首页 > 最新文献

2016 26th International Telecommunication Networks and Applications Conference (ITNAC)最新文献

英文 中文
High security chaotic multiple access scheme for VLC systems VLC系统的高安全性混沌多址方案
Diyang Li, Lin Zhang, Junchao Qiu
In this paper, we present a high security code division multiple access scheme for visible light communication (VLC) systems, and derive the information leakage expression. In our design, we propose to apply chaotic sequences to identify the users in VLC systems. Since the chaotic signals are noise-like and sensitive to the primary condition, only the legitimate users can retrieve the information according to the known primary condition, while the eavesdroppers can not intercept the information. Thus the security of VLC system is enhanced. Simulations are performed and the results show that the presented design can provide high security information transmission for multiple users.
本文提出了一种用于可见光通信(VLC)系统的高安全码分多址方案,并推导了该方案的信息泄漏表达式。在我们的设计中,我们提出应用混沌序列来识别VLC系统中的用户。由于混沌信号是类噪声的,对主条件很敏感,只有合法用户才能根据已知的主条件检索信息,而窃听者无法截获信息。从而提高了VLC系统的安全性。仿真结果表明,该设计能够为多用户提供高安全性的信息传输。
{"title":"High security chaotic multiple access scheme for VLC systems","authors":"Diyang Li, Lin Zhang, Junchao Qiu","doi":"10.1109/ATNAC.2016.7878796","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878796","url":null,"abstract":"In this paper, we present a high security code division multiple access scheme for visible light communication (VLC) systems, and derive the information leakage expression. In our design, we propose to apply chaotic sequences to identify the users in VLC systems. Since the chaotic signals are noise-like and sensitive to the primary condition, only the legitimate users can retrieve the information according to the known primary condition, while the eavesdroppers can not intercept the information. Thus the security of VLC system is enhanced. Simulations are performed and the results show that the presented design can provide high security information transmission for multiple users.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124412224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy preserving proximity testing using elliptic curves 使用椭圆曲线的隐私保护接近测试
M. N. Sakib, Chin-Tser Huang
The availability of GPS in smartphones and other wireless devices has made location based services extremely popular. One of the most widely used location based services is finding nearby friends. Popular social networks like Facebook offer this service purely based on exact user locations. To subscribe to this feature, users are forced to let the service provider know their actual locations, compromising their location privacy. In this paper, we present a protocol based on elliptic curve cryptography concepts for proximity testing which can preserve location privacy of the users. Our protocol enables two parties, Alice and Bob, to test whether they are within an agreed upon distance range from each other without revealing their exact location. Our security analysis shows that our protocol is secure against most known location privacy threats including location triangulation attacks. From experimental evaluation performed on prototype implementation, we found that our protocol is practical for resource-constrained smartphone devices requiring a reasonably small execution time (53 ms) without the communication overhead.
GPS在智能手机和其他无线设备上的可用性使得基于位置的服务非常受欢迎。最广泛使用的定位服务之一是寻找附近的朋友。像Facebook这样的流行社交网络提供的这项服务完全基于用户的精确位置。要订阅此功能,用户必须让服务提供商知道他们的实际位置,从而损害他们的位置隐私。本文提出了一种基于椭圆曲线密码学概念的近距离测试协议,可以保护用户的位置隐私。我们的协议使双方,Alice和Bob,能够在不透露确切位置的情况下测试他们是否在约定的距离范围内。我们的安全分析表明,我们的协议对大多数已知的位置隐私威胁都是安全的,包括位置三角测量攻击。从对原型实现进行的实验评估中,我们发现我们的协议对于资源受限的智能手机设备来说是实用的,需要相当小的执行时间(53毫秒),而且没有通信开销。
{"title":"Privacy preserving proximity testing using elliptic curves","authors":"M. N. Sakib, Chin-Tser Huang","doi":"10.1109/ATNAC.2016.7878794","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878794","url":null,"abstract":"The availability of GPS in smartphones and other wireless devices has made location based services extremely popular. One of the most widely used location based services is finding nearby friends. Popular social networks like Facebook offer this service purely based on exact user locations. To subscribe to this feature, users are forced to let the service provider know their actual locations, compromising their location privacy. In this paper, we present a protocol based on elliptic curve cryptography concepts for proximity testing which can preserve location privacy of the users. Our protocol enables two parties, Alice and Bob, to test whether they are within an agreed upon distance range from each other without revealing their exact location. Our security analysis shows that our protocol is secure against most known location privacy threats including location triangulation attacks. From experimental evaluation performed on prototype implementation, we found that our protocol is practical for resource-constrained smartphone devices requiring a reasonably small execution time (53 ms) without the communication overhead.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122977079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SFO: SubFlow Optimizer for MPTCP in SDN SFO: SDN中MPTCP的子流优化器
