首页 > 最新文献

The 18th IEEE International Conference on Network Protocols最新文献

英文 中文
DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networks 水下传感器网络的传输延迟感知机会MAC协议
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762767
Youngtae Noh, Paul Wang, Uichin Lee, Dustin Torres, M. Gerla
Underwater Acoustic Sensor Networks (UW-ASNs) use acoustic links as a means of communications and are accordingly confronted with long propagation delays, low bandwidth, and high transmission power consumption. This unique situation, however, permits multiple packets to concurrently propagate in the underwater channel, which must be exploited in order to improve the overall throughput. To this end, we propose the Delay-aware Opportunistic Transmission Scheduling (DOTS) algorithm that uses passively obtained local information (i.e., neighboring nodes' propagation delay map and their expected transmission schedules) to increase the chances of concurrent transmissions while reducing the likelihood of collisions. Our extensive simulation results document that DOTS outperforms existing solutions and provides fair medium access.
水声传感器网络(uw - asn)采用水声链路作为通信手段,存在传输时延长、带宽低、传输功耗高等问题。然而,这种独特的情况允许多个数据包同时在水下信道中传播,必须利用这种情况来提高总体吞吐量。为此,我们提出了延迟感知的机会传输调度(DOTS)算法,该算法使用被动获取的本地信息(即相邻节点的传播延迟映射及其预期传输调度)来增加并发传输的机会,同时减少碰撞的可能性。我们广泛的模拟结果证明DOTS优于现有的解决方案,并提供公平的介质访问。
{"title":"DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networks","authors":"Youngtae Noh, Paul Wang, Uichin Lee, Dustin Torres, M. Gerla","doi":"10.1109/ICNP.2010.5762767","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762767","url":null,"abstract":"Underwater Acoustic Sensor Networks (UW-ASNs) use acoustic links as a means of communications and are accordingly confronted with long propagation delays, low bandwidth, and high transmission power consumption. This unique situation, however, permits multiple packets to concurrently propagate in the underwater channel, which must be exploited in order to improve the overall throughput. To this end, we propose the Delay-aware Opportunistic Transmission Scheduling (DOTS) algorithm that uses passively obtained local information (i.e., neighboring nodes' propagation delay map and their expected transmission schedules) to increase the chances of concurrent transmissions while reducing the likelihood of collisions. Our extensive simulation results document that DOTS outperforms existing solutions and provides fair medium access.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125031730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Neighbor-specific BGP: An algebraic exploration 基于邻居的BGP:一种代数探索
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762759
Alexander J. T. Gurney, T. Griffin
There are several situations in which it would be advantageous to allow route preferences to be dependent on which neighbor is to receive the route. This idea could be realised in many possible ways and could interact differently with other elements of route choice, such as filtering: not all of these will have the property that a unique routing solution can always be found. We develop an algebraic model of route selection to aid in the analysis of neighbor-specific preferences in multipath routing. Using this model, we are able to identify a set of such routing schemes in which convergence is guaranteed.
在几种情况下,允许路由首选项依赖于接收路由的邻居是有利的。这个想法可以通过许多可能的方式实现,并且可以与路由选择的其他元素进行不同的交互,例如过滤:并非所有这些都具有总能找到唯一路由解决方案的属性。我们建立了一个路由选择的代数模型,以帮助分析多路径路由中邻居特定的偏好。利用该模型,我们能够确定一组保证收敛的路由方案。
{"title":"Neighbor-specific BGP: An algebraic exploration","authors":"Alexander J. T. Gurney, T. Griffin","doi":"10.1109/ICNP.2010.5762759","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762759","url":null,"abstract":"There are several situations in which it would be advantageous to allow route preferences to be dependent on which neighbor is to receive the route. This idea could be realised in many possible ways and could interact differently with other elements of route choice, such as filtering: not all of these will have the property that a unique routing solution can always be found. We develop an algebraic model of route selection to aid in the analysis of neighbor-specific preferences in multipath routing. Using this model, we are able to identify a set of such routing schemes in which convergence is guaranteed.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124483934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization 基于痕迹包含变换和在线最小化的认证授权协议安全特性分析
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762765
Yating Hsu, David Lee
A major hurdle of formal analysis of protocol security properties is the well-known state explosion - a protocol system usually contains infinitely many or a formidable number of states. As a result, most of the analysis resorts to heuristics, such as state space pruning. Given the temporal property of authentication and authorization protocols, we introduce trace inclusion transformation of protocol specification to reduce significantly the state space. We further cut down the number of states by online minimization for obtaining a model of a manageable size for a formal and rigorous analysis. However, the two state space reduction procedures may result in false negative and false positives. We show that our trace inclusion transformation and online minimization do not introduce any false negative. On the other hand, we design an efficient algorithm for ruling out all the possible false positives. Therefore, our analysis is sound and complete. For a case study, we analyze OAuth, a standardization of API authentication protocols. Our automated analysis identifies a number of attacks in the original specification, including the one that has been detected. We also analyze the second version of OAuth and prove it is secure if the API interface is secure.
