首页 > 最新文献

38th Annual IEEE Conference on Local Computer Networks - Workshops最新文献

英文 中文
Performance evaluation for scientific workflow interoperability 科学工作流互操作性的性能评估
Pub Date : 2013-10-01 DOI: 10.1109/LCNW.2013.6758536
Ahmed Alqaoud
Scientific workflow is a special type of workflow for scientists to formalize and structure complex e-Science applications. Many workflow systems have been released to solve problems in special domains. In large collaborative projects, it is often necessary to recognize the heterogeneous workflow systems already in use by various partners and any potential collaboration between these systems requires workflow interoperability. Publish/Subscribe Scientific Workflow Interoperability Framework (PS-SWIF) approach was proposed by author to achieve workflow interoperability among workflow systems. This paper evaluates the PS-SWIF approach and its system to achieve workflow interoperability using Web Services with asynchronous notification messages represented by WS-Eventing standard. In this paper, the author presents quantitative measurements that show that PS-SWIF can scale in a workflow heterogeneous distributed environment by assessing the scalability of the system in terms of notification message loads using large number of machines and different sizes of datasets the system can manage.
科学工作流是一种特殊的工作流类型,用于科学家形式化和结构化复杂的电子科学应用。已经发布了许多工作流系统来解决特定领域的问题。在大型协作项目中,通常有必要识别各种合作伙伴已经使用的异构工作流系统,并且这些系统之间的任何潜在协作都需要工作流互操作性。为了实现工作流系统之间的工作流互操作性,作者提出了发布/订阅科学工作流互操作性框架(PS-SWIF)方法。本文评估了PS-SWIF方法及其系统使用Web服务实现工作流互操作性,并采用ws - events标准表示异步通知消息。在本文中,作者提出了定量测量,表明PS-SWIF可以在工作流异构分布式环境中进行扩展,通过使用大量机器和系统可以管理的不同大小的数据集来评估系统的可扩展性。
{"title":"Performance evaluation for scientific workflow interoperability","authors":"Ahmed Alqaoud","doi":"10.1109/LCNW.2013.6758536","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758536","url":null,"abstract":"Scientific workflow is a special type of workflow for scientists to formalize and structure complex e-Science applications. Many workflow systems have been released to solve problems in special domains. In large collaborative projects, it is often necessary to recognize the heterogeneous workflow systems already in use by various partners and any potential collaboration between these systems requires workflow interoperability. Publish/Subscribe Scientific Workflow Interoperability Framework (PS-SWIF) approach was proposed by author to achieve workflow interoperability among workflow systems. This paper evaluates the PS-SWIF approach and its system to achieve workflow interoperability using Web Services with asynchronous notification messages represented by WS-Eventing standard. In this paper, the author presents quantitative measurements that show that PS-SWIF can scale in a workflow heterogeneous distributed environment by assessing the scalability of the system in terms of notification message loads using large number of machines and different sizes of datasets the system can manage.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121294105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy in overlay-based smart traffic systems 基于覆盖的智能交通系统中的隐私
Pub Date : 2013-10-01 DOI: 10.1109/LCNW.2013.6758531
Martin Florian, I. Baumgart
For smart traffic applications like dynamic route planning, communication between traffic participants is of high importance. Traditional communication architectures for smart traffic are centralized, which leads to major privacy concerns since every service provider gains a global view on the mobility behavior of all participating nodes. Recent publications on decentralized alternatives often claim to remedy privacy issues by getting rid of the centralized entity. In this paper, we test this assumption thoroughly, evaluating the privacy-aspects of overlay-based geocast systems in comparison to centralized approaches. To this means, we define an attacker model and describe two different attacks on privacy. Through simulation we show that without additional protection mechanisms, the difficulty for placing surveillance on individual nodes is low. Based on the results, we discuss possible improvements and alternative communication approaches.
