首页 > 最新文献

10th IEEE Symposium on Computers and Communications (ISCC'05)最新文献

英文 中文
On the efficiency of explicit multicast routing protocols 论显式组播路由协议的效率
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.112
M. Mohammadi, N. Yazdani, S. Samadian-Barzoki
Recently, many explicit multicast schemes have been proposed to serve a very large number of low to fairly moderate size multicast groups in a scalable manner. In this paper, we discuss the design trade-offs of these protocols both through simulation experiments and real-trees analysis. Our metrics for comparison are the header size and processing overheads. We also introduce a modification to ERM (explicit route multicast), called Bcast (branch cast), which removes some inefficiencies of ERM and reduces its size overhead. In Bcast, sender host generates the tree description code(s) and inserts it into header of multicast data packets. The code contains the IP addresses of all receivers and branching points of the tree. Bcast has a proactive bypassing mechanism which helps it to adjust the code size in response to inconvenient distribution of the receivers.
最近,许多显式组播方案被提出,以一种可扩展的方式服务于大量低到相当中等规模的组播组。在本文中,我们通过仿真实验和真实树分析来讨论这些协议的设计权衡。我们比较的指标是头大小和处理开销。我们还引入了对ERM(显式路由多播)的一种修改,称为Bcast(分支多播),它消除了ERM的一些低效率并减少了它的大小开销。在Bcast中,发送方主机生成树描述码并插入到组播数据包的报头中。代码包含所有接收器的IP地址和树的分支点。Bcast有一个主动绕过机制,帮助它调整代码大小,以响应不便的接收器分布。
{"title":"On the efficiency of explicit multicast routing protocols","authors":"M. Mohammadi, N. Yazdani, S. Samadian-Barzoki","doi":"10.1109/ISCC.2005.112","DOIUrl":"https://doi.org/10.1109/ISCC.2005.112","url":null,"abstract":"Recently, many explicit multicast schemes have been proposed to serve a very large number of low to fairly moderate size multicast groups in a scalable manner. In this paper, we discuss the design trade-offs of these protocols both through simulation experiments and real-trees analysis. Our metrics for comparison are the header size and processing overheads. We also introduce a modification to ERM (explicit route multicast), called Bcast (branch cast), which removes some inefficiencies of ERM and reduces its size overhead. In Bcast, sender host generates the tree description code(s) and inserts it into header of multicast data packets. The code contains the IP addresses of all receivers and branching points of the tree. Bcast has a proactive bypassing mechanism which helps it to adjust the code size in response to inconvenient distribution of the receivers.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131614217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Efficient QoS routing for differentiated services EF flows 针对差异化业务EF流的高效QoS路由
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.60
Enrique Hernández-Orallo, Joan Vila i Carbó
Expedited forwarding (EF) is the differentiated services class of service that provides high quality transmission with node bounded delay. Nevertheless, in order to obtain a bounded network delay it is necessary to compute a route that meets the required end-to-end delay. Therefore, we study the requirements (bandwidth, buffer and delay) for a new EF connection. As detailed in the paper, with these constraints the routing algorithm is a NP-complete problem. Therefore, we present an efficient routing scheme that has low polynomial computational cost. Finally, the evaluation of this routing shows that is as efficient as using the exact routing algorithm.