协议安全属性形式化分析的一个主要障碍是众所周知的状态爆炸——协议系统通常包含无限多或数量惊人的状态。因此,大多数分析都采用启发式方法,例如状态空间修剪。考虑到认证和授权协议的时间特性,引入协议规范的跟踪包含变换,显著减小了协议的状态空间。我们进一步通过在线最小化来减少状态的数量,以获得一个可管理的大小的模型,用于正式和严格的分析。然而,这两种状态空间约简过程可能导致假阴性和假阳性。我们证明我们的痕迹包含变换和在线最小化不会引入任何假阴性。另一方面,我们设计了一个有效的算法来排除所有可能的误报。因此,我们的分析是合理和完整的。作为案例研究,我们分析了OAuth,一种API认证协议的标准化。我们的自动分析识别了原始规范中的许多攻击,包括已检测到的攻击。我们还分析了第二个版本的OAuth,并证明如果API接口是安全的,那么它是安全的。
{"title":"Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization","authors":"Yating Hsu, David Lee","doi":"10.1109/ICNP.2010.5762765","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762765","url":null,"abstract":"A major hurdle of formal analysis of protocol security properties is the well-known state explosion - a protocol system usually contains infinitely many or a formidable number of states. As a result, most of the analysis resorts to heuristics, such as state space pruning. Given the temporal property of authentication and authorization protocols, we introduce trace inclusion transformation of protocol specification to reduce significantly the state space. We further cut down the number of states by online minimization for obtaining a model of a manageable size for a formal and rigorous analysis. However, the two state space reduction procedures may result in false negative and false positives. We show that our trace inclusion transformation and online minimization do not introduce any false negative. On the other hand, we design an efficient algorithm for ruling out all the possible false positives. Therefore, our analysis is sound and complete. For a case study, we analyze OAuth, a standardization of API authentication protocols. Our automated analysis identifies a number of attacks in the original specification, including the one that has been detected. We also analyze the second version of OAuth and prove it is secure if the API interface is secure.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115207531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Routing in max-min fair networks: A game theoretic approach 最大最小公平网络中的路由:一种博弈论方法
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762749
Dejun Yang, G. Xue, Xi Fang, S. Misra, Jin Zhang
In this paper, we study the problem of routing in networks with max-min fair congestion control at the link level. The goal of each user is to maximize its own bandwidth by selecting its path. The problem is formulated as a non-cooperative game. We first prove the existence of Nash Equilibria. This is important, because at a Nash Equilibrium (NE), no user has the incentive to change its routing strategy. In addition, we investigate how the selfish behavior of the users may affect the performance of the network as a whole. We next introduce a novel concept of observed available bandwidth on each link. It allows a user to find a path with maximum bandwidth under max-min fair congestion control in polynomial time. We then present a game based algorithm to compute an NE and prove that by following the natural game course the network converges to an NE. Extensive experiments show that the network can converge to an NE in less than 10 iterations and also significantly improves the fairness compared with other algorithms. Our results have the implication for the future routing protocol design.
本文研究了具有链路级最大最小公平拥塞控制的网络中的路由问题。每个用户的目标是通过选择自己的路径来最大化自己的带宽。这个问题被表述为一个非合作博弈。首先证明了纳什均衡的存在性。这一点很重要,因为在纳什均衡(NE)中,没有用户有改变其路由策略的动机。此外,我们研究了用户的自私行为如何影响整个网络的性能。接下来,我们将介绍每个链路上观察到的可用带宽的新概念。它允许用户在多项式时间内找到在最大最小公平拥塞控制下带宽最大的路径。然后,我们提出了一种基于博弈的算法来计算网元,并证明通过遵循自然博弈过程,网络收敛到网元。大量的实验表明,该网络可以在不到10次迭代的时间内收敛到一个网元,并且与其他算法相比,显著提高了公平性。研究结果对未来的路由协议设计具有一定的指导意义。
{"title":"Routing in max-min fair networks: A game theoretic approach","authors":"Dejun Yang, G. Xue, Xi Fang, S. Misra, Jin Zhang","doi":"10.1109/ICNP.2010.5762749","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762749","url":null,"abstract":"In this paper, we study the problem of routing in networks with max-min fair congestion control at the link level. The goal of each user is to maximize its own bandwidth by selecting its path. The problem is formulated as a non-cooperative game. We first prove the existence of Nash Equilibria. This is important, because at a Nash Equilibrium (NE), no user has the incentive to change its routing strategy. In addition, we investigate how the selfish behavior of the users may affect the performance of the network as a whole. We next introduce a novel concept of observed available bandwidth on each link. It allows a user to find a path with maximum bandwidth under max-min fair congestion control in polynomial time. We then present a game based algorithm to compute an NE and prove that by following the natural game course the network converges to an NE. Extensive experiments show that the network can converge to an NE in less than 10 iterations and also significantly improves the fairness compared with other algorithms. Our results have the implication for the future routing protocol design.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115122997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A new VPN routing approach for large scale networks 一种新的大规模网络VPN路由方法