在动态路径规划等智能交通应用中,交通参与者之间的通信非常重要。智能交通的传统通信架构是集中式的,这导致了主要的隐私问题,因为每个服务提供商都可以获得所有参与节点的移动行为的全局视图。最近关于去中心化替代方案的出版物经常声称通过摆脱中心化实体来解决隐私问题。在本文中,我们彻底验证了这一假设,与集中式方法相比,评估了基于覆盖的地质浇筑系统的隐私方面。为此,我们定义了一个攻击者模型,并描述了两种不同的隐私攻击。通过仿真,我们发现在没有额外保护机制的情况下,对单个节点进行监视的难度很低。基于结果,我们讨论了可能的改进和替代通信方法。
{"title":"Privacy in overlay-based smart traffic systems","authors":"Martin Florian, I. Baumgart","doi":"10.1109/LCNW.2013.6758531","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758531","url":null,"abstract":"For smart traffic applications like dynamic route planning, communication between traffic participants is of high importance. Traditional communication architectures for smart traffic are centralized, which leads to major privacy concerns since every service provider gains a global view on the mobility behavior of all participating nodes. Recent publications on decentralized alternatives often claim to remedy privacy issues by getting rid of the centralized entity. In this paper, we test this assumption thoroughly, evaluating the privacy-aspects of overlay-based geocast systems in comparison to centralized approaches. To this means, we define an attacker model and describe two different attacks on privacy. Through simulation we show that without additional protection mechanisms, the difficulty for placing surveillance on individual nodes is low. Based on the results, we discuss possible improvements and alternative communication approaches.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting short 802.11 sessions from RADIUS usage data 从RADIUS使用数据预测短的802.11会话
Pub Date : 2013-10-01 DOI: 10.1109/LCNW.2013.6758491
Anisa Allahdadi, Ricardo Morla, Ana Aguiar, Jaime S. Cardoso
The duration of 802.11 user sessions has been widely studied in the context of analyzing user behavior and mobility. Short (smaller-than-5-minutes) sessions are never used or characterized in these analyses as they are unrelated to user behavior and considered as artifacts introduced by the wireless network. In this paper we characterize short 802.11 sessions as recorded through RADIUS authentication. We show that 50% of access points have 70% of smaller than 5 minutes sessions in a 5 months trace from the Eduroam academic wireless network in the University of Porto. Exactly because they are artifacts introduced by the network, short sessions are an important indicator for network management and the quality of the wireless access. Network managers typically do not collect and process session information but rely on SNMP to provide summaries of 802.11 usage data. We develop a modeling framework to provide predictions for the number of short sessions from SNMP data. We model the data stream of each access point using two methods of regression and one classification technique. We evaluate these models based on short session prediction accuracy. The models are trained on the 5 months data and the best results show prediction accuracy of 95.27% in polynomial regression at degree of 3.
在分析用户行为和移动性的背景下,802.11用户会话的持续时间得到了广泛的研究。在这些分析中从不使用或描述短(小于5分钟)会话,因为它们与用户行为无关,并且被认为是无线网络引入的工件。在本文中,我们描述了通过RADIUS认证记录的短802.11会话。通过对波尔图大学Eduroam学术无线网络的5个月追踪,我们发现50%的接入点有70%的会话时间小于5分钟。正是由于短会话是网络引入的产物,所以短会话是网络管理和无线接入质量的重要指标。网络管理器通常不收集和处理会话信息,而是依靠SNMP提供802.11使用数据的摘要。我们开发了一个建模框架来根据SNMP数据预测短会话的数量。我们使用两种回归方法和一种分类技术对每个接入点的数据流建模。我们基于短时会话预测精度来评估这些模型。模型在5个月的数据上进行训练,在3次多项式回归下,预测准确率达到95.27%。
{"title":"Predicting short 802.11 sessions from RADIUS usage data","authors":"Anisa Allahdadi, Ricardo Morla, Ana Aguiar, Jaime S. Cardoso","doi":"10.1109/LCNW.2013.6758491","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758491","url":null,"abstract":"The duration of 802.11 user sessions has been widely studied in the context of analyzing user behavior and mobility. Short (smaller-than-5-minutes) sessions are never used or characterized in these analyses as they are unrelated to user behavior and considered as artifacts introduced by the wireless network. In this paper we characterize short 802.11 sessions as recorded through RADIUS authentication. We show that 50% of access points have 70% of smaller than 5 minutes sessions in a 5 months trace from the Eduroam academic wireless network in the University of Porto. Exactly because they are artifacts introduced by the network, short sessions are an important indicator for network management and the quality of the wireless access. Network managers typically do not collect and process session information but rely on SNMP to provide summaries of 802.11 usage data. We develop a modeling framework to provide predictions for the number of short sessions from SNMP data. We model the data stream of each access point using two methods of regression and one classification technique. We evaluate these models based on short session prediction accuracy. The models are trained on the 5 months data and the best results show prediction accuracy of 95.27% in polynomial regression at degree of 3.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132664812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Discrete power-based Distance Clustering for anti-collision schemes in RFID systems 基于离散功率的RFID系统防碰撞距离聚类
