首页 > 最新文献

2009 IFIP/IEEE International Symposium on Integrated Network Management最新文献

英文 中文
Using heuristics to improve service portfolio selection in P2P grids 利用启发式算法改进P2P网格中的服务组合选择
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188846
Alvaro Coelho, F. Brasileiro, P. D. Maciel
In this paper we consider a peer-to-peer grid system which provides multiple services to its users. An incentive mechanism promotes collaboration among peers. It has been shown that the use of a reciprocation-based incentive mechanism in such a system prevents free-riding and, at the same time, promotes the clustering of peers that have mutually profitable interactions. On the other hand, an issue that has not been sufficiently studied in this context is that of service portfolio selection. Normally, peers are subject to resource limitations, which force them to provide only a subset of all services that can be possibly provided. Clearly, the subset of selected services impacts the profit that the grid yields to the peers, since each service will have a different cost and will return a different utility. Moreover, the utility generated by a service is strongly influenced by the behavior of the other peers, which in turn may change over time. In this paper we explore the use of heuristics to select the portfolio of services to be offered by peers in such a grid. The main contributions of this work are the use of heuristics to improve the average profit of peers and a study on the impact of some system characteristics on the heuristics behavior.
本文研究了一种为用户提供多种服务的点对点网格系统。激励机制促进同伴之间的合作。研究表明,在这种系统中使用基于回报的激励机制可以防止搭便车,同时促进具有互利互动的同伴的聚集。另一方面,在此上下文中尚未得到充分研究的一个问题是服务组合选择。通常,对等点受到资源限制,这迫使它们只提供可能提供的所有服务的一个子集。显然,所选服务的子集会影响网格向对等节点产生的利润,因为每个服务将具有不同的成本,并将返回不同的效用。此外,服务生成的实用程序受到其他对等体行为的强烈影响,而这些行为又可能随着时间的推移而改变。在本文中,我们探索了在这样一个网格中使用启发式方法来选择由对等体提供的服务组合。这项工作的主要贡献是利用启发式来提高同行的平均利润,并研究了一些系统特征对启发式行为的影响。
{"title":"Using heuristics to improve service portfolio selection in P2P grids","authors":"Alvaro Coelho, F. Brasileiro, P. D. Maciel","doi":"10.1109/INM.2009.5188846","DOIUrl":"https://doi.org/10.1109/INM.2009.5188846","url":null,"abstract":"In this paper we consider a peer-to-peer grid system which provides multiple services to its users. An incentive mechanism promotes collaboration among peers. It has been shown that the use of a reciprocation-based incentive mechanism in such a system prevents free-riding and, at the same time, promotes the clustering of peers that have mutually profitable interactions. On the other hand, an issue that has not been sufficiently studied in this context is that of service portfolio selection. Normally, peers are subject to resource limitations, which force them to provide only a subset of all services that can be possibly provided. Clearly, the subset of selected services impacts the profit that the grid yields to the peers, since each service will have a different cost and will return a different utility. Moreover, the utility generated by a service is strongly influenced by the behavior of the other peers, which in turn may change over time. In this paper we explore the use of heuristics to select the portfolio of services to be offered by peers in such a grid. The main contributions of this work are the use of heuristics to improve the average profit of peers and a study on the impact of some system characteristics on the heuristics behavior.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On harnessing information models and ontologies for policy conflict analysis 利用信息模型和本体进行政策冲突分析
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188889
S. Davy, B. Jennings, J. Strassner
We present a policy conflict analysis process that makes use of pre-defined semantic models of an application to perform effective and efficient conflict analysis. The process is effective as it can be used to analyse for policy conflicts that may occur in different applications due to the separation of application specific information and constraints from the algorithms to semantic models, such as information model and ontologies. The process is efficient as it incorporates a pre-analysis policy selection step that reduces the number of policies that need to be analysed more extensively. Experimental results show that this process results in a significant reduction in the number of policies that needed to be analysed for potential conflict and that it is flexible enough to detect for policy conflict both for many popular applications and between different applications.
