,已经开发出了高效的多项式算法。然而,对于一般图,寻找距离矩阵的最优实现(即实现的图的总长度最小)的问题是np困难的。我们提出的启发式距离实现方法包括三个阶段:(i)基于最短路径找到更接近的树可实现距离矩阵,(ii)构造树,(iii)修复树可实现距离矩阵与原始距离矩阵之间的差异。它还试图在满足距离约束的情况下最大化网络中的“中间性-中心性熵”度量。
{"title":"Distance realization problem in Network Tomography: A heuristic approach","authors":"Vanniarajan Chellappan, K. Krithivasan","doi":"10.1109/ANTS.2013.6802848","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802848","url":null,"abstract":"This paper proposes a heuristic approach for the distance realization problem, which arises in Network Tomography. Network Tomography is the study of estimating internal network structure and link-level performance from end-to-end measurements. A distance realization problem is to reconstruct a graph or topology from its distance matrix, i.e., the matrix containing the pairwise distances between the terminal nodes. The graph, thus realized from the pairwise distances of terminal nodes, can either be a tree or a general graph. There are efficient polynomial algorithms developed for the case of tree realization. However, the problem of finding optimal realization (i.e., the total length of the graph realized is minimum) of distance matrix for a general graph is shown to be NP-hard. Our proposed heuristic approach for distance realization consists of three stages: (i) find a closer tree realizable distance matrix based on the shortest paths, (ii) construct a tree and (iii) fix the differences between the tree realizable distance matrix and the original distance matrix. It also attempts to maximize the `entropy of betweenness-centrality' measure in the network while satisfying the distance constraints.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126342414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Time-domain and frequency-domain muting schemes for interference co-ordination in LTE heterogeneous networks LTE异构网络中干扰协调的时域和频域抑制方案
N. Arulselvan, Manjari Chhawchharia, Moushumi Sen
The need for Inter-cell Interference Coordination (ICIC) schemes in LTE heterogeneous networks, is well elucidated in literature [1]. We consider distributed scheduling mechanisms so that multiple base-station vendors can co-exist. Moreover, in legacy LTE networks, fast timescale coordination across base-stations may not be possible due to the inherent backhaul latency. In such a framework, we study the relative performance of frequency-domain and time-domain interference coordination schemes. We also compare the performance of legacy users who are agnostic to the ICIC scheme employed by the network, with users who can intelligently report channel measurements, depending on the param-eters used in the ICIC scheme. Surprisingly, we find that network can efficiently compensate for the legacy user's inadequacy in reporting. Overall, these studies can help the cellular operator to prioritize the strategy for network evolution and decide the timelines to offer advanced user equipment.
文献[1]很好地阐明了LTE异构网络中对小区间干扰协调(ICIC)方案的需求。我们考虑分布式调度机制,使多个基站供应商可以共存。此外,在传统的LTE网络中,由于固有的回程延迟,跨基站的快速时间尺度协调可能不可能实现。在此框架下,我们研究了频域和时域干涉协调方案的相对性能。我们还比较了对网络采用的ICIC方案不可知的遗留用户与可以根据ICIC方案中使用的参数智能报告信道测量的用户的性能。令人惊讶的是,我们发现网络可以有效地弥补遗留用户在报告方面的不足。总的来说,这些研究可以帮助蜂窝运营商优先考虑网络演进策略,并决定提供先进用户设备的时间表。
{"title":"Time-domain and frequency-domain muting schemes for interference co-ordination in LTE heterogeneous networks","authors":"N. Arulselvan, Manjari Chhawchharia, Moushumi Sen","doi":"10.1109/ANTS.2013.6802875","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802875","url":null,"abstract":"The need for Inter-cell Interference Coordination (ICIC) schemes in LTE heterogeneous networks, is well elucidated in literature [1]. We consider distributed scheduling mechanisms so that multiple base-station vendors can co-exist. Moreover, in legacy LTE networks, fast timescale coordination across base-stations may not be possible due to the inherent backhaul latency. In such a framework, we study the relative performance of frequency-domain and time-domain interference coordination schemes. We also compare the performance of legacy users who are agnostic to the ICIC scheme employed by the network, with users who can intelligently report channel measurements, depending on the param-eters used in the ICIC scheme. Surprisingly, we find that network can efficiently compensate for the legacy user's inadequacy in reporting. Overall, these studies can help the cellular operator to prioritize the strategy for network evolution and decide the timelines to offer advanced user equipment.