EF (Expedited forwarding)是一种具有节点有限延迟的高质量传输的差异化服务类别。然而,为了获得有界的网络延迟,有必要计算一条满足端到端延迟要求的路由。因此,我们研究了一个新的EF连接的需求(带宽、缓冲和延迟)。如文中所述,在这些约束条件下,路由算法是一个np完全问题。因此,我们提出了一种具有低多项式计算成本的高效路由方案。最后,对该路由算法的评估表明,该算法与使用精确路由算法一样有效。
{"title":"Efficient QoS routing for differentiated services EF flows","authors":"Enrique Hernández-Orallo, Joan Vila i Carbó","doi":"10.1109/ISCC.2005.60","DOIUrl":"https://doi.org/10.1109/ISCC.2005.60","url":null,"abstract":"Expedited forwarding (EF) is the differentiated services class of service that provides high quality transmission with node bounded delay. Nevertheless, in order to obtain a bounded network delay it is necessary to compute a route that meets the required end-to-end delay. Therefore, we study the requirements (bandwidth, buffer and delay) for a new EF connection. As detailed in the paper, with these constraints the routing algorithm is a NP-complete problem. Therefore, we present an efficient routing scheme that has low polynomial computational cost. Finally, the evaluation of this routing shows that is as efficient as using the exact routing algorithm.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128140461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A label space reduction algorithm for P2MP LSPs using asymmetric tunnels 基于非对称隧道的P2MP lsp标签空间约简算法
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.13
F. S. Donado, R. Fabregat, Y. Donoso, J. Marzo
The aim of traffic engineering is to optimise network resource utilization. Although several works on minimizing network resource utilization have been published, few works have focused on LSR label space. This paper proposes an algorithm that uses MPLS label stack features in order to reduce the number of labels used in LSPs forwarding. Some tunnelling methods and their MPLS implementation drawbacks are also discussed. The algorithm described sets up the NHLFE tables in each LSR, creating asymmetric tunnels when possible. Experimental results show that the algorithm achieves a large reduction factor in the label space. The work presented here applies for both types of connections: P2MP and P2P.
流量工程的目标是优化网络资源的利用。虽然已经发表了一些关于最小化网络资源利用率的研究,但很少有研究关注LSR标签空间。本文提出了一种利用MPLS标签栈特征来减少lsp转发中标签数量的算法。讨论了几种隧道化方法及其MPLS实现的缺点。所描述的算法在每个LSR中建立NHLFE表,在可能的情况下创建非对称隧道。实验结果表明,该算法在标签空间中实现了较大的缩减系数。这里介绍的工作适用于两种类型的连接:P2P和P2P。
{"title":"A label space reduction algorithm for P2MP LSPs using asymmetric tunnels","authors":"F. S. Donado, R. Fabregat, Y. Donoso, J. Marzo","doi":"10.1109/ISCC.2005.13","DOIUrl":"https://doi.org/10.1109/ISCC.2005.13","url":null,"abstract":"The aim of traffic engineering is to optimise network resource utilization. Although several works on minimizing network resource utilization have been published, few works have focused on LSR label space. This paper proposes an algorithm that uses MPLS label stack features in order to reduce the number of labels used in LSPs forwarding. Some tunnelling methods and their MPLS implementation drawbacks are also discussed. The algorithm described sets up the NHLFE tables in each LSR, creating asymmetric tunnels when possible. Experimental results show that the algorithm achieves a large reduction factor in the label space. The work presented here applies for both types of connections: P2MP and P2P.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124616911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deploying multicast communication over MPLS networks using tree numbering 使用树编号在MPLS网络上部署多播通信
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.47
O. Banimelhem, J. Atwood, A. Agarwal
A new scheme for deploying multicasting in MPLS networks is proposed. Each possible tree in an MPLS network is assigned a number, which is then used to classify the corresponding multicast session into its FEC. We call this approach tree numbering (TN). It provides the capability to aggregate different multicast flows (sessions) having the same tree "shape". The assigned number is calculated distributedly by adding the partial weight values generated by the LSRs and the ingress LER of the corresponding tree. The key point in our approach is that the assigned numbers needed to distinguish the "shapes" of all the possible trees depend on the number of possible egress LERs could be reached by that ingress LERs and not on the number of the LSRs (core routers). In terms of the memory size, the proposed approach outperforms the approach that stores the IP addresses of the multicast tree or the one that store the concatenation of the sub codes generated by the ingress LER and the LSRs.