我们提出了一个策略冲突分析过程,该过程利用应用程序的预定义语义模型来执行有效和高效的冲突分析。该过程是有效的,因为它可以用于分析由于将特定于应用程序的信息和约束从算法分离到语义模型(如信息模型和本体)而可能在不同应用程序中发生的策略冲突。该流程是高效的,因为它包含了一个预分析策略选择步骤,减少了需要更广泛地分析的策略数量。实验结果表明,该过程显著减少了需要分析潜在冲突的策略数量,并且它足够灵活,可以检测许多流行应用程序和不同应用程序之间的策略冲突。
{"title":"On harnessing information models and ontologies for policy conflict analysis","authors":"S. Davy, B. Jennings, J. Strassner","doi":"10.1109/INM.2009.5188889","DOIUrl":"https://doi.org/10.1109/INM.2009.5188889","url":null,"abstract":"We present a policy conflict analysis process that makes use of pre-defined semantic models of an application to perform effective and efficient conflict analysis. The process is effective as it can be used to analyse for policy conflicts that may occur in different applications due to the separation of application specific information and constraints from the algorithms to semantic models, such as information model and ontologies. The process is efficient as it incorporates a pre-analysis policy selection step that reduces the number of policies that need to be analysed more extensively. Experimental results show that this process results in a significant reduction in the number of policies that needed to be analysed for potential conflict and that it is flexible enough to detect for policy conflict both for many popular applications and between different applications.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115509963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Techniques for better alias resolution in Internet topology discovery 互联网拓扑发现中更好的别名解析技术
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188856
S. García-Jiménez, E. Magaña, D. Morató, M. Izal
One of the challenging problems related with network topology discovery in Internet is the process of IP address alias identification. Topology information is usually obtained from a set of traceroutes that provide IP addresses of routers in the path from a source to a destination. If these traceroutes are repeated between several source/destination pairs we can get a sampling of all IP addresses for crossed routers. In order to generate the topology graph in which each router is a node, it is needed to identify all IP addresses that belong to the same router. In this work we propose improvements over existing methods to obtain alias identification related mainly with the types and options in probing packets.
在Internet网络拓扑发现中,IP地址别名识别是一个具有挑战性的问题。拓扑信息通常是从一组traceroutes中获得的,这些traceroutes提供了从源到目的路径上的路由器的IP地址。如果这些跟踪路由在几个源/目的对之间重复,我们可以得到交叉路由器的所有IP地址的采样。为了生成以每台路由器为节点的拓扑图,需要识别属于同一台路由器的所有IP地址。在这项工作中,我们提出了对现有方法的改进,以获得主要与探测数据包中的类型和选项相关的别名识别。
{"title":"Techniques for better alias resolution in Internet topology discovery","authors":"S. García-Jiménez, E. Magaña, D. Morató, M. Izal","doi":"10.1109/INM.2009.5188856","DOIUrl":"https://doi.org/10.1109/INM.2009.5188856","url":null,"abstract":"One of the challenging problems related with network topology discovery in Internet is the process of IP address alias identification. Topology information is usually obtained from a set of traceroutes that provide IP addresses of routers in the path from a source to a destination. If these traceroutes are repeated between several source/destination pairs we can get a sampling of all IP addresses for crossed routers. In order to generate the topology graph in which each router is a node, it is needed to identify all IP addresses that belong to the same router. In this work we propose improvements over existing methods to obtain alias identification related mainly with the types and options in probing packets.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128279056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Probabilistic decentralized network management 概率分散网络管理
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188783
M. Brunner, D. Dudkowski, C. Mingardi, G. Nunzi
This work proposes a probabilistic management paradigm for solving some major challenges of decentralized network management. Specifically, we show how to cope with 1) the overhead of redundant information gathering and processing, 2) the decentralized management in dynamic and unpredictable environments, and 3) the considerable effort required for decentralized coordination of management functions. To this end, we describe a framework for probabilistic decentralized management in the context of In-Network Management (INM). We demonstrate how this framework can be applied to a network of information, a novel clean-slate approach towards an information-centric future Internet. We show by means of a simulation study in the area of performance and fault management that we can significantly reduce the effort and resources dedicated to management, while we are able to achieve a sound level of accuracy of the overall network view.
