首页 > 最新文献

2008 Proceedings of 17th International Conference on Computer Communications and Networks最新文献

英文 中文
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs TRACK:一种新的基于连通支配集的无线传感器网络Sink迁移模型
A. Srinivasan, Jie Wu
The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK - a novel sink mobility model exploiting the connected dominating set (CDS) property of a network graph. TRACK, to the best of our knowledge, is the first contemporary sink mobility model to exploit the CDS property for WSN lifetime longevity and secure data aggregation. In TRACK, the CDS of the given network is computed and then the minimum spanning tree (MST) of the CDS is constructed. Using the CDS-MST as the underlying framework, a Hamiltonian circuit (HC) is constructed, along which the sink is mobilized to traverse the network. Since TRACK, by the very definition of CDS, passes through the transmission range of every node in the network, data can be relayed directly from the source node to the sink, eliminating the need for multi-hop routing. By virtue of this property, nodes in the WSN are discharged from their routing obligations and data aggregation becomes more secure. Additionally, we propose an extended version of TRACK called M-TRACK in this paper. The extended model trades higher fractions of sensor energy with the objective of minimizing the length of sink trajectory. This consequently minimizes the delay between consecutive sink visits, mitigating buffer-overflow of sensors. M-TRACK does necessitate multi-hop routing, but keeps it within a bounded number of hops. We confirm the efficiency and robustness of our models via simulation and analysis, and show that our model can extend the WSN lifetime up to seven times that which can be achieved using a static sink.
无线传感器网络(WSN)的核心功能是检测预期正常行为的偏差并将其报告给接收器。本文利用网络图的连通支配集(CDS)特性,提出了一种新的集迁移模型TRACK。据我们所知,TRACK是第一个利用CDS特性实现WSN寿命和安全数据聚合的当代sink迁移模型。在TRACK中,首先计算给定网络的CDS,然后构造CDS的最小生成树(MST)。使用CDS-MST作为底层框架,构建了一个哈密顿电路(HC),沿着该电路调动sink遍历网络。由于根据CDS的定义,TRACK通过网络中每个节点的传输范围,因此数据可以直接从源节点中继到汇聚节点,从而消除了多跳路由的需要。利用这一特性,WSN中的节点可以免除路由义务,数据聚合变得更加安全。此外,我们在本文中提出了一个扩展版本的TRACK称为M-TRACK。该扩展模型以最小化汇聚轨迹长度为目标,对传感器能量进行了更高的交换。因此,这最小化了连续sink访问之间的延迟,减轻了传感器的缓冲区溢出。M-TRACK确实需要多跳路由,但将其保持在有限的跳数内。我们通过仿真和分析验证了模型的有效性和鲁棒性,并表明我们的模型可以将WSN的寿命延长到使用静态sink的7倍。
{"title":"TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs","authors":"A. Srinivasan, Jie Wu","doi":"10.1109/ICCCN.2008.ECP.127","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.127","url":null,"abstract":"The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK - a novel sink mobility model exploiting the connected dominating set (CDS) property of a network graph. TRACK, to the best of our knowledge, is the first contemporary sink mobility model to exploit the CDS property for WSN lifetime longevity and secure data aggregation. In TRACK, the CDS of the given network is computed and then the minimum spanning tree (MST) of the CDS is constructed. Using the CDS-MST as the underlying framework, a Hamiltonian circuit (HC) is constructed, along which the sink is mobilized to traverse the network. Since TRACK, by the very definition of CDS, passes through the transmission range of every node in the network, data can be relayed directly from the source node to the sink, eliminating the need for multi-hop routing. By virtue of this property, nodes in the WSN are discharged from their routing obligations and data aggregation becomes more secure. Additionally, we propose an extended version of TRACK called M-TRACK in this paper. The extended model trades higher fractions of sensor energy with the objective of minimizing the length of sink trajectory. This consequently minimizes the delay between consecutive sink visits, mitigating buffer-overflow of sensors. M-TRACK does necessitate multi-hop routing, but keeps it within a bounded number of hops. We confirm the efficiency and robustness of our models via simulation and analysis, and show that our model can extend the WSN lifetime up to seven times that which can be achieved using a static sink.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks 802.11网络去认证/反关联攻击的轻量级防御方案
T. Nguyen, Duc H. M. Nguyen, B.N. Tran, H. Vu, N. Mittal
In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 standards, whenever a wireless station wants to leave the network, it sends a deauthentication or disassociation frame to the access point. These two frames, however, are sent unencrypted and are not authenticated by the access point. Therefore, an attacker can launch a DoS attack by spoofing these messages and thus disabling the communication between a wireless device and its access point. We propose an efficient solution based on a one way hard function to verify that a deauthentication/disassociation frame is from a legitimate station. We implement our solution on some 802.11 devices and the experimental results show that our protocol is highly effective against this DoS attack.