提出了一种在MPLS网络中部署组播的新方案。在MPLS网络中,每个可能的树都被分配一个号码,然后用这个号码将相应的多播会话划分到它的FEC中。我们称这种方法为树编号(TN)。它提供了聚合具有相同树“形状”的不同多播流(会话)的功能。分配数是由lsr生成的部分权重值和相应树的入口LER相加而得到的。在我们的方法中,关键的一点是,分配的数字需要区分所有可能的树的“形状”,这取决于可能的出口ler的数量,而不是取决于lsr(核心路由器)的数量。就内存大小而言,该方法优于存储组播树的IP地址的方法或存储由入口LER和lsr生成的子码的连接的方法。
{"title":"Deploying multicast communication over MPLS networks using tree numbering","authors":"O. Banimelhem, J. Atwood, A. Agarwal","doi":"10.1109/ISCC.2005.47","DOIUrl":"https://doi.org/10.1109/ISCC.2005.47","url":null,"abstract":"A new scheme for deploying multicasting in MPLS networks is proposed. Each possible tree in an MPLS network is assigned a number, which is then used to classify the corresponding multicast session into its FEC. We call this approach tree numbering (TN). It provides the capability to aggregate different multicast flows (sessions) having the same tree \"shape\". The assigned number is calculated distributedly by adding the partial weight values generated by the LSRs and the ingress LER of the corresponding tree. The key point in our approach is that the assigned numbers needed to distinguish the \"shapes\" of all the possible trees depend on the number of possible egress LERs could be reached by that ingress LERs and not on the number of the LSRs (core routers). In terms of the memory size, the proposed approach outperforms the approach that stores the IP addresses of the multicast tree or the one that store the concatenation of the sub codes generated by the ingress LER and the LSRs.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125277411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Power efficient connected topologies in ad-hoc networks ad-hoc网络中的节能连接拓扑
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.124
G. Srivastava, J. Chicharo, P. Boustead
Power efficient topologies in an ad-hoc network can reduce battery usage and increase the lifetime of a network. Topology control algorithms including a local minimum spanning tree (LMST), distributed relative neighbourhood graph (DRNG) and K-Neigh graphs are computed by using the location or the distance information of the network nodes. Inaccurate distance or location information can lead to disconnected topology graphs. Furthermore, a distance based topology graph may not necessarily be connected due to wireless signal attenuation and propagation characteristics. In a realistic scenario, a small link distance may correspond to a large transmission power as the signal may need to transverse through obstacles. Hence it is imperative to include the environment characteristics when generating power efficient connected topology graphs. In this paper we identify the topology construction procedures that may lead to disconnected network topologies. We propose a new procedure that can work in conjunction with the neighbour discovery protocol to provide a better connected and power efficient network topology. Simulations indicate that the proposed algorithm provides a significant improvement in the connectivity of power base DRNG graphs.
ad-hoc网络中的节能拓扑可以减少电池使用并延长网络的使用寿命。拓扑控制算法包括局部最小生成树(LMST)、分布式相对邻域图(DRNG)和K-Neigh图,它们利用网络节点的位置或距离信息进行计算。不准确的距离或位置信息可能导致拓扑图断开。此外,由于无线信号衰减和传播特性,基于距离的拓扑图可能不一定被连接。在现实情况下,较小的链路距离可能对应较大的传输功率,因为信号可能需要穿过障碍物。因此,在生成节能连接拓扑图时,必须包含环境特征。在本文中,我们确定了可能导致网络拓扑断开的拓扑构建过程。我们提出了一种新的过程,可以与邻居发现协议一起工作,以提供更好的连接和节能的网络拓扑。仿真结果表明,该算法显著提高了功率基DRNG图的连通性。
{"title":"Power efficient connected topologies in ad-hoc networks","authors":"G. Srivastava, J. Chicharo, P. Boustead","doi":"10.1109/ISCC.2005.124","DOIUrl":"https://doi.org/10.1109/ISCC.2005.124","url":null,"abstract":"Power efficient topologies in an ad-hoc network can reduce battery usage and increase the lifetime of a network. Topology control algorithms including a local minimum spanning tree (LMST), distributed relative neighbourhood graph (DRNG) and K-Neigh graphs are computed by using the location or the distance information of the network nodes. Inaccurate distance or location information can lead to disconnected topology graphs. Furthermore, a distance based topology graph may not necessarily be connected due to wireless signal attenuation and propagation characteristics. In a realistic scenario, a small link distance may correspond to a large transmission power as the signal may need to transverse through obstacles. Hence it is imperative to include the environment characteristics when generating power efficient connected topology graphs. In this paper we identify the topology construction procedures that may lead to disconnected network topologies. We propose a new procedure that can work in conjunction with the neighbour discovery protocol to provide a better connected and power efficient network topology. Simulations indicate that the proposed algorithm provides a significant improvement in the connectivity of power base DRNG graphs.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121836196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Anomaly intrusion detection for system call using the soundex algorithm and neural networks 基于soundex算法和神经网络的系统调用异常入侵检测
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.33
Byung-Rae Cha, B. Vaidya, Seung-Jo Han
To improve the anomaly intrusion detection system using system calls, this study focuses on supervisor learning neural networks using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern. That is, by changing variable length sequential system call data into a fixed length behavior pattern using the soundex algorithm, this study conducted neural learning by using a backpropagation algorithm. The proposed method and N-gram technique are applied for anomaly intrusion detection of system call using sendmail data of UNM to demonstrate its performance.