这项工作提出了一个概率管理范式来解决分散网络管理的一些主要挑战。具体来说,我们展示了如何处理1)冗余信息收集和处理的开销,2)动态和不可预测环境中的分散管理,以及3)分散协调管理功能所需的大量工作。为此,我们在网内管理(INM)的背景下描述了一个概率分散管理框架。我们将演示如何将此框架应用于信息网络,这是通向以信息为中心的未来Internet的一种全新的全新方法。我们通过性能和故障管理领域的模拟研究表明,我们可以显着减少用于管理的努力和资源,同时我们能够实现整体网络视图的良好准确性。
{"title":"Probabilistic decentralized network management","authors":"M. Brunner, D. Dudkowski, C. Mingardi, G. Nunzi","doi":"10.1109/INM.2009.5188783","DOIUrl":"https://doi.org/10.1109/INM.2009.5188783","url":null,"abstract":"This work proposes a probabilistic management paradigm for solving some major challenges of decentralized network management. Specifically, we show how to cope with 1) the overhead of redundant information gathering and processing, 2) the decentralized management in dynamic and unpredictable environments, and 3) the considerable effort required for decentralized coordination of management functions. To this end, we describe a framework for probabilistic decentralized management in the context of In-Network Management (INM). We demonstrate how this framework can be applied to a network of information, a novel clean-slate approach towards an information-centric future Internet. We show by means of a simulation study in the area of performance and fault management that we can significantly reduce the effort and resources dedicated to management, while we are able to achieve a sound level of accuracy of the overall network view.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126662797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Policy control management for Web Services Web服务的策略控制管理
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188786
Arlindo L. Marcon, A. Santin, L. Lima, R. Obelheiro, Maicon Stihler
The decentralization of corporate policy administration aiming to maintain the unified management of user permissions is a hard task. The heterogeneity and complexity of corporate environments burdens the security administrator with writing equally complex policies. This paper proposes an architecture based on Web Services, policy provisioning, and authorization certificates, to build up a loosely coupled unified administrative control for corporate environments. A certificate-based permission management scheme is used to derive new policies in the local domains of each branch. These new policies will update the corporate repository which, in turn, will configure the corresponding policies in the local domains of each branch. The Web Services technology provides the underlying protocols for the development of a prototype which shows the feasibility of our proposal.
实现企业政策管理的分散化,保持对用户权限的统一管理是一项艰巨的任务。企业环境的异构性和复杂性给安全管理员编写同样复杂的策略增加了负担。本文提出了一个基于Web服务、策略配置和授权证书的体系结构,为企业环境建立一个松散耦合的统一管理控制。基于证书的权限管理方案用于在每个分支的本地域中导出新的策略。这些新策略将更新公司存储库,而公司存储库又将在每个分支的本地域中配置相应的策略。Web服务技术为原型的开发提供了底层协议,该原型显示了我们的建议的可行性。
{"title":"Policy control management for Web Services","authors":"Arlindo L. Marcon, A. Santin, L. Lima, R. Obelheiro, Maicon Stihler","doi":"10.1109/INM.2009.5188786","DOIUrl":"https://doi.org/10.1109/INM.2009.5188786","url":null,"abstract":"The decentralization of corporate policy administration aiming to maintain the unified management of user permissions is a hard task. The heterogeneity and complexity of corporate environments burdens the security administrator with writing equally complex policies. This paper proposes an architecture based on Web Services, policy provisioning, and authorization certificates, to build up a loosely coupled unified administrative control for corporate environments. A certificate-based permission management scheme is used to derive new policies in the local domains of each branch. These new policies will update the corporate repository which, in turn, will configure the corresponding policies in the local domains of each branch. The Web Services technology provides the underlying protocols for the development of a prototype which shows the feasibility of our proposal.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"37 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120998832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A latency-aware algorithm for dynamic service placement in large-scale overlays 大规模覆盖中动态服务放置的延迟感知算法
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188843
J. Famaey, W. D. Cock, T. Wauters, F. Turck, B. Dhoedt, P. Demeester
A generic and self-managing service hosting infrastructure, provides a means to offer a large variety of services to users across the Internet. Such an infrastructure provides mechanisms to automatically allocate resources to services, discover the location of these services, and route client requests to a suitable service instance.