在本文中,我们研究了基于802.11的网络上的一种特殊类型的拒绝服务(DoS)攻击,即去认证/解关联攻击。在当前的IEEE 802.11标准中,当一个无线站想要离开网络时,它会向接入点发送一个去认证或解除关联的帧。然而,这两个帧是不加密发送的,并且不由接入点进行身份验证。因此,攻击者可以通过欺骗这些消息来发起DoS攻击,从而禁用无线设备与其接入点之间的通信。我们提出了一种基于单向硬函数的有效解决方案来验证去认证/解关联帧来自合法站。我们在一些802.11设备上实现了我们的解决方案,实验结果表明我们的协议对这种DoS攻击是非常有效的。
{"title":"A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks","authors":"T. Nguyen, Duc H. M. Nguyen, B.N. Tran, H. Vu, N. Mittal","doi":"10.1109/ICCCN.2008.ECP.51","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.51","url":null,"abstract":"In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 standards, whenever a wireless station wants to leave the network, it sends a deauthentication or disassociation frame to the access point. These two frames, however, are sent unencrypted and are not authenticated by the access point. Therefore, an attacker can launch a DoS attack by spoofing these messages and thus disabling the communication between a wireless device and its access point. We propose an efficient solution based on a one way hard function to verify that a deauthentication/disassociation frame is from a legitimate station. We implement our solution on some 802.11 devices and the experimental results show that our protocol is highly effective against this DoS attack.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132634098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
TCP Over Optical Burst Switching (OBS): To Split or Not To Split? TCP Over光突发交换(OBS):分割还是不分割?
Deepak Padmanabhan, Rajesh R. C. Bikram, V. Vokkarane
TCP-based applications account for a majority of data traffic in the Internet; thus understanding and improving the performance of TCP over OBS network is critical. In this paper, we identify the ill-effects of implementing TCP over a hybrid network (IP-access and OBS-core). We purpose a Split- TCP approach for a hybrid IP-OBS network to improve TCP performance. We propose two Split-TCP approaches, namely, 1:1:1 and N:1:N. We evaluate the performance of the proposed approaches over an IP-OBS hybrid network. Based on the simulation results, N:1:N Split-TCP approach outperforms all other approaches.
基于tcp的应用程序占互联网数据流量的大部分;因此,理解和提高OBS网络上TCP的性能是至关重要的。在本文中,我们确定了在混合网络(IP-access和OBS-core)上实现TCP的不良影响。为了提高TCP的性能,我们设计了一种用于混合IP-OBS网络的拆分TCP方法。我们提出了两种Split-TCP方式,即1:1:1和N:1:N。我们在IP-OBS混合网络上评估了所提出的方法的性能。仿真结果表明,N:1:N Split-TCP方法的性能优于其他所有方法。
{"title":"TCP Over Optical Burst Switching (OBS): To Split or Not To Split?","authors":"Deepak Padmanabhan, Rajesh R. C. Bikram, V. Vokkarane","doi":"10.1109/ICCCN.2008.ECP.66","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.66","url":null,"abstract":"TCP-based applications account for a majority of data traffic in the Internet; thus understanding and improving the performance of TCP over OBS network is critical. In this paper, we identify the ill-effects of implementing TCP over a hybrid network (IP-access and OBS-core). We purpose a Split- TCP approach for a hybrid IP-OBS network to improve TCP performance. We propose two Split-TCP approaches, namely, 1:1:1 and N:1:N. We evaluate the performance of the proposed approaches over an IP-OBS hybrid network. Based on the simulation results, N:1:N Split-TCP approach outperforms all other approaches.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Autocorrelation-Based Spectrum Sensing Algorithms for Cognitive Radios 基于自相关的认知无线电频谱感知算法
T. Ikuma, M. Naraghi-Pour
Cognitive radio is an enabling technology for opportunistic spectrum access. Spectrum sensing is a key feature of a cognitive radio whereby a secondary user can identify and utilize the spectrum that remains unused by the licensed (primary) users. Among the recently proposed algorithms the covariance-based method of [1] is a constant false alarm rate (CFAR) detector with a fairly low computational complexity. The low computational complexity reduces the detection time and improves the radio agility. In this paper, we present a framework to analyze the performance of this covariance-based method. We also propose a new spectrum sensing technique based on the sample autocorrelation of the received signal. The performance of this algorithm is also evaluated through analysis and simulation. The results obtained from simulation and analysis are very close and verify the accuracy of the approximation assumptions in our analysis. Furthermore, our results show that our proposed algorithm outperforms the algorithm in [1].