Pub Date : 2013-10-01 DOI: 10.1109/LCNW.2013.6758525
W. Alsalih
Radio Frequency IDentification (RFID) has enabled a wide range of automated tracking and monitoring applications. However, RFID tags share a wireless communication medium to deliver their information to the RFID reader which results in tag collisions and, hence, a significant energy consumption and delay in the interrogation process. Handling tag collisions is a challenging task because of the limited capabilities available to passive RFID tags. In classical anti-collision schemes, the RFID reader interrogates all tags in its range at once using its maximum transmission range, which results in many collisions and wastes energy. In a previous work, we proposed a novel approach in which the interrogation zone of an RFID reader is divided into a number of ring-shaped clusters, and tags of different clusters are read separately. We also proposed a method that finds the optimal clustering scheme assuming an ideal setting in which the transmission range of the RFID reader can be tuned with high precision. In this paper, we consider a more practical scenario in which the RFID reader has a finite set of discrete transmission ranges rather than continuous ones. This suits currently existing commercial RFID readers that come with configurable output power. We present a delay mathematical analysis for this optimization problem and devise an algorithm that finds the optimal clustering efficiently. The proposed approach can be integrated with any existing anti-collision scheme to improve its performance and, hence, meet the demand of large scale RFID applications. Simulation results show that our approach is able to make significant improvements in saving energy and time by reducing collisions.
射频识别(RFID)已经实现了广泛的自动跟踪和监控应用。然而,RFID标签共享无线通信介质来将其信息传递给RFID阅读器,这导致标签碰撞,因此,在询问过程中消耗了大量的能量和延迟。由于无源RFID标签的功能有限,处理标签碰撞是一项具有挑战性的任务。在传统的防碰撞方案中,RFID读写器使用最大传输距离一次性询问其范围内的所有标签,这导致了许多碰撞和浪费能量。在之前的工作中,我们提出了一种新的方法,该方法将RFID阅读器的询问区划分为多个环形簇,并分别读取不同簇的标签。我们还提出了一种方法,该方法假设一个理想的设置,在该设置下RFID阅读器的传输范围可以高精度地调谐,从而找到最优聚类方案。在本文中,我们考虑了一个更实际的场景,其中RFID阅读器具有有限的离散传输范围而不是连续的传输范围。这适用于当前具有可配置输出功率的商用RFID读取器。本文对这一优化问题进行了延迟数学分析,并设计了一种能有效找到最优聚类的算法。所提出的方法可以与任何现有的防碰撞方案集成,以提高其性能,从而满足大规模RFID应用的需求。仿真结果表明,通过减少碰撞,我们的方法在节省能量和时间方面取得了显著的进步。
{"title":"Discrete power-based Distance Clustering for anti-collision schemes in RFID systems","authors":"W. Alsalih","doi":"10.1109/LCNW.2013.6758525","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758525","url":null,"abstract":"Radio Frequency IDentification (RFID) has enabled a wide range of automated tracking and monitoring applications. However, RFID tags share a wireless communication medium to deliver their information to the RFID reader which results in tag collisions and, hence, a significant energy consumption and delay in the interrogation process. Handling tag collisions is a challenging task because of the limited capabilities available to passive RFID tags. In classical anti-collision schemes, the RFID reader interrogates all tags in its range at once using its maximum transmission range, which results in many collisions and wastes energy. In a previous work, we proposed a novel approach in which the interrogation zone of an RFID reader is divided into a number of ring-shaped clusters, and tags of different clusters are read separately. We also proposed a method that finds the optimal clustering scheme assuming an ideal setting in which the transmission range of the RFID reader can be tuned with high precision. In this paper, we consider a more practical scenario in which the RFID reader has a finite set of discrete transmission ranges rather than continuous ones. This suits currently existing commercial RFID readers that come with configurable output power. We present a delay mathematical analysis for this optimization problem and devise an algorithm that finds the optimal clustering efficiently. The proposed approach can be integrated with any existing anti-collision scheme to improve its performance and, hence, meet the demand of large scale RFID applications. Simulation results show that our approach is able to make significant improvements in saving energy and time by reducing collisions.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130324869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Interference-aware multipath routing protocols for mobile ad hoc networks 移动自组织网络的干扰感知多路径路由协议
Pub Date : 2013-10-01 DOI: 10.1109/LCNW.2013.6758541
Eman S. Alwadiyeh, Ala' F. A. Aburumman