K. D. Joshi, Kotaro Kataoka
Multipath TCP (MPTCP) brings promising features of throughput improvement and load balancing by utilizing the multiple available paths. However, adding a subflow without awareness of the network state will result in wasting network resources and degrading MPTCP performance. Finding and operating the proper number of subflows are necessary to achieve the best performance of MPTCP. However, an MPTCP host does not have knowledge about the number of available paths in the network, and it may create the suboptimal number of subflows. This paper proposes SubFlow Optimizer (SFO) for MPTCP in SDN that estimates the Optimum Number of Subflows (ONS) and informs it to the MPTCP hosts. The estimated ONS reflects the number of optimal paths found out of the set of feasible paths between the server and client. Selecting such an optimal path for a new subflow improves its throughput whereas detecting ONS makes efficient use of the overall network. SFO also enables the quick negotiation of ONS between MPTCP hosts during its session establishment that reduces the time required for ONS negotiation down to one Round-Trip Time (RTT). Therefore, MPTCP hosts can immediately achieve the best performance without incremental try and catch of subflow creation. The results of performance evaluation show that SFO brings the significant throughput improvement to the overall MPTCP session compared with the cases of improper estimation of the available number of subflows.
多路径TCP (Multipath TCP, MPTCP)通过利用多条可用路径,带来了吞吐量提高和负载平衡的良好特性。但是,在不了解网络状态的情况下添加子流,不仅会浪费网络资源,还会降低MPTCP的性能。寻找和操作适当数量的子流是实现MPTCP最佳性能的必要条件。但是,MPTCP主机不知道网络中可用路径的数量,因此可能会创建次优数量的子流。提出了一种基于SDN的MPTCP子流优化器(SubFlow Optimizer, SFO),它可以估算出最优子流数量并通知MPTCP主机。估计的ONS反映了从服务器和客户端之间的可行路径集中找到的最优路径的数量。为新的子流选择这样的最优路径可以提高其吞吐量,而检测网络则可以有效地利用整个网络。SFO还支持MPTCP主机之间在会话建立过程中快速协商ONS,将ONS协商所需的时间减少到一个往返时间(RTT)。因此,MPTCP主机可以立即实现最佳性能,而无需增量尝试和捕获子流创建。性能评估结果表明,与子流可用数量估计不当的情况相比,SFO对整个MPTCP会话的吞吐量有显著提高。
{"title":"SFO: SubFlow Optimizer for MPTCP in SDN","authors":"K. D. Joshi, Kotaro Kataoka","doi":"10.1109/ATNAC.2016.7878804","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878804","url":null,"abstract":"Multipath TCP (MPTCP) brings promising features of throughput improvement and load balancing by utilizing the multiple available paths. However, adding a subflow without awareness of the network state will result in wasting network resources and degrading MPTCP performance. Finding and operating the proper number of subflows are necessary to achieve the best performance of MPTCP. However, an MPTCP host does not have knowledge about the number of available paths in the network, and it may create the suboptimal number of subflows. This paper proposes SubFlow Optimizer (SFO) for MPTCP in SDN that estimates the Optimum Number of Subflows (ONS) and informs it to the MPTCP hosts. The estimated ONS reflects the number of optimal paths found out of the set of feasible paths between the server and client. Selecting such an optimal path for a new subflow improves its throughput whereas detecting ONS makes efficient use of the overall network. SFO also enables the quick negotiation of ONS between MPTCP hosts during its session establishment that reduces the time required for ONS negotiation down to one Round-Trip Time (RTT). Therefore, MPTCP hosts can immediately achieve the best performance without incremental try and catch of subflow creation. The results of performance evaluation show that SFO brings the significant throughput improvement to the overall MPTCP session compared with the cases of improper estimation of the available number of subflows.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126898875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Software Defined Networking properties in multi-domain networks 多域网络中的软件定义网络属性
F. Wibowo, M. Gregory
Software Defined Networking (SDN) is an approach developed to facilitate next generation computer networking by decoupling the traffic control system from the underlying traffic transmission system. One key focus in the transition of next-generation computer networking is the service management improvement of network connectivity services. Connectivity across the global digital network requires a multi-domain capability. Decoupled of the control plane from data plane is the main character of SDN, along with the programmability for network services, utilizing management controllers. SDN had intrinsic potential to improve how a multi-domain implementation might occur utilizing the programmability capability. In this paper, we provide the outcomes of research into how SDN's decoupled programmable control regime affects the performance of multi-domain connectivity services.