认知无线电是一种机会性频谱接入的使能技术。频谱感知是认知无线电的一个关键特性,辅助用户可以识别和利用未被授权(主)用户使用的频谱。在最近提出的算法中,基于协方差的[1]方法是一种恒定虚警率(CFAR)检测器,计算复杂度相当低。较低的计算复杂度减少了检测时间,提高了无线电的敏捷性。在本文中,我们提出了一个框架来分析这种基于协方差的方法的性能。我们还提出了一种新的基于接收信号的采样自相关的频谱感知技术。通过分析和仿真,对该算法的性能进行了评价。仿真和分析的结果非常接近,验证了分析中近似假设的准确性。此外,我们的结果表明,我们提出的算法优于[1]算法。
{"title":"Autocorrelation-Based Spectrum Sensing Algorithms for Cognitive Radios","authors":"T. Ikuma, M. Naraghi-Pour","doi":"10.1109/ICCCN.2008.ECP.102","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.102","url":null,"abstract":"Cognitive radio is an enabling technology for opportunistic spectrum access. Spectrum sensing is a key feature of a cognitive radio whereby a secondary user can identify and utilize the spectrum that remains unused by the licensed (primary) users. Among the recently proposed algorithms the covariance-based method of [1] is a constant false alarm rate (CFAR) detector with a fairly low computational complexity. The low computational complexity reduces the detection time and improves the radio agility. In this paper, we present a framework to analyze the performance of this covariance-based method. We also propose a new spectrum sensing technique based on the sample autocorrelation of the received signal. The performance of this algorithm is also evaluated through analysis and simulation. The results obtained from simulation and analysis are very close and verify the accuracy of the approximation assumptions in our analysis. Furthermore, our results show that our proposed algorithm outperforms the algorithm in [1].","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123776786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Rule Hashing for Efficient Packet Classification in Network Intrusion Detection 用于网络入侵检测中高效数据包分类的规则加密
A. Yoshioka, Shariful Hasan Shaikot, Min Sik Kim
A rule-based intrusion detection system compares the incoming packets against rule set in order to detect intrusion. Unfortunately, it spends the majority of CPU time in packet classification to search for rules that match each packet. A common approach is to build a graph such as rule trees or finite automata for a given rule set, and traverse it using a packet as an input string. Because of the increasing number of security threats and vulnerabilities, the number of rules often exceeds thousands requiring more than hundreds of megabytes of memory. Exploring such a huge graph becomes a major bottleneck in high-speed networks since each packet incurs many memory accesses with little locality. In this paper, we propose rule hashing for fast packet classification in intrusion detection systems. The rule hashing, combined with hierarchical rule trees, saves memory and reduce the number of memory accesses by allowing the whole working set to be accommodated in a cache in most of the time, and thus improves response times in finding matching rules. We implement our algorithm in Snort, a popular open-source intrusion detection system. Experimental results show that our implementation is faster than original Snort to deal with the same real packet traces while consuming an order of magnitude less memory.