Routing is considered as one of the most critical research issues in the area of mobile ad hoc networks (MANETs), where it plays the main role in determining the overall throughput and the delivery ratio in the mobile networks. This paper proposes two on-demand multipath routing protocols. Efficient, Stable, Disjoint Multipath Routing protocol (ESDMR) and Efficient, Disjoint Multipath Routing protocol (EDMR), the main goal of the proposed routing protocols is to reduce the influence of interference between the selected node-disjoint multipath scheme, by selecting a node-disjoint routes with the minimal interference between them. In addition, both of the proposed protocols used a new proposed technique that aims to reduce the control packets overhead, while it enables the destination node of collecting the required information. Simulation results show that the proposed routing protocols have a higher delivery rate and higher throughput compared with the ones in Split multipath routing protocol (SMR). The significant improvement in packet delivery ratio resulted mainly from reducing the impact of hidden terminal problem. While, increasing the number of available channels between the selected disjoint routes is the main reason for the dramatic improvement in throughput. The efficiency of the proposed protocols and SMR protocol is evaluated by GloMoSim simulator.
路由是移动自组织网络(manet)中最关键的研究问题之一,它对移动网络的总体吞吐量和传输率起着重要的决定作用。本文提出了两种按需多路径路由协议。高效、稳定、不相交多路径路由协议(ESDMR)和高效、不相交多路径路由协议(EDMR),提出的路由协议的主要目标是通过选择节点间干扰最小的不相交路由来减少所选节点间不相交多路径方案之间干扰的影响。此外,这两种协议都使用了一种新的提议技术,旨在减少控制数据包的开销,同时使目标节点能够收集所需的信息。仿真结果表明,与分裂多路径路由协议(SMR)相比,所提出的路由协议具有更高的传输速率和吞吐量。数据包传输率的显著提高主要是由于减少了终端隐藏问题的影响。然而,增加所选不相交路由之间的可用通道数量是吞吐量显著提高的主要原因。利用GloMoSim仿真器对所提协议和SMR协议的效率进行了评估。
{"title":"Interference-aware multipath routing protocols for mobile ad hoc networks","authors":"Eman S. Alwadiyeh, Ala' F. A. Aburumman","doi":"10.1109/LCNW.2013.6758541","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758541","url":null,"abstract":"Routing is considered as one of the most critical research issues in the area of mobile ad hoc networks (MANETs), where it plays the main role in determining the overall throughput and the delivery ratio in the mobile networks. This paper proposes two on-demand multipath routing protocols. Efficient, Stable, Disjoint Multipath Routing protocol (ESDMR) and Efficient, Disjoint Multipath Routing protocol (EDMR), the main goal of the proposed routing protocols is to reduce the influence of interference between the selected node-disjoint multipath scheme, by selecting a node-disjoint routes with the minimal interference between them. In addition, both of the proposed protocols used a new proposed technique that aims to reduce the control packets overhead, while it enables the destination node of collecting the required information. Simulation results show that the proposed routing protocols have a higher delivery rate and higher throughput compared with the ones in Split multipath routing protocol (SMR). The significant improvement in packet delivery ratio resulted mainly from reducing the impact of hidden terminal problem. While, increasing the number of available channels between the selected disjoint routes is the main reason for the dramatic improvement in throughput. The efficiency of the proposed protocols and SMR protocol is evaluated by GloMoSim simulator.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123307194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
MaPIR: Mapping-based private information retrieval for location privacy in LBISs MaPIR:基于映射的lbi位置隐私私有信息检索
Pub Date : 2013-10-01 DOI: 10.1109/LCNW.2013.6758539
P. Wightman, M. Zurbarán, Miguel E. Rodríguez, M. Labrador
The popularization of Location-Based Services (LBSs) has brought along benefits for users and service provider, in terms of improved quality of existing services and a better user experience. At the same time, location privacy has become one of the most critical concerns for ensuring users' right to protection. Despite the fact that one of the best ways to protect the location information is not to reveal it, there are advantages on using this information to personalize services, however it is necessary to guarantee its protection. Private Information Retrieval is a technique that creates a common language between users and service provider so that external actors cannot understand most of the information being transferred. This paper introduces MaPIR, a mapping-based private information retrieval technique that uses mathematically generated mapping to create redundancy in order to provide multiple answers to a user with an undistinguishable location. This technique is decentralized and focuses on Point of Interest Search-based application, not on tracking services. For performance evaluation, were compared in two scenarios MaPIR, a regular spatial query and the Dummy Query technique, the results show that MaPIR takes only half the time of regular geographical queries on database processing, and 5 times less than the Dummy Query technique, while providing a similar level of redundancy.