为了改进使用系统调用的异常入侵检测系统,本研究重点研究了使用soundex算法的监督学习神经网络,该算法旨在将特征选择和变长数据转换为固定长度的学习模式。即通过使用soundex算法将变长顺序系统调用数据转换为固定长度的行为模式,本研究使用反向传播算法进行神经学习。利用UNM的sendmail数据,将该方法和N-gram技术应用于系统调用的异常入侵检测,验证了该方法的性能。
{"title":"Anomaly intrusion detection for system call using the soundex algorithm and neural networks","authors":"Byung-Rae Cha, B. Vaidya, Seung-Jo Han","doi":"10.1109/ISCC.2005.33","DOIUrl":"https://doi.org/10.1109/ISCC.2005.33","url":null,"abstract":"To improve the anomaly intrusion detection system using system calls, this study focuses on supervisor learning neural networks using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern. That is, by changing variable length sequential system call data into a fixed length behavior pattern using the soundex algorithm, this study conducted neural learning by using a backpropagation algorithm. The proposed method and N-gram technique are applied for anomaly intrusion detection of system call using sendmail data of UNM to demonstrate its performance.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116819129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Preserving area coverage in wireless sensor networks by using surface coverage relay dominating sets 利用表面覆盖中继控制集保持无线传感器网络的区域覆盖
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.126
J. Carle, A. Gallais, D. Simplot-Ryl
Sensor networks consist of autonomous nodes with limited battery and of base stations with theoretical infinite energy. Nodes can be sleep to extend the lifespan of the network without compromising neither area coverage nor network connectivity. This paper addresses the area coverage problem with equal sensing and communicating radii. The goal is to minimize the number of active sensors involved in coverage task, while computing a connected set able to report to monitoring stations. Our solution is fully localized, and each sensor is able to make decision on whether to sleep or to be active based on two messages sent by each sensor. The first message is a "hello" message to gather position of all neighboring nodes. Then each node computes its own relay area dominating set, by taking the furthest neighbor as the first node, and then adding neighbors farthest to the isobarycenter of already selected neighbors, until the area covered by neighbors is fully covered. The second message broadcasts this relay set to neighbors. Each node decides to be active if it has highest priority among its neighbors or is a relay node for its neighbor with the highest priority.