软件定义网络(SDN)是一种通过将流量控制系统与底层流量传输系统解耦来促进下一代计算机网络的方法。下一代计算机网络转型的一个重点是网络连接服务的服务管理改进。跨全球数字网络的连接需要多域能力。SDN的主要特点是控制平面与数据平面的解耦,以及利用管理控制器实现网络业务的可编程性。SDN具有利用可编程能力改进多域实现的内在潜力。在本文中,我们提供了SDN的解耦可编程控制机制如何影响多域连接服务性能的研究结果。
{"title":"Software Defined Networking properties in multi-domain networks","authors":"F. Wibowo, M. Gregory","doi":"10.1109/ATNAC.2016.7878790","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878790","url":null,"abstract":"Software Defined Networking (SDN) is an approach developed to facilitate next generation computer networking by decoupling the traffic control system from the underlying traffic transmission system. One key focus in the transition of next-generation computer networking is the service management improvement of network connectivity services. Connectivity across the global digital network requires a multi-domain capability. Decoupled of the control plane from data plane is the main character of SDN, along with the programmability for network services, utilizing management controllers. SDN had intrinsic potential to improve how a multi-domain implementation might occur utilizing the programmability capability. In this paper, we provide the outcomes of research into how SDN's decoupled programmable control regime affects the performance of multi-domain connectivity services.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"5 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Autonomic management of future wireless networks 未来无线网络的自主管理
M. A. Khan, H. Tembine
The traditional human controlled network management approaches may not cope with the envisioned virtualized and more dynamic mobile communication paradigm. We propose an autonomic network management and policy execution framework that re-factors the network functionalities by decomposing the network architecture into hierarchical layers. We propose an hybrid self-learning scheme and present an aggregate approach to efficient learning without reconstructing from scratch for each layer, cluster, and player, for a variety of learning algorithms widely used in practical network management. To evaluate performance of proposed framework, we develop a full-scale demonstrator. Results confirm that system learns autonomously.
传统的人为控制的网络管理方法可能无法应对预期的虚拟化和更动态的移动通信范式。我们提出了一个自主的网络管理和策略执行框架,该框架通过将网络架构分解为分层层来重新考虑网络功能。针对实际网络管理中广泛使用的各种学习算法,我们提出了一种混合自学习方案,并提出了一种聚合方法来实现高效学习,而无需对每一层、集群和参与者从头开始重建。为了评估所提出的框架的性能,我们开发了一个全尺寸的演示器。实验结果证实了系统的自主学习能力。
{"title":"Autonomic management of future wireless networks","authors":"M. A. Khan, H. Tembine","doi":"10.1109/ATNAC.2016.7878799","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878799","url":null,"abstract":"The traditional human controlled network management approaches may not cope with the envisioned virtualized and more dynamic mobile communication paradigm. We propose an autonomic network management and policy execution framework that re-factors the network functionalities by decomposing the network architecture into hierarchical layers. We propose an hybrid self-learning scheme and present an aggregate approach to efficient learning without reconstructing from scratch for each layer, cluster, and player, for a variety of learning algorithms widely used in practical network management. To evaluate performance of proposed framework, we develop a full-scale demonstrator. Results confirm that system learns autonomously.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126219102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A cosine similarity-based compensation strategy for RSS detection variance in indoor localization 基于余弦相似度的室内定位RSS检测方差补偿策略
Lei Wang, Xiao Wu, B. Zheng, Jingwu Cui, Huiming Zhou
Currently, all kinds of Location-based Services (LBS) are gradually demanding more location information of mobile users. The WiFi-based indoor positioning technologies have been investigated intensely. However, both positioning accuracy and stability are often degraded by RSS detection variance between different devices. To solve the two problems, this paper proposes a compensation strategy for RSS detection variance based on cosine similarity. Specifically, it uses cosine similarity as the metric to determine whether different devices could conduct compensation for RSS variance. To obtain the device pairs that satisfy the metric standard, it uses ratio correction method to compensate for RSS detection variance thus effectively solves the positioning accuracy and stability reduction causing by RSS detection variance between different devices. Experiments have shown that the proposed strategy reduces positioning error and improves positioning stability significantly.