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126517191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Lightweight IBE scheme for Wireless Sensor nodes 无线传感器节点的轻量级IBE方案
B. S. Adiga, M. Rajan, Ravishankara Shastry, V. Shivraj, P. Balamuralidhar
Application of cryptography for secure Wireless Sensor Networks poses challenging problems because all the cryptographic algorithms are computationally intensive and wireless nodes have limited resources. In this paper, we describe an Identity Based Elliptic Curve Cryptosystem (IBE-ECC) based on Tate pairing which is lightweight without any Public Key Infrastructure (PKI) and no key exchanges. In addition, we propose a novel lightweight IBE-ECC scheme in which encryption is performed with no Tate pairing (computationally intensive) and is used only in decryption. This scheme is relevant for wireless nodes and in particular for Internet of Things (IoT) framework, wherein the wireless nodes do only message encryption, whereas the decryption is delegated to centralized servers or Gateways. We have also implemented our proposed scheme on a mobile phone with android platform for performance analysis. We observed that our proposed IBE-ECC scheme outperforms the existing IBE scheme in terms of complexity and efficiency of operation. Further, our scheme is based on super singular elliptic curves E/GF(p) where p is a special prime of the form Crandall primes. For such primes modular reduction can be implemented efficiently fast using Mohan-Adiga algorithm.
由于所有的加密算法都是计算密集型的,并且无线节点的资源有限,因此加密技术在安全无线传感器网络中的应用具有挑战性。本文描述了一种基于Tate对的基于身份的椭圆曲线密码系统(IBE-ECC),它是轻量级的,不需要任何公钥基础设施(PKI)和密钥交换。此外,我们提出了一种新的轻量级IBE-ECC方案,其中加密执行时没有Tate配对(计算密集型),仅用于解密。该方案适用于无线节点,特别是物联网(IoT)框架,其中无线节点只进行消息加密,而解密则委托给集中的服务器或网关。我们还在android平台的手机上实现了我们提出的方案进行性能分析。我们观察到,我们提出的IBE- ecc方案在操作的复杂性和效率方面优于现有的IBE方案。进一步,我们的方案是基于超奇异椭圆曲线E/GF(p),其中p是一个特殊素数,其形式为Crandall素数。对于这类素数,采用Mohan-Adiga算法可以快速高效地实现模约简。
{"title":"Lightweight IBE scheme for Wireless Sensor nodes","authors":"B. S. Adiga, M. Rajan, Ravishankara Shastry, V. Shivraj, P. Balamuralidhar","doi":"10.1109/ANTS.2013.6802866","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802866","url":null,"abstract":"Application of cryptography for secure Wireless Sensor Networks poses challenging problems because all the cryptographic algorithms are computationally intensive and wireless nodes have limited resources. In this paper, we describe an Identity Based Elliptic Curve Cryptosystem (IBE-ECC) based on Tate pairing which is lightweight without any Public Key Infrastructure (PKI) and no key exchanges. In addition, we propose a novel lightweight IBE-ECC scheme in which encryption is performed with no Tate pairing (computationally intensive) and is used only in decryption. This scheme is relevant for wireless nodes and in particular for Internet of Things (IoT) framework, wherein the wireless nodes do only message encryption, whereas the decryption is delegated to centralized servers or Gateways. We have also implemented our proposed scheme on a mobile phone with android platform for performance analysis. We observed that our proposed IBE-ECC scheme outperforms the existing IBE scheme in terms of complexity and efficiency of operation. Further, our scheme is based on super singular elliptic curves E/GF(p) where p is a special prime of the form Crandall primes. For such primes modular reduction can be implemented efficiently fast using Mohan-Adiga algorithm.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121490357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1