基于规则的入侵检测系统将收到的数据包与规则集进行比较,以检测入侵。遗憾的是,在数据包分类过程中,系统需要花费大部分 CPU 时间来搜索与每个数据包相匹配的规则。一种常见的方法是为给定的规则集构建规则树或有限自动机等图形,并将数据包作为输入字符串进行遍历。由于安全威胁和漏洞的数量不断增加,规则的数量往往超过数千条,需要超过数百兆字节的内存。在高速网络中,由于每个数据包都会产生大量内存访问,且几乎没有定位,因此探索这样一个庞大的图成为一个主要瓶颈。在本文中,我们提出了在入侵检测系统中进行快速数据包分类的哈希规则。规则散列与分层规则树相结合,可以节省内存并减少内存访问次数,因为在大多数情况下,整个工作集都可以容纳在缓存中,从而提高了查找匹配规则的响应速度。我们在 Snort(一种流行的开源入侵检测系统)中实现了我们的算法。实验结果表明,在处理相同的真实数据包轨迹时,我们的实现比原始 Snort 更快,同时内存消耗也少了一个数量级。
{"title":"Rule Hashing for Efficient Packet Classification in Network Intrusion Detection","authors":"A. Yoshioka, Shariful Hasan Shaikot, Min Sik Kim","doi":"10.1109/ICCCN.2008.ECP.120","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.120","url":null,"abstract":"A rule-based intrusion detection system compares the incoming packets against rule set in order to detect intrusion. Unfortunately, it spends the majority of CPU time in packet classification to search for rules that match each packet. A common approach is to build a graph such as rule trees or finite automata for a given rule set, and traverse it using a packet as an input string. Because of the increasing number of security threats and vulnerabilities, the number of rules often exceeds thousands requiring more than hundreds of megabytes of memory. Exploring such a huge graph becomes a major bottleneck in high-speed networks since each packet incurs many memory accesses with little locality. In this paper, we propose rule hashing for fast packet classification in intrusion detection systems. The rule hashing, combined with hierarchical rule trees, saves memory and reduce the number of memory accesses by allowing the whole working set to be accommodated in a cache in most of the time, and thus improves response times in finding matching rules. We implement our algorithm in Snort, a popular open-source intrusion detection system. Experimental results show that our implementation is faster than original Snort to deal with the same real packet traces while consuming an order of magnitude less memory.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128135608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Model for Differentiated Service Support in Wireless Multimedia Sensor Networks 无线多媒体传感器网络中差异化服务支持模型
M. Moghaddam, D. Adjeroh
Different network applications need different Quality of Service (QoS) requirements such as packet delay, packet loss, bandwidth and availability. It is important to develop a network architecture which is able to guaranty quality of service requirements for high priority traffic. In Wireless Multimedia Sensor Networks (WMSNs), a sensor node may have different kinds of sensor which gather different types of data, with differing levels of importance. We argue that the sensor networks should be willing to spend more resources in disseminating packets that carry more important information. Some applications of WMSNs need to send real time traffic toward the sink node. This real time traffic requires low latency and high reliability so that immediate remedial and defensive actions can be taken, where necessary. Similar to wired networks, service differentiation in wireless sensor networks is also very important. In this paper we propose a differentiated service model for WMSNs. The proposed model can provide requested quality of service for high priority real time classes. In the proposed model, we distinguish high priority real time traffic from the low priority non-real time traffic, and input traffic streams are then serviced based on their priorities. Simulation results confirm the efficiency of the proposed model.