目前,各种基于位置的服务(LBS)对移动用户的位置信息要求越来越高。基于wifi的室内定位技术得到了广泛的研究。然而,不同设备之间的RSS检测差异往往会降低定位精度和稳定性。针对这两个问题,本文提出了一种基于余弦相似度的RSS检测方差补偿策略。具体而言,它使用余弦相似度作为度量来确定不同设备是否可以对RSS方差进行补偿。为获得满足公制标准的设备对,采用比值校正法补偿RSS检测方差,有效解决了不同设备间RSS检测方差导致的定位精度和稳定性降低。实验结果表明,该策略显著降低了定位误差,提高了定位稳定性。
{"title":"A cosine similarity-based compensation strategy for RSS detection variance in indoor localization","authors":"Lei Wang, Xiao Wu, B. Zheng, Jingwu Cui, Huiming Zhou","doi":"10.1109/ATNAC.2016.7878781","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878781","url":null,"abstract":"Currently, all kinds of Location-based Services (LBS) are gradually demanding more location information of mobile users. The WiFi-based indoor positioning technologies have been investigated intensely. However, both positioning accuracy and stability are often degraded by RSS detection variance between different devices. To solve the two problems, this paper proposes a compensation strategy for RSS detection variance based on cosine similarity. Specifically, it uses cosine similarity as the metric to determine whether different devices could conduct compensation for RSS variance. To obtain the device pairs that satisfy the metric standard, it uses ratio correction method to compensate for RSS detection variance thus effectively solves the positioning accuracy and stability reduction causing by RSS detection variance between different devices. Experiments have shown that the proposed strategy reduces positioning error and improves positioning stability significantly.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"113 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113969551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Inference of social network behavior from Internet traffic traces 从网络流量轨迹推断社会网络行为
Mostfa Albdair, R. Addie, D. Fatseas
All network traffic is a byproduct of social networking. In this paper, Anonymized Internet (IP) Trace Datasets obtained from the Center for Applied Internet Data Analysis (CAIDA) has been used to identify and estimate characteristics of the underlying social network from the overall traffic. The analysis methods used here fall into two groups, the first being based on frequency analysis and second method being based on the use of traffic matrices, with the later analysis method being further sub-divided into groups based on the traffic mean, variance and covariance. The frequency analysis of origin (O), destination (D) and O-D Pair statistics exhibit heavy tailed behavior. Because the large number of IP addresses contained in the CAIDA Datasets, only the most predominate IP Addresses are used when estimating all three sub-divided groups of traffic matrices. Principal Component Analysis (PCA) and related methods are applied to identify key features of each type of traffic matrix. A new system called Antraff has been developed to carry out all the analysis procedures.