一种通用的、自我管理的服务托管基础设施,提供了一种通过Internet向用户提供多种服务的方法。这种基础设施提供了自动将资源分配给服务、发现这些服务的位置以及将客户机请求路由到合适的服务实例的机制。
{"title":"A latency-aware algorithm for dynamic service placement in large-scale overlays","authors":"J. Famaey, W. D. Cock, T. Wauters, F. Turck, B. Dhoedt, P. Demeester","doi":"10.1109/INM.2009.5188843","DOIUrl":"https://doi.org/10.1109/INM.2009.5188843","url":null,"abstract":"A generic and self-managing service hosting infrastructure, provides a means to offer a large variety of services to users across the Internet. Such an infrastructure provides mechanisms to automatically allocate resources to services, discover the location of these services, and route client requests to a suitable service instance.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114812070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Business-impact analysis and simulation of critical incidents in IT service management IT服务管理中关键事件的业务影响分析和模拟
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188781
C. Bartolini, C. Stefanelli, M. Tortonesi
Service disruptions can have a considerable impact on business operations of IT support organizations, thus calling for the implementation of efficient incident management and service restoration processes. The evaluation and improvement of incident management strategies currently in place, in order to minimize the business-impact of major service disruptions, is a very arduous task which goes beyond the optimization with respect to IT-level metrics. This paper presents HANNIBAL, a decision support tool for the business impact analysis and improvement of the incident management process. HANNIBAL evaluates possible strategies for an IT support organization to deal with major service disruptions. HANNIBAL then selects the strategy with the best alignment to the business objectives. Experimental results collected from the HANNIBAL application to a realistic case study show that business impact-driven optimization outperforms traditional performance-driven optimization.
服务中断会对IT支持组织的业务操作产生相当大的影响,因此需要实现有效的事件管理和服务恢复流程。为了最大限度地减少主要服务中断对业务的影响,评估和改进当前的事件管理策略是一项非常艰巨的任务,它超出了对it级指标的优化。本文介绍了HANNIBAL,一个用于业务影响分析和改进事件管理流程的决策支持工具。HANNIBAL评估了IT支持组织处理主要服务中断的可能策略。然后汉尼拔选择与业务目标最一致的战略。从HANNIBAL应用程序到实际案例研究的实验结果表明,业务影响驱动的优化优于传统的性能驱动的优化。
{"title":"Business-impact analysis and simulation of critical incidents in IT service management","authors":"C. Bartolini, C. Stefanelli, M. Tortonesi","doi":"10.1109/INM.2009.5188781","DOIUrl":"https://doi.org/10.1109/INM.2009.5188781","url":null,"abstract":"Service disruptions can have a considerable impact on business operations of IT support organizations, thus calling for the implementation of efficient incident management and service restoration processes. The evaluation and improvement of incident management strategies currently in place, in order to minimize the business-impact of major service disruptions, is a very arduous task which goes beyond the optimization with respect to IT-level metrics. This paper presents HANNIBAL, a decision support tool for the business impact analysis and improvement of the incident management process. HANNIBAL evaluates possible strategies for an IT support organization to deal with major service disruptions. HANNIBAL then selects the strategy with the best alignment to the business objectives. Experimental results collected from the HANNIBAL application to a realistic case study show that business impact-driven optimization outperforms traditional performance-driven optimization.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125444090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A universal method for composing business transaction models using logs 使用日志组合业务事务模型的通用方法
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188782
Joel W. Branch, C. Bisdikian, Starsky H. Y. Wong, D. Agrawal
In this paper, a novel procedural framework for increasing the efficiency of the model composition process for the end-to-end transactional behavior of various classes of business-level computer applications is presented. The objectives of the framework are reducing the composition time and the level of engagement of domain experts in deploying business management solutions. Starting with application footprints (i.e., raw log data of various types) and without the need for a priori understanding of their syntax and semantics, the framework permits the analysis of the footprints based on an agnostic tokenization of log data. The framework then produces candidate states and relationships that form the basis for composing the transactional models via the framework's state and relationship manipulation utilities. The main architectural components of the framework are presented and their underlying principles discussed. A case study highlighting the use of the framework, based on an implementation of it, is given and a discussion regarding additional features of the framework and its relation to other research activities is also provided.