不同的网络应用需要不同的服务质量(QoS)要求,如数据包延迟、数据包丢失、带宽和可用性。开发一种能够保证高优先级流量的服务质量要求的网络架构是非常重要的。在无线多媒体传感器网络(wmsn)中,一个传感器节点可能有不同类型的传感器,这些传感器收集不同类型的数据,具有不同的重要程度。我们认为传感器网络应该愿意花费更多的资源来传播携带更重要信息的数据包。wmsn的一些应用需要向汇聚节点发送实时流量。这种实时流量需要低延迟和高可靠性,以便可以在必要时立即采取补救和防御措施。与有线网络类似,无线传感器网络中的业务差异化也非常重要。本文提出了一种面向wmsn的差异化服务模型。该模型可以为高优先级实时类提供所要求的服务质量。在该模型中,我们将高优先级实时流量与低优先级非实时流量区分开来,然后根据其优先级为输入流量流提供服务。仿真结果验证了该模型的有效性。
{"title":"A Model for Differentiated Service Support in Wireless Multimedia Sensor Networks","authors":"M. Moghaddam, D. Adjeroh","doi":"10.1109/ICCCN.2008.ECP.164","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.164","url":null,"abstract":"Different network applications need different Quality of Service (QoS) requirements such as packet delay, packet loss, bandwidth and availability. It is important to develop a network architecture which is able to guaranty quality of service requirements for high priority traffic. In Wireless Multimedia Sensor Networks (WMSNs), a sensor node may have different kinds of sensor which gather different types of data, with differing levels of importance. We argue that the sensor networks should be willing to spend more resources in disseminating packets that carry more important information. Some applications of WMSNs need to send real time traffic toward the sink node. This real time traffic requires low latency and high reliability so that immediate remedial and defensive actions can be taken, where necessary. Similar to wired networks, service differentiation in wireless sensor networks is also very important. In this paper we propose a differentiated service model for WMSNs. The proposed model can provide requested quality of service for high priority real time classes. In the proposed model, we distinguish high priority real time traffic from the low priority non-real time traffic, and input traffic streams are then serviced based on their priorities. Simulation results confirm the efficiency of the proposed model.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A System Architecture for Evolving Protocol Stacks (Invited Paper) 演进协议栈的系统架构(特邀论文)
A. Keller, T. Hossmann, M. May, Ghazi Bouabene, Christophe Jelger, C. Tschudin
A majority of network architectures aim at solving specific shortcomings of the original Internet architecture. While providing solutions for the particular problems, they often lack in flexibility and do not provide general concepts for future networking requirements. In contrast, we introduce a network architecture that aims to be versatile enough to serve as a foundation for the future Internet. The main pillars of our architecture are communication pivots called information dispatch points (IDPs) which embed the concept of modularity at all levels of the architecture. IDPs completely decouple functional entities by means of indirection thus enabling evolving protocol stacks. Our architecture also provides a consistent application programming interface (API) to access node-local or network-wide functionality. In addition to the description of this architecture, we report about a working prototype of the architecture and we give examples of its application.
大多数网络架构旨在解决原有互联网架构的特定缺点。在为特定问题提供解决方案的同时,它们往往缺乏灵活性,并且不能为未来的网络需求提供一般概念。相反,我们引入了一种网络架构,其目标是足够通用,可以作为未来互联网的基础。我们体系结构的主要支柱是称为信息调度点(idp)的通信枢纽,它在体系结构的所有级别嵌入了模块化的概念。idp通过间接方式完全解耦功能实体,从而支持不断发展的协议栈。我们的体系结构还提供了一致的应用程序编程接口(API)来访问节点本地或网络范围的功能。除了对该体系结构的描述之外,我们还报告了该体系结构的工作原型,并给出了其应用的示例。
{"title":"A System Architecture for Evolving Protocol Stacks (Invited Paper)","authors":"A. Keller, T. Hossmann, M. May, Ghazi Bouabene, Christophe Jelger, C. Tschudin","doi":"10.1109/ICCCN.2008.ECP.44","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.44","url":null,"abstract":"A majority of network architectures aim at solving specific shortcomings of the original Internet architecture. While providing solutions for the particular problems, they often lack in flexibility and do not provide general concepts for future networking requirements. In contrast, we introduce a network architecture that aims to be versatile enough to serve as a foundation for the future Internet. The main pillars of our architecture are communication pivots called information dispatch points (IDPs) which embed the concept of modularity at all levels of the architecture. IDPs completely decouple functional entities by means of indirection thus enabling evolving protocol stacks. Our architecture also provides a consistent application programming interface (API) to access node-local or network-wide functionality. In addition to the description of this architecture, we report about a working prototype of the architecture and we give examples of its application.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
NePTune: Optimizing Sensor Networks 海王星:优化传感器网络
S. K. Wahba, S. Dandamudi, Andrew R. Dalton, J. Hallstrom
We present the NePTune approach and supporting system architecture for sensor network optimization. NePTune relies on a control loop strategy with performance monitoring, dynamic source code generation, and network reprogramming. We present an application of the system architecture and explore its efficacy in the context of a resource utilization problem - specifically, to minimize the memory consumption of a neighborhood management service. All experiments are conducted using a physical network testbed consisting of 80 Tmote Sky nodes.