所有的网络流量都是社交网络的副产品。本文使用来自应用互联网数据分析中心(CAIDA)的匿名互联网(IP)跟踪数据集,从总体流量中识别和估计底层社交网络的特征。这里使用的分析方法分为两组,第一组是基于频率分析的方法,第二组是基于使用流量矩阵的方法,后一组分析方法根据流量均值、方差和协方差进一步细分为两组。起源(O)、目的地(D)和O-D对统计的频率分析表现出重尾行为。由于CAIDA数据集中包含大量IP地址,因此在估计所有三个细分的流量矩阵组时,只使用最主要的IP地址。应用主成分分析(PCA)及其相关方法识别各类流量矩阵的关键特征。一种名为Antraff的新系统已经开发出来,可以执行所有的分析程序。
{"title":"Inference of social network behavior from Internet traffic traces","authors":"Mostfa Albdair, R. Addie, D. Fatseas","doi":"10.1109/ATNAC.2016.7878773","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878773","url":null,"abstract":"All network traffic is a byproduct of social networking. In this paper, Anonymized Internet (IP) Trace Datasets obtained from the Center for Applied Internet Data Analysis (CAIDA) has been used to identify and estimate characteristics of the underlying social network from the overall traffic. The analysis methods used here fall into two groups, the first being based on frequency analysis and second method being based on the use of traffic matrices, with the later analysis method being further sub-divided into groups based on the traffic mean, variance and covariance. The frequency analysis of origin (O), destination (D) and O-D Pair statistics exhibit heavy tailed behavior. Because the large number of IP addresses contained in the CAIDA Datasets, only the most predominate IP Addresses are used when estimating all three sub-divided groups of traffic matrices. Principal Component Analysis (PCA) and related methods are applied to identify key features of each type of traffic matrix. A new system called Antraff has been developed to carry out all the analysis procedures.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124834789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emergency network design - saving lives by saving power 应急网络设计——以省电拯救生命
Nabeel Hadaad, A. Pitsillides, P. Kolios, A. Kuras, R. Addie
In disasters and emergencies severity of trauma and loss of life can be reduced by more effective communication between emergency workers, volunteers, and survivors. Typically, almost all of these parties will hold mobile phones (in addition to special purpose wireless communication devices, in the case of emergency workers), which are likely to be used intensively to seek and to provide aid to those in need. However, the utility of mobile phones may be limited by battery life. The usefulness of these mobile phones can therefore be enhanced by extending battery life. One way to extend battery life is to introduce a duty cycle, i.e. a pattern of use where the phone is alternately sleeping and active. It is shown below that under some broad assumptions about the type of emergency, it is best to introduce such a duty cycle straight away, and to start with quite short sleep cycles, which increase exponentially, but with a relatively slow rate of growth of the sleep cycle duration. Simulation experiments are conducted below which demonstrate the effectiveness of this strategy.
在灾害和紧急情况中,急救人员、志愿者和幸存者之间更有效的沟通可以减少创伤和生命损失的严重程度。通常情况下,几乎所有这些当事人都将持有移动电话(除了特殊用途的无线通信设备,对于紧急工作人员来说),可能会大量使用移动电话来寻求和向有需要的人提供援助。然而,手机的效用可能会受到电池寿命的限制。因此,这些手机的实用性可以通过延长电池寿命来增强。延长电池寿命的一种方法是引入一个占空比,即手机交替处于睡眠和激活状态的使用模式。如下图所示,在关于紧急情况类型的一些广义假设下,最好立即引入这样一个占空比,并从相当短的睡眠周期开始,睡眠周期以指数方式增加,但睡眠周期持续时间的增长速度相对较慢。下面的仿真实验验证了该策略的有效性。
{"title":"Emergency network design - saving lives by saving power","authors":"Nabeel Hadaad, A. Pitsillides, P. Kolios, A. Kuras, R. Addie","doi":"10.1109/ATNAC.2016.7878775","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878775","url":null,"abstract":"In disasters and emergencies severity of trauma and loss of life can be reduced by more effective communication between emergency workers, volunteers, and survivors. Typically, almost all of these parties will hold mobile phones (in addition to special purpose wireless communication devices, in the case of emergency workers), which are likely to be used intensively to seek and to provide aid to those in need. However, the utility of mobile phones may be limited by battery life. The usefulness of these mobile phones can therefore be enhanced by extending battery life. One way to extend battery life is to introduce a duty cycle, i.e. a pattern of use where the phone is alternately sleeping and active. It is shown below that under some broad assumptions about the type of emergency, it is best to introduce such a duty cycle straight away, and to start with quite short sleep cycles, which increase exponentially, but with a relatively slow rate of growth of the sleep cycle duration. Simulation experiments are conducted below which demonstrate the effectiveness of this strategy.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Making a case for the moving small cells 为移动的小细胞做辩护
Shan Jaffry, S. F. Hasan, X. Gui
On one hand, the small cells increase the overall data rate of the network. However, on the other hand, they result in increased cross-tier interference. This makes resource allocation to the cellular users more challenging. In this paper, we review a number of resource allocation schemes that are meant to reduce interference in both fixed and moving small cells. Distributed resource allocation for small cell networks aims at improving the overall system performance in terms of latency and power. A discussion that compares centralized schemes with a distributed one is also covered. We argue in this paper that distributed allocation is a better fit for the moving small cells.