基于位置的服务(lbs)的普及为用户和服务提供商带来了好处,既提高了现有服务的质量,又改善了用户体验。同时,位置隐私也成为保障用户隐私权的关键问题之一。尽管保护位置信息的最佳方法之一是不泄露它,但使用这些信息进行个性化服务有其优势,但有必要确保其受到保护。私有信息检索是一种技术,它在用户和服务提供者之间创建一种公共语言,以便外部参与者无法理解正在传输的大多数信息。MaPIR是一种基于映射的私有信息检索技术,它使用数学生成的映射来创建冗余,以便为具有不可区分位置的用户提供多个答案。这种技术是去中心化的,专注于基于兴趣点搜索的应用程序,而不是跟踪服务。为了进行性能评价,比较了MaPIR在常规空间查询和虚拟查询两种场景下的性能,结果表明MaPIR在数据库处理上只花费常规地理查询一半的时间,比虚拟查询技术少5倍,同时提供相似的冗余水平。
{"title":"MaPIR: Mapping-based private information retrieval for location privacy in LBISs","authors":"P. Wightman, M. Zurbarán, Miguel E. Rodríguez, M. Labrador","doi":"10.1109/LCNW.2013.6758539","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758539","url":null,"abstract":"The popularization of Location-Based Services (LBSs) has brought along benefits for users and service provider, in terms of improved quality of existing services and a better user experience. At the same time, location privacy has become one of the most critical concerns for ensuring users' right to protection. Despite the fact that one of the best ways to protect the location information is not to reveal it, there are advantages on using this information to personalize services, however it is necessary to guarantee its protection. Private Information Retrieval is a technique that creates a common language between users and service provider so that external actors cannot understand most of the information being transferred. This paper introduces MaPIR, a mapping-based private information retrieval technique that uses mathematically generated mapping to create redundancy in order to provide multiple answers to a user with an undistinguishable location. This technique is decentralized and focuses on Point of Interest Search-based application, not on tracking services. For performance evaluation, were compared in two scenarios MaPIR, a regular spatial query and the Dummy Query technique, the results show that MaPIR takes only half the time of regular geographical queries on database processing, and 5 times less than the Dummy Query technique, while providing a similar level of redundancy.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116188437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
QoS analysis and evaluations: Improving cellular-based distance education QoS分析与评价:改进基于蜂窝的远程教育
Pub Date : 2013-10-01 DOI: 10.1109/LCNW.2013.6758493
Farnaz Farid, S. Shahrestani, Chun Ruan
Mobile broadband technologies are now an important part of the communication infrastructure even for most of the developing world. These technologies can potentially play an important role in improving the socioeconomic status of rural areas. However, adaptation of these technologies for provision of relevant multimedia services faces major challenges. Perhaps, Quality of Service (QoS) issues still tops the list of such challenges. In this work we study how to evaluate the QoS of cellular-based systems focusing on an application perspective. We quantify the QoS levels for different traffic models using application and network related parameters to identify the most suitable configuration for running multimedia-based services. More specifically, our analysis is based on considering a unified measure combining key QoS metrics such as packet loss, and delay. For evaluation purposes, we also investigate the QoS issues of deploying a distance education platform running over UMTS cellular systems. The QoS issues related to the deployment of multimedia services in cellular technologies are then considered and analyzed in detail through simulation studies. The results show that by inclusion of the communication technology and application related parameters along with the number of users in QoS evaluations, better performing network configurations can be readily selected. This is achieved, through our proposed application-based QoS evaluation scheme that is based on combining various related measures. The proposed scheme is shown to be particularly beneficial for evaluating and improving QoS for multimedia-based heterogeneous networks.