本文提出了一种新的程序框架,用于提高各类业务级计算机应用程序的端到端事务行为的模型组合过程的效率。该框架的目标是减少组合时间和领域专家在部署业务管理解决方案时的参与程度。从应用程序足迹(即各种类型的原始日志数据)开始,不需要先验地理解它们的语法和语义,该框架允许基于日志数据的不可知标记化分析足迹。然后,框架生成候选状态和关系,这些状态和关系通过框架的状态和关系操作实用程序构成了组合事务模型的基础。介绍了该框架的主要体系结构组件,并讨论了它们的基本原理。基于该框架的实施,给出了一个突出使用该框架的案例研究,并讨论了该框架的其他特征及其与其他研究活动的关系。
{"title":"A universal method for composing business transaction models using logs","authors":"Joel W. Branch, C. Bisdikian, Starsky H. Y. Wong, D. Agrawal","doi":"10.1109/INM.2009.5188782","DOIUrl":"https://doi.org/10.1109/INM.2009.5188782","url":null,"abstract":"In this paper, a novel procedural framework for increasing the efficiency of the model composition process for the end-to-end transactional behavior of various classes of business-level computer applications is presented. The objectives of the framework are reducing the composition time and the level of engagement of domain experts in deploying business management solutions. Starting with application footprints (i.e., raw log data of various types) and without the need for a priori understanding of their syntax and semantics, the framework permits the analysis of the footprints based on an agnostic tokenization of log data. The framework then produces candidate states and relationships that form the basis for composing the transactional models via the framework's state and relationship manipulation utilities. The main architectural components of the framework are presented and their underlying principles discussed. A case study highlighting the use of the framework, based on an implementation of it, is given and a discussion regarding additional features of the framework and its relation to other research activities is also provided.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132456913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gossiping for threshold detection 流言蜚语用于阈值检测
Pub Date : 2009-06-01 DOI: 10.1109/inm.2009.5188818
F. Wuhib, R. Stadler, M. Dam
We investigate the use of gossip protocols to detect threshold crossings of network-wide aggregates. Aggregates are computed from local device variables using functions such as SUM, AVERAGE, COUNT, MAX and MIN. The process of aggregation and detection is performed using a standard gossiping scheme. A key design element is to let nodes dynamically adjust their neighbor interaction rates according to the distance between the nodes' local estimate of the global aggregate and the threshold itself. We show that this allows considerable savings in communication overhead. In particular, the overhead becomes negligible when the aggregate is sufficiently far above or far below the threshold. We present evaluation results from simulation studies regarding protocol efficiency, quality of threshold detection, scalability, and controllability.
我们研究了使用八卦协议来检测网络范围内聚合的阈值交叉。使用SUM、AVERAGE、COUNT、MAX和MIN等函数从本地设备变量计算聚合。使用标准八卦方案执行聚合和检测过程。一个关键的设计元素是让节点根据节点对全局聚合的局部估计与阈值本身之间的距离动态调整它们的邻居交互率。我们表明,这可以大大节省通信开销。特别是,当聚合远远高于或远远低于阈值时,开销变得可以忽略不计。我们提出了关于协议效率、阈值检测质量、可扩展性和可控性的仿真研究的评估结果。
{"title":"Gossiping for threshold detection","authors":"F. Wuhib, R. Stadler, M. Dam","doi":"10.1109/inm.2009.5188818","DOIUrl":"https://doi.org/10.1109/inm.2009.5188818","url":null,"abstract":"We investigate the use of gossip protocols to detect threshold crossings of network-wide aggregates. Aggregates are computed from local device variables using functions such as SUM, AVERAGE, COUNT, MAX and MIN. The process of aggregation and detection is performed using a standard gossiping scheme. A key design element is to let nodes dynamically adjust their neighbor interaction rates according to the distance between the nodes' local estimate of the global aggregate and the threshold itself. We show that this allows considerable savings in communication overhead. In particular, the overhead becomes negligible when the aggregate is sufficiently far above or far below the threshold. We present evaluation results from simulation studies regarding protocol efficiency, quality of threshold detection, scalability, and controllability.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"42 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131076585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Mobile service-oriented content delivery in wireless mesh networks 无线网状网络中面向服务的移动内容交付