我们提出了用于传感器网络优化的海王星方法和支持系统架构。NePTune依赖于具有性能监视、动态源代码生成和网络重编程的控制回路策略。我们提出了一个系统架构的应用,并探讨了它在资源利用问题的背景下的有效性-特别是,最小化邻居管理服务的内存消耗。所有实验都是在一个由80个Tmote Sky节点组成的物理网络测试台上进行的。
{"title":"NePTune: Optimizing Sensor Networks","authors":"S. K. Wahba, S. Dandamudi, Andrew R. Dalton, J. Hallstrom","doi":"10.1109/ICCCN.2008.ECP.82","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.82","url":null,"abstract":"We present the NePTune approach and supporting system architecture for sensor network optimization. NePTune relies on a control loop strategy with performance monitoring, dynamic source code generation, and network reprogramming. We present an application of the system architecture and explore its efficacy in the context of a resource utilization problem - specifically, to minimize the memory consumption of a neighborhood management service. All experiments are conducted using a physical network testbed consisting of 80 Tmote Sky nodes.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116330298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CAC-RD: A Call Admission Control for UMTS Networks c - rd: UMTS网络的呼叫接纳控制
C. R. Storck, A. Ribeiro, Fátima Duarte-Figueiredo
This work proposes CAC-RD: a call admission control for UMTS (universal mobile terrestrial system) networks. Its main challenge is to guaranty the maximum access/network availability while maintaining satisfactory performance levels. It is based on two schemes: channel reservation and network diagnosis. It reserves dynamically some channels to handovers, based on the network behavior. The diagnosis monitors the network utilization giving information to the CAC-RD decisions. There are some utilization thresholds that drive the blockings, telling CAC-RD when to accept or not a new call. Handovers and the conversational class are the CAC-RD priorities. Simulation results show that CAC-RD can guarantee network availability, reducing priority classes blocking and guarantying some network QoS requirements. Simulations had shown an average reduction of 40% and 11% in handovers and new classes blockings, respectively. Thus, results indicate that CAC-RD can guarantee access and QoS, keeping levels of agreement between performance and availability.
本工作提出了一种用于UMTS(通用移动地面系统)网络的呼叫接纳控制(CAC-RD)。它的主要挑战是保证最大的访问/网络可用性,同时保持令人满意的性能水平。它基于信道预留和网络诊断两种方案。它根据网络行为动态保留一些通道进行切换。诊断监视网络利用率,为CAC-RD决策提供信息。有一些利用率阈值驱动阻塞,告诉CAC-RD何时接受或不接受新调用。切换和会话类是CAC-RD的优先级。仿真结果表明,ca - rd可以保证网络的可用性,减少优先级阻塞,保证一定的网络QoS要求。模拟显示,在交接和新班级阻塞方面,平均分别减少了40%和11%。因此,结果表明,CAC-RD可以保证访问和QoS,保持性能和可用性之间的一致水平。
{"title":"CAC-RD: A Call Admission Control for UMTS Networks","authors":"C. R. Storck, A. Ribeiro, Fátima Duarte-Figueiredo","doi":"10.1109/ICCCN.2008.ECP.132","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.132","url":null,"abstract":"This work proposes CAC-RD: a call admission control for UMTS (universal mobile terrestrial system) networks. Its main challenge is to guaranty the maximum access/network availability while maintaining satisfactory performance levels. It is based on two schemes: channel reservation and network diagnosis. It reserves dynamically some channels to handovers, based on the network behavior. The diagnosis monitors the network utilization giving information to the CAC-RD decisions. There are some utilization thresholds that drive the blockings, telling CAC-RD when to accept or not a new call. Handovers and the conversational class are the CAC-RD priorities. Simulation results show that CAC-RD can guarantee network availability, reducing priority classes blocking and guarantying some network QoS requirements. Simulations had shown an average reduction of 40% and 11% in handovers and new classes blockings, respectively. Thus, results indicate that CAC-RD can guarantee access and QoS, keeping levels of agreement between performance and availability.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129431326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ESD: A Novel Optimization Algorithm for Positioning Estimation in Wireless Sensor Networks - Analysis and Experimental Validation via a Testbed Platform 一种新的无线传感器网络定位估计优化算法——基于测试平台的分析与实验验证
S. Tennina, M. Renzo