传感器网络由电池有限的自主节点和理论上能量无限的基站组成。节点可以休眠以延长网络的寿命,而不会影响区域覆盖和网络连接。本文解决了具有相等感知半径和通信半径的区域覆盖问题。目标是最小化参与覆盖任务的主动传感器数量,同时计算一个能够向监测站报告的连接集。我们的解决方案是完全本地化的,每个传感器都能够根据每个传感器发送的两条消息来决定是休眠还是活动。第一个消息是“hello”消息,用于收集所有相邻节点的位置。然后每个节点计算自己的中继区域支配集,将距离最远的邻居作为第一个节点,然后将距离最远的邻居添加到已经选择的邻居的等重心中,直到邻居覆盖的区域被完全覆盖。第二条消息将此中继设置广播给邻居。如果每个节点在其邻居中具有最高优先级,或者是具有最高优先级的邻居的中继节点,则每个节点决定处于活动状态。
{"title":"Preserving area coverage in wireless sensor networks by using surface coverage relay dominating sets","authors":"J. Carle, A. Gallais, D. Simplot-Ryl","doi":"10.1109/ISCC.2005.126","DOIUrl":"https://doi.org/10.1109/ISCC.2005.126","url":null,"abstract":"Sensor networks consist of autonomous nodes with limited battery and of base stations with theoretical infinite energy. Nodes can be sleep to extend the lifespan of the network without compromising neither area coverage nor network connectivity. This paper addresses the area coverage problem with equal sensing and communicating radii. The goal is to minimize the number of active sensors involved in coverage task, while computing a connected set able to report to monitoring stations. Our solution is fully localized, and each sensor is able to make decision on whether to sleep or to be active based on two messages sent by each sensor. The first message is a \"hello\" message to gather position of all neighboring nodes. Then each node computes its own relay area dominating set, by taking the furthest neighbor as the first node, and then adding neighbors farthest to the isobarycenter of already selected neighbors, until the area covered by neighbors is fully covered. The second message broadcasts this relay set to neighbors. Each node decides to be active if it has highest priority among its neighbors or is a relay node for its neighbor with the highest priority.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115565464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
An optically controlled module for wavelength conversion circuits 一种用于波长转换电路的光控模块
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.31
G. Papadimitriou, A. Miliou, A. Pomportsis
We report an innovative solely optical architecture to implement the centralized wavelength conversion module of the CWC (controlled wavelength conversion) protocol [Papadimitriou, G.I. et al., 1999]. The proposed module was designed to distribute the conversion wavelengths to the corresponding converters in an unbiased manner taking into consideration the information carried by the control wavelength. The design of the optically controlled module is based on the use of optical logic circuits. These optical circuits distribute the available wavelengths by eliminating the need of optical to electronic translation of the network's feedback information and thus reducing drastically processing time. Furthermore, due to the all-optical nature of the network hub the reliability of the system is improved.
我们报告了一种创新的单光学架构,用于实现CWC(可控波长转换)协议的集中波长转换模块[Papadimitriou, G.I. et al., 1999]。考虑到控制波长所携带的信息,该模块以无偏的方式将转换波长分配给相应的转换器。光控模块的设计是基于光逻辑电路的使用。这些光学电路通过消除网络反馈信息的光学到电子转换的需要来分配可用的波长,从而大大减少了处理时间。此外,由于网络集线器的全光特性,提高了系统的可靠性。
{"title":"An optically controlled module for wavelength conversion circuits","authors":"G. Papadimitriou, A. Miliou, A. Pomportsis","doi":"10.1109/ISCC.2005.31","DOIUrl":"https://doi.org/10.1109/ISCC.2005.31","url":null,"abstract":"We report an innovative solely optical architecture to implement the centralized wavelength conversion module of the CWC (controlled wavelength conversion) protocol [Papadimitriou, G.I. et al., 1999]. The proposed module was designed to distribute the conversion wavelengths to the corresponding converters in an unbiased manner taking into consideration the information carried by the control wavelength. The design of the optically controlled module is based on the use of optical logic circuits. These optical circuits distribute the available wavelengths by eliminating the need of optical to electronic translation of the network's feedback information and thus reducing drastically processing time. Furthermore, due to the all-optical nature of the network hub the reliability of the system is improved.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124528652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating the task route reliability of mobile agent-based systems using Monte Carlo simulation 基于蒙特卡洛仿真的移动代理系统任务路由可靠性估计
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.66
M. Daoud, Q. Mahmoud
In this paper we propose two algorithms for estimating the task route reliability of mobile agent-based systems (MABS), which are based on the conditions of the underlying computer network. In addition, we propose a third algorithm for generating a random static planning strategy for mobile agents. The complexity of mobile agent network systems makes it hard to obtain the task route reliability of the MABS theoretically; instead we estimate it using Monte Carlo simulation. In this paper, we assume that the MABS consists of a number of independent mobile agents operating simultaneously. The results we have achieved demonstrate the robustness of the proposed algorithms.