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188873
Mohamed Elshenawy, M. El-Darieby, B. Abdulhai
Wireless mesh networks (WMN) is poised to be a cost-effective platform for many municipal applications in public safety, business and entertainment. In this paper we present WMN-based platform for content delivery within Intelligent Transportation Systems (ITS) applications. An example ITS application would be to deliver content used for vehicle route guidance in emergency evacuation situations. The characteristics of ITS applications of higher vehicle speeds and of the limited coverage of WMN (wi-fi) mesh router causes more frequent handoffs which complicates content delivery over wireless mesh networks. Frequent handoffs mandate smaller handoff delay. Using standard IEEE handoffs may cause unacceptable interruption in content delivery. We propose a service-oriented mobility management protocol (SMMP) for ITS content delivery. Within the protocol, content is considered as services described by XML metadata files. The protocol takes advantage of a hierarchical organization of WMN routers to reduce the handoff delay. The quasi-stationary nature of WMN mesh routers enables the detection of the sequence of routers that a vehicle will be in connection with. SMMP provides to the traveling vehicles cached MAC addresses of WMN mesh routers to communicate with. We evaluate the benefits of the proposed protocol and compared it to the traditional solutions using OMNET++ simulator. Our results show that using SMMP reduces handoff latencies and improves the overall network throughput at lower and higher vehicle speeds.
无线网状网络(WMN)已成为公共安全、商业和娱乐等许多市政应用的经济高效的平台。在本文中,我们提出了在智能交通系统(ITS)应用中基于wmn的内容交付平台。ITS应用的一个例子是在紧急疏散情况下提供用于车辆路线指导的内容。ITS应用的特点是车速较高,而WMN (wi-fi)网状路由器的覆盖范围有限,这导致更频繁的切换,从而使无线网状网络上的内容传输变得复杂。频繁的切换要求更小的切换延迟。使用标准的IEEE切换可能会导致不可接受的内容交付中断。我们提出了一种面向服务的移动管理协议(SMMP)用于ITS内容交付。在协议中,内容被视为由XML元数据文件描述的服务。该协议利用WMN路由器的分层组织来减少切换延迟。WMN网状路由器的准平稳特性使其能够检测到车辆将与之连接的路由器序列。SMMP向行驶车辆提供缓存的WMN网状路由器的MAC地址进行通信。我们评估了该协议的优点,并使用omnet++模拟器将其与传统的解决方案进行了比较。我们的结果表明,使用SMMP可以减少切换延迟,并在低速和高速下提高整体网络吞吐量。
{"title":"Mobile service-oriented content delivery in wireless mesh networks","authors":"Mohamed Elshenawy, M. El-Darieby, B. Abdulhai","doi":"10.1109/INM.2009.5188873","DOIUrl":"https://doi.org/10.1109/INM.2009.5188873","url":null,"abstract":"Wireless mesh networks (WMN) is poised to be a cost-effective platform for many municipal applications in public safety, business and entertainment. In this paper we present WMN-based platform for content delivery within Intelligent Transportation Systems (ITS) applications. An example ITS application would be to deliver content used for vehicle route guidance in emergency evacuation situations. The characteristics of ITS applications of higher vehicle speeds and of the limited coverage of WMN (wi-fi) mesh router causes more frequent handoffs which complicates content delivery over wireless mesh networks. Frequent handoffs mandate smaller handoff delay. Using standard IEEE handoffs may cause unacceptable interruption in content delivery. We propose a service-oriented mobility management protocol (SMMP) for ITS content delivery. Within the protocol, content is considered as services described by XML metadata files. The protocol takes advantage of a hierarchical organization of WMN routers to reduce the handoff delay. The quasi-stationary nature of WMN mesh routers enables the detection of the sequence of routers that a vehicle will be in connection with. SMMP provides to the traveling vehicles cached MAC addresses of WMN mesh routers to communicate with. We evaluate the benefits of the proposed protocol and compared it to the traditional solutions using OMNET++ simulator. Our results show that using SMMP reduces handoff latencies and improves the overall network throughput at lower and higher vehicle speeds.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115783345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2009 IFIP/IEEE International Symposium on Integrated Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1