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762761
Zied Ben-Houidi, M. Meulle
One of the most common provider provisioned VPN technologies uses MPLS as a data plane for customer flow isolation and BGP as a control plane for routing between VPN sites. From a data plane perspective, such networks can provision hundreds of thousands of VPN sites. However, the BGP control plane is prone to scalability concerns. Some BGP routers in VPN backbones must handle routes for all the VPN sites that the provider connects. The number of sites can generate two million BGP routes in large VPN backbones, almost ten times the number of routes in a core Internet router. Prior work proposed solutions to evolve such networks. Yet, we argue that they fail to address the root cause of VPN routing performance issues. In this paper, we show that VPN routing scheme's poor scalability stems from the application to VPNs of a protocol originally designed for full routing, specifically the Internet. Rather than evolving the current standard based on BGP, we take a principled approach to rethink routing in large VPNs. We propose Two-Step VPN Routing, a new approach for scalable VPN routing. We validate our design choices and compare our approach to existing ones, using both BGP updates and router configurations collected from a large VPN provider.
最常见的提供商配置的VPN技术之一使用MPLS作为数据平面来隔离客户流,使用BGP作为控制平面来在VPN站点之间进行路由。从数据平面的角度来看,这样的网络可以提供数十万个VPN站点。但是,BGP控制平面容易出现可扩展性问题。某些VPN骨干网中的BGP路由器必须处理提供商连接的所有VPN站点的路由。大型VPN骨干网的站点数量可以产生200万条BGP路由,几乎是互联网核心路由器路由数量的10倍。先前的工作提出了发展这种网络的解决方案。然而,我们认为他们未能解决VPN路由性能问题的根本原因。在本文中,我们证明了VPN路由方案的可扩展性差源于将最初为全路由设计的协议应用于VPN,特别是Internet。我们不是基于BGP发展当前的标准,而是采取原则性的方法重新考虑大型vpn中的路由。我们提出了两步VPN路由,一种新的可扩展VPN路由方法。我们验证我们的设计选择,并将我们的方法与现有的方法进行比较,使用从大型VPN提供商收集的BGP更新和路由器配置。
{"title":"A new VPN routing approach for large scale networks","authors":"Zied Ben-Houidi, M. Meulle","doi":"10.1109/ICNP.2010.5762761","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762761","url":null,"abstract":"One of the most common provider provisioned VPN technologies uses MPLS as a data plane for customer flow isolation and BGP as a control plane for routing between VPN sites. From a data plane perspective, such networks can provision hundreds of thousands of VPN sites. However, the BGP control plane is prone to scalability concerns. Some BGP routers in VPN backbones must handle routes for all the VPN sites that the provider connects. The number of sites can generate two million BGP routes in large VPN backbones, almost ten times the number of routes in a core Internet router. Prior work proposed solutions to evolve such networks. Yet, we argue that they fail to address the root cause of VPN routing performance issues. In this paper, we show that VPN routing scheme's poor scalability stems from the application to VPNs of a protocol originally designed for full routing, specifically the Internet. Rather than evolving the current standard based on BGP, we take a principled approach to rethink routing in large VPNs. We propose Two-Step VPN Routing, a new approach for scalable VPN routing. We validate our design choices and compare our approach to existing ones, using both BGP updates and router configurations collected from a large VPN provider.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116174737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
RELICS: In-network realization of incentives to combat selfishness in DTNs 遗物:在ddn中对抗自私的激励的网络内实现
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762769
Md Yusuf Sarwar Uddin, Brighten Godfrey, T. Abdelzaher
In this paper, we develop a cooperative mechanism, RELICS, to combat selfishness in DTNs. In DTNs, nodes belong to self-interested individuals. A node may be selfish in expending resources, such as energy, on forwarding messages from others, unless offered incentives. We devise a rewarding scheme that provides incentives to nodes in a physically realizable way in that the rewards are reflected into network operation. We call it in-network realization of incentives. We introduce explicit ranking of nodes depending on their transit behavior, and translate those ranks into message priority. Selfishness drives each node to set its energy depletion rate as low as possible while maintaining its own delivery ratio above some threshold. We show that our cooperative mechanism compels nodes to cooperate and also achieves higher energy-economy compared to other previous results.