移动宽带技术现在是通信基础设施的重要组成部分,甚至对大多数发展中国家也是如此。这些技术可能在改善农村地区的社会经济地位方面发挥重要作用。然而,改编这些技术以提供相关的多媒体服务面临着重大挑战。也许,服务质量(QoS)问题仍然是此类挑战的首要问题。在这项工作中,我们研究了如何从应用的角度来评估基于蜂窝的系统的QoS。我们使用应用程序和网络相关参数量化不同流量模型的QoS级别,以确定运行基于多媒体的服务的最合适配置。更具体地说,我们的分析是基于考虑结合关键QoS指标(如数据包丢失和延迟)的统一度量。为了评估目的,我们还研究了部署在UMTS蜂窝系统上运行的远程教育平台的QoS问题。然后通过仿真研究,对蜂窝技术中多媒体业务部署相关的QoS问题进行了详细的考虑和分析。结果表明,将通信技术和应用相关参数以及用户数量纳入QoS评估,可以很容易地选择性能更好的网络配置。这是通过我们提出的基于应用的QoS评估方案来实现的,该方案基于各种相关度量的组合。该方案对基于多媒体的异构网络的QoS评价和改进特别有利。
{"title":"QoS analysis and evaluations: Improving cellular-based distance education","authors":"Farnaz Farid, S. Shahrestani, Chun Ruan","doi":"10.1109/LCNW.2013.6758493","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758493","url":null,"abstract":"Mobile broadband technologies are now an important part of the communication infrastructure even for most of the developing world. These technologies can potentially play an important role in improving the socioeconomic status of rural areas. However, adaptation of these technologies for provision of relevant multimedia services faces major challenges. Perhaps, Quality of Service (QoS) issues still tops the list of such challenges. In this work we study how to evaluate the QoS of cellular-based systems focusing on an application perspective. We quantify the QoS levels for different traffic models using application and network related parameters to identify the most suitable configuration for running multimedia-based services. More specifically, our analysis is based on considering a unified measure combining key QoS metrics such as packet loss, and delay. For evaluation purposes, we also investigate the QoS issues of deploying a distance education platform running over UMTS cellular systems. The QoS issues related to the deployment of multimedia services in cellular technologies are then considered and analyzed in detail through simulation studies. The results show that by inclusion of the communication technology and application related parameters along with the number of users in QoS evaluations, better performing network configurations can be readily selected. This is achieved, through our proposed application-based QoS evaluation scheme that is based on combining various related measures. The proposed scheme is shown to be particularly beneficial for evaluating and improving QoS for multimedia-based heterogeneous networks.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121230643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CREST: An epoch-oriented routing control plane for Low-Power and Lossy Networks 面向时代的低功耗和有损网络路由控制平面
Pub Date : 2013-10-01 DOI: 10.1109/LCNW.2013.6758509
James Pope, R. Simon
There has been much recent interest in deploying IP-enabled routing and management protocols within Low-Power and Lossy Networks (LLN). For instance, the Routing Protocol for LLNs (RPL) forms a directed acyclic graph from which a routing tree can be selected. RPL is designed to dynamically modify routes in response to varying network conditions. However, many performance-sensitive LLN applications require stable routing trees with fixed homogeneous or heterogeneous transmission rates over defined time intervals. For these applications we introduce the CREST: Coordinated Routing for Epoch-based Stable Tree framework. CREST provides a LLN and IP-friendly routing control plane for supporting this application class. CREST is designed to supplement, rather than replace, LLN routing protocols such as RPL or CTP. We describe our implementation of CREST in the Contiki operating system. We also present a performance analysis for a utility maximization application using the framework comparing epoch-based protocols to an RPL approach. Our results show that the epoch-based protocols consistently deliver higher utility levels.