本文提出了两种基于底层计算机网络条件的移动agent系统(MABS)任务路由可靠性估计算法。此外,我们提出了第三种算法,用于生成移动代理的随机静态规划策略。移动智能体网络系统的复杂性使得MABS的任务路由可靠性难以从理论上得到;相反,我们使用蒙特卡罗模拟来估计它。在本文中,我们假设MABS由多个同时运行的独立移动代理组成。实验结果证明了所提算法的鲁棒性。
{"title":"Estimating the task route reliability of mobile agent-based systems using Monte Carlo simulation","authors":"M. Daoud, Q. Mahmoud","doi":"10.1109/ISCC.2005.66","DOIUrl":"https://doi.org/10.1109/ISCC.2005.66","url":null,"abstract":"In this paper we propose two algorithms for estimating the task route reliability of mobile agent-based systems (MABS), which are based on the conditions of the underlying computer network. In addition, we propose a third algorithm for generating a random static planning strategy for mobile agents. The complexity of mobile agent network systems makes it hard to obtain the task route reliability of the MABS theoretically; instead we estimate it using Monte Carlo simulation. In this paper, we assume that the MABS consists of a number of independent mobile agents operating simultaneously. The results we have achieved demonstrate the robustness of the proposed algorithms.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A pro-active routing protocol for continuous data dissemination in wireless sensor networks 无线传感器网络中连续数据传播的一种主动路由协议
Pub Date : 2005-06-27 DOI: 10.1109/ISCC.2005.15
D. Macedo, L. H. A. Correia, A. Santos, A. Loureiro, J. Nogueira
Wireless sensor networks are ad hoc networks with severe resource constraints. These constraints preclude the use of traditional ad hoc protocols, and demand optimizations that incur in solutions specific to a class of applications. This article presents PROC, a protocol designed for continuous data dissemination networks, that interacts with the application to establish routes, allowing the application to reconfigure PROC on runtime. A performance evaluation in topologies varying from 50 to 200 nodes showed that PROC increases network lifetime around 7% to 12%, and has higher throughput than EAD and TinyOS Beaconing. Furthermore, PROC presents a softer performance degradation when the number of nodes in the network increases.
无线传感器网络是一种具有严重资源约束的自组织网络。这些约束排除了传统临时协议的使用,并要求在特定于一类应用程序的解决方案中进行优化。本文介绍了一种为连续数据传播网络设计的协议PROC,它与应用程序交互以建立路由,允许应用程序在运行时重新配置PROC。在50到200个节点的拓扑结构中进行的性能评估表明,PROC将网络生命周期提高了7%到12%,并且具有比EAD和TinyOS Beaconing更高的吞吐量。此外,当网络中节点数量增加时,PROC表现出较软的性能下降。
{"title":"A pro-active routing protocol for continuous data dissemination in wireless sensor networks","authors":"D. Macedo, L. H. A. Correia, A. Santos, A. Loureiro, J. Nogueira","doi":"10.1109/ISCC.2005.15","DOIUrl":"https://doi.org/10.1109/ISCC.2005.15","url":null,"abstract":"Wireless sensor networks are ad hoc networks with severe resource constraints. These constraints preclude the use of traditional ad hoc protocols, and demand optimizations that incur in solutions specific to a class of applications. This article presents PROC, a protocol designed for continuous data dissemination networks, that interacts with the application to establish routes, allowing the application to reconfigure PROC on runtime. A performance evaluation in topologies varying from 50 to 200 nodes showed that PROC increases network lifetime around 7% to 12%, and has higher throughput than EAD and TinyOS Beaconing. Furthermore, PROC presents a softer performance degradation when the number of nodes in the network increases.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117051478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
10th IEEE Symposium on Computers and Communications (ISCC'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1