In recent contributions [Tennina, S., et al., 2008], [Tennina, S., 2008], we have provided a comparative analysis of various optimization algorithms, which can be used for atomic location estimation, and suggested an enhanced version of the steepest descent (ESD) algorithm, which we have shown to be competitive with well-known distributed localization algorithms in terms of estimation accuracy and numerical complexity. Moreover, in [Tennina, S., 2008] we have conducted a statistical characterization of the positioning error distribution of the ESD algorithm, and shown that the latter error can be well approximated by the family of Pearson distributions. However, the analysis in [Tennina, S., et al., 2008; Tennina, S., 2008; Tennina, S., 2008] is mainly based on numerical (i.e., computer-based) simulations, which only in part allows to predict the system performance in a realistic environment where sensor nodes are expected to operate. As a consequence, the aim of this contribution is twofold: i) to analyze the error performance of the ESD algorithm in a real testbed platform working in a typical indoor environment, and ii) to compare experimental and simulated results to substantiate via real measurements our previous findings useful for network setup and analysis. In particular, we will first report on the implementation issues related on mapping the ESD algorithm on the CrossBow's MICAz sensor node platform [http://www.xbow.com/Products/wproductsoverview.aspx.], and, then, we will investigate, via real experiments, on the effect of network topology and ranging errors in estimating the final position of an unknown sensor node.
在最近的文章[Tennina, S.等人,2008]和[Tennina, S., 2008]中,我们对可用于原子位置估计的各种优化算法进行了比较分析,并提出了一种增强版的最陡下降(ESD)算法,我们已经证明该算法在估计精度和数值复杂性方面与知名的分布式定位算法具有竞争力。此外,在[Tennina, S., 2008]中,我们对ESD算法的定位误差分布进行了统计表征,并表明后者的误差可以很好地近似于Pearson分布族。然而,[Tennina, S.等,2008;田纳西州,2008;Tennina, S., 2008]主要基于数值(即基于计算机的)模拟,这只能部分地预测传感器节点预期运行的现实环境中的系统性能。因此,这一贡献的目的是双重的:i)分析在典型室内环境中工作的真实测试平台上ESD算法的误差性能,ii)比较实验和模拟结果,通过实际测量来证实我们之前的发现对网络设置和分析有用。特别是,我们将首先报告与在CrossBow的MICAz传感器节点平台上映射ESD算法相关的实现问题[http://www.xbow.com/Products/wproductsoverview.aspx.],然后,我们将通过实际实验研究网络拓扑和测距误差对估计未知传感器节点最终位置的影响。
{"title":"ESD: A Novel Optimization Algorithm for Positioning Estimation in Wireless Sensor Networks - Analysis and Experimental Validation via a Testbed Platform","authors":"S. Tennina, M. Renzo","doi":"10.1109/ICCCN.2008.ECP.166","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.166","url":null,"abstract":"In recent contributions [Tennina, S., et al., 2008], [Tennina, S., 2008], we have provided a comparative analysis of various optimization algorithms, which can be used for atomic location estimation, and suggested an enhanced version of the steepest descent (ESD) algorithm, which we have shown to be competitive with well-known distributed localization algorithms in terms of estimation accuracy and numerical complexity. Moreover, in [Tennina, S., 2008] we have conducted a statistical characterization of the positioning error distribution of the ESD algorithm, and shown that the latter error can be well approximated by the family of Pearson distributions. However, the analysis in [Tennina, S., et al., 2008; Tennina, S., 2008; Tennina, S., 2008] is mainly based on numerical (i.e., computer-based) simulations, which only in part allows to predict the system performance in a realistic environment where sensor nodes are expected to operate. As a consequence, the aim of this contribution is twofold: i) to analyze the error performance of the ESD algorithm in a real testbed platform working in a typical indoor environment, and ii) to compare experimental and simulated results to substantiate via real measurements our previous findings useful for network setup and analysis. In particular, we will first report on the implementation issues related on mapping the ESD algorithm on the CrossBow's MICAz sensor node platform [http://www.xbow.com/Products/wproductsoverview.aspx.], and, then, we will investigate, via real experiments, on the effect of network topology and ranging errors in estimating the final position of an unknown sensor node.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129949480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2008 Proceedings of 17th International Conference on Computer Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1