最近,人们对在低功耗和有损网络(LLN)中部署支持ip的路由和管理协议非常感兴趣。例如,RPL (Routing Protocol For lln)形成了一个有向无环图,可以从中选择路由树。RPL的目的是动态修改路由,以响应不同的网络条件。然而,许多性能敏感的LLN应用程序需要稳定的路由树,在定义的时间间隔内具有固定的同构或异构传输速率。针对这些应用,我们引入了基于时代的稳定树框架的CREST:协调路由。CREST提供了一个LLN和ip友好的路由控制平面来支持这个应用程序类。CREST旨在补充而不是取代LLN路由协议,如RPL或CTP。我们描述了我们在Contiki操作系统中的CREST实现。我们还提出了一个效用最大化应用程序的性能分析,使用比较基于时代的协议和RPL方法的框架。我们的结果表明,基于时代的协议始终提供更高的效用水平。
{"title":"CREST: An epoch-oriented routing control plane for Low-Power and Lossy Networks","authors":"James Pope, R. Simon","doi":"10.1109/LCNW.2013.6758509","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758509","url":null,"abstract":"There has been much recent interest in deploying IP-enabled routing and management protocols within Low-Power and Lossy Networks (LLN). For instance, the Routing Protocol for LLNs (RPL) forms a directed acyclic graph from which a routing tree can be selected. RPL is designed to dynamically modify routes in response to varying network conditions. However, many performance-sensitive LLN applications require stable routing trees with fixed homogeneous or heterogeneous transmission rates over defined time intervals. For these applications we introduce the CREST: Coordinated Routing for Epoch-based Stable Tree framework. CREST provides a LLN and IP-friendly routing control plane for supporting this application class. CREST is designed to supplement, rather than replace, LLN routing protocols such as RPL or CTP. We describe our implementation of CREST in the Contiki operating system. We also present a performance analysis for a utility maximization application using the framework comparing epoch-based protocols to an RPL approach. Our results show that the epoch-based protocols consistently deliver higher utility levels.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116606879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Impact of wireless devices over real-time applications: An empirical test-bed analysis 无线设备对实时应用程序的影响:一个经验测试平台分析
Pub Date : 2013-10-01 DOI: 10.1109/LCNW.2013.6758527
Mohib A. Shah, Jinman Kim, D. Feng
Wireless Local Area Network (WLAN) has enabled greater communication capabilities compared to LAN counterpart. However, when it comes to quality of service (QoS), WLAN has lower reliability, where it has higher latency and packet-loss, especially for real-time streaming applications such as voice over internet protocol (VoIP) and multimedia. Thus, improving QoS in WLAN is a major research challenge, where packet-loss is considered most critical while other factors, such as latency and jitter are acceptable to certain level of tolerance. Theoretically WLAN can provide higher bandwidth and lower latency; however, practical results disagree with this statement. In this paper, we investigated the dilemma using different combination of wireless devices within a local area network to identify the problem. We propose an infrastructure based scheme to improve the QoS for real-time traffic over WLAN. We setup a wireless network using different types of wireless devices and tested VoIP traffic over it. Our simulation results for G.729.2 codec on IPv4 and IPv6 using virtual access point (v-AP) showed better performance than physical access point (ph-AP). We also observed that usage of different wireless devices within a network highly reduced real-time application performance.