一方面,小蜂窝提高了网络的整体数据速率。然而,另一方面,它们会增加跨层干扰。这使得向蜂窝用户分配资源更具挑战性。在本文中,我们回顾了一些旨在减少固定和移动小单元干扰的资源分配方案。小蜂窝网络的分布式资源分配旨在从延迟和功耗方面提高系统的整体性能。还讨论了集中式方案与分布式方案的比较。在本文中,我们认为分布式分配更适合于移动的小单元。
{"title":"Making a case for the moving small cells","authors":"Shan Jaffry, S. F. Hasan, X. Gui","doi":"10.1109/ATNAC.2016.7878817","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878817","url":null,"abstract":"On one hand, the small cells increase the overall data rate of the network. However, on the other hand, they result in increased cross-tier interference. This makes resource allocation to the cellular users more challenging. In this paper, we review a number of resource allocation schemes that are meant to reduce interference in both fixed and moving small cells. Distributed resource allocation for small cell networks aims at improving the overall system performance in terms of latency and power. A discussion that compares centralized schemes with a distributed one is also covered. We argue in this paper that distributed allocation is a better fit for the moving small cells.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134330173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Request response scheme on server for the centralized P2P-VoD system 集中式P2P-VoD系统的服务器端请求响应方案
Yi Cheng, Jianxin Chen, Linhui Sun, Yunyi Zheng
Peer-to-Peer(P2P)-based Video-on-Demand application has gained more attentions recently. Due to the system complexity, there are still many challenges for practical deployment such as peer selection. Previous works focused on how to find the most suitable service or the request response scheme on the peer-side. In this paper, we study the request response scheme on the server-side by discussing three kinds of response schemes, e.g. urgency first (UF), fresh request first (FRF) and complemental request first (RCF). Besides that, we proposed a redirection scheme named server request redirection (SRR) to improve the quality of service (QoS) of P2P-VoD system further, which is verified by the simulation results.
基于点对点(P2P)的视频点播应用近年来受到越来越多的关注。由于系统的复杂性,在实际部署中仍然存在许多挑战,如对等体选择。以前的工作主要集中在如何在对等端找到最合适的服务或请求响应方案。本文通过讨论紧急优先(UF)、新鲜请求优先(FRF)和补充请求优先(RCF)三种响应方案,研究了服务器端的请求响应方案。此外,为了进一步提高P2P-VoD系统的服务质量(QoS),提出了服务器请求重定向(SRR)重定向方案,仿真结果验证了该方案的有效性。
{"title":"Request response scheme on server for the centralized P2P-VoD system","authors":"Yi Cheng, Jianxin Chen, Linhui Sun, Yunyi Zheng","doi":"10.1109/ATNAC.2016.7878808","DOIUrl":"https://doi.org/10.1109/ATNAC.2016.7878808","url":null,"abstract":"Peer-to-Peer(P2P)-based Video-on-Demand application has gained more attentions recently. Due to the system complexity, there are still many challenges for practical deployment such as peer selection. Previous works focused on how to find the most suitable service or the request response scheme on the peer-side. In this paper, we study the request response scheme on the server-side by discussing three kinds of response schemes, e.g. urgency first (UF), fresh request first (FRF) and complemental request first (RCF). Besides that, we proposed a redirection scheme named server request redirection (SRR) to improve the quality of service (QoS) of P2P-VoD system further, which is verified by the simulation results.","PeriodicalId":317649,"journal":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134389198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 26th International Telecommunication Networks and Applications Conference (ITNAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1