与LAN相比,无线局域网(WLAN)实现了更大的通信能力。然而,当涉及到服务质量(QoS)时,WLAN具有较低的可靠性,其中它具有较高的延迟和丢包,特别是对于实时流媒体应用,如互联网协议语音(VoIP)和多媒体。因此,提高WLAN的QoS是一个主要的研究挑战,其中丢包被认为是最关键的,而其他因素,如延迟和抖动在一定程度上是可以接受的。理论上,WLAN可以提供更高的带宽和更低的延迟;然而,实际结果与这种说法不一致。在本文中,我们研究了在局域网内使用不同的无线设备组合来识别问题的困境。我们提出了一种基于基础架构的方案来提高无线局域网实时业务的QoS。我们使用不同类型的无线设备建立了一个无线网络,并在其中测试了VoIP流量。我们在IPv4和IPv6上使用虚拟接入点(v-AP)对G.729.2编解码器进行了仿真,结果表明虚拟接入点(v-AP)的性能优于物理接入点(ph-AP)。我们还观察到,在网络中使用不同的无线设备会大大降低实时应用程序的性能。
{"title":"Impact of wireless devices over real-time applications: An empirical test-bed analysis","authors":"Mohib A. Shah, Jinman Kim, D. Feng","doi":"10.1109/LCNW.2013.6758527","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758527","url":null,"abstract":"Wireless Local Area Network (WLAN) has enabled greater communication capabilities compared to LAN counterpart. However, when it comes to quality of service (QoS), WLAN has lower reliability, where it has higher latency and packet-loss, especially for real-time streaming applications such as voice over internet protocol (VoIP) and multimedia. Thus, improving QoS in WLAN is a major research challenge, where packet-loss is considered most critical while other factors, such as latency and jitter are acceptable to certain level of tolerance. Theoretically WLAN can provide higher bandwidth and lower latency; however, practical results disagree with this statement. In this paper, we investigated the dilemma using different combination of wireless devices within a local area network to identify the problem. We propose an infrastructure based scheme to improve the QoS for real-time traffic over WLAN. We setup a wireless network using different types of wireless devices and tested VoIP traffic over it. Our simulation results for G.729.2 codec on IPv4 and IPv6 using virtual access point (v-AP) showed better performance than physical access point (ph-AP). We also observed that usage of different wireless devices within a network highly reduced real-time application performance.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122715928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks 无线传感器网络中基于移动代理的异常检测形式化验证
Pub Date : 2013-10-01 DOI: 10.1109/LCNW.2013.6758544
Muhammad Usman, V. Muthukkumarasamy, Xin-Wen Wu
Mobile agent technology offers a number of advantages to resource constrained Wireless Sensor Networks (WSNs) by facilitating parallelism, code and data dissemination, localization, and distributed security services. As part of the second line of defense for WSNs, anomaly detection schemes are also benefiting from mobile agent technology. The formal verification can be used to validate the correctness of a system using formal specifications. This study employs Behavior Trees (BTs) for formal verification of mobile agent based anomaly detection system in WSNs. We employed BT based formal semantics to integrate the behavior projection of different components of anomaly detection system. The Symbolic Analysis Laboratory (SAL) tool is used to formally specify the behavior tree model. The analysis based on Linear Temporal Logic (LTL) theorems validates the completeness and consistency of the formal model of mobile agent based anomaly detection system.
移动代理技术通过促进并行性、代码和数据传播、本地化和分布式安全服务,为资源受限的无线传感器网络(wsn)提供了许多优势。作为无线传感器网络第二道防线的一部分,异常检测方案也受益于移动代理技术。形式化验证可以用来验证使用形式化规范的系统的正确性。本研究采用行为树(bt)对基于移动智能体的wsn异常检测系统进行形式化验证。采用基于BT的形式化语义对异常检测系统中不同组件的行为投影进行整合。符号分析实验室(Symbolic Analysis Laboratory, SAL)工具用于形式化地指定行为树模型。基于线性时间逻辑(LTL)定理的分析验证了基于移动智能体的异常检测系统形式化模型的完备性和一致性。
{"title":"Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks","authors":"Muhammad Usman, V. Muthukkumarasamy, Xin-Wen Wu","doi":"10.1109/LCNW.2013.6758544","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758544","url":null,"abstract":"Mobile agent technology offers a number of advantages to resource constrained Wireless Sensor Networks (WSNs) by facilitating parallelism, code and data dissemination, localization, and distributed security services. As part of the second line of defense for WSNs, anomaly detection schemes are also benefiting from mobile agent technology. The formal verification can be used to validate the correctness of a system using formal specifications. This study employs Behavior Trees (BTs) for formal verification of mobile agent based anomaly detection system in WSNs. We employed BT based formal semantics to integrate the behavior projection of different components of anomaly detection system. The Symbolic Analysis Laboratory (SAL) tool is used to formally specify the behavior tree model. The analysis based on Linear Temporal Logic (LTL) theorems validates the completeness and consistency of the formal model of mobile agent based anomaly detection system.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127655145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
38th Annual IEEE Conference on Local Computer Networks - Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1