在本文中,我们开发了一种合作机制,即遗物,来对抗DTNs中的自私。在dtn中,节点属于自利益个体。除非提供激励,否则节点在转发来自其他节点的消息时可能会自私地消耗资源(如能量)。我们设计了一种奖励方案,以物理上可实现的方式为节点提供激励,奖励反映到网络运行中。我们称之为激励的网络内实现。我们根据节点的传输行为引入节点的显式排名,并将这些排名转换为消息优先级。自私驱使每个节点将其能量消耗率设置得尽可能低,同时保持其自身的交付率高于某个阈值。研究表明,与以往的研究结果相比,我们的合作机制在促使节点相互合作的同时,也实现了更高的能源经济性。
{"title":"RELICS: In-network realization of incentives to combat selfishness in DTNs","authors":"Md Yusuf Sarwar Uddin, Brighten Godfrey, T. Abdelzaher","doi":"10.1109/ICNP.2010.5762769","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762769","url":null,"abstract":"In this paper, we develop a cooperative mechanism, RELICS, to combat selfishness in DTNs. In DTNs, nodes belong to self-interested individuals. A node may be selfish in expending resources, such as energy, on forwarding messages from others, unless offered incentives. We devise a rewarding scheme that provides incentives to nodes in a physically realizable way in that the rewards are reflected into network operation. We call it in-network realization of incentives. We introduce explicit ranking of nodes depending on their transit behavior, and translate those ranks into message priority. Selfishness drives each node to set its energy depletion rate as low as possible while maintaining its own delivery ratio above some threshold. We show that our cooperative mechanism compels nodes to cooperate and also achieves higher energy-economy compared to other previous results.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126661810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Network Coding aware Rate Selection in multi-rate IEEE 802.11 多速率IEEE 802.11中的网络编码感知速率选择
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762758
Raju Kumar, S. Tati, Felipe de Mello, S. Krishnamurthy, T. L. Porta
Network coding has been proposed as an alternative to the conventional store-and-forward routing paradigm for data delivery in networks. When deployed in a multi-rate wireless network, network coding has to interact with rate adaptation. When multicasting packets (a requirement of network coding) in a multi-rate IEEE 802.11 wireless network, one must use care when selecting the transmission rate to use. We refer to this problem as rate selection. We analyze the performance of network coding for a small set of scenarios representative of common topologies in a network that lead to coding opportunities. Based on this analysis, we present our Network Coding aware Rate Selection (NCRS) algorithm which takes into account transmission rates used for unicast links to all multicast targets. Simulation results show that in a multi-hop wireless network, network coding with NCRS achieves up to 24% more gain over routing than network coding with other rate selection algorithms.
网络编码已被提出作为网络中数据传输的传统存储转发路由范式的替代方案。当部署在多速率无线网络中时,网络编码必须与速率适应相互作用。在多速率IEEE 802.11无线网络中多播数据包(网络编码的要求)时,必须谨慎选择要使用的传输速率。我们把这个问题称为费率选择。我们分析了一小组场景的网络编码性能,这些场景代表了网络中导致编码机会的常见拓扑。在此基础上,我们提出了考虑到单播链路到所有组播目标的传输速率的网络编码感知速率选择(NCRS)算法。仿真结果表明,在多跳无线网络中,使用NCRS进行网络编码比使用其他速率选择算法进行网络编码的路由增益可提高24%。
{"title":"Network Coding aware Rate Selection in multi-rate IEEE 802.11","authors":"Raju Kumar, S. Tati, Felipe de Mello, S. Krishnamurthy, T. L. Porta","doi":"10.1109/ICNP.2010.5762758","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762758","url":null,"abstract":"Network coding has been proposed as an alternative to the conventional store-and-forward routing paradigm for data delivery in networks. When deployed in a multi-rate wireless network, network coding has to interact with rate adaptation. When multicasting packets (a requirement of network coding) in a multi-rate IEEE 802.11 wireless network, one must use care when selecting the transmission rate to use. We refer to this problem as rate selection. We analyze the performance of network coding for a small set of scenarios representative of common topologies in a network that lead to coding opportunities. Based on this analysis, we present our Network Coding aware Rate Selection (NCRS) algorithm which takes into account transmission rates used for unicast links to all multicast targets. Simulation results show that in a multi-hop wireless network, network coding with NCRS achieves up to 24% more gain over routing than network coding with other rate selection algorithms.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127319528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Granting silence to avoid wireless collisions 授予沉默以避免无线碰撞
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762757
J. Choi, Mayank Jain, Maria A. Kazandjieva, P. Levis
We describe grant-to-send, a novel collision avoidance algorithm for wireless mesh networks. Rather than announce packets it intends to send, a node using grant-to-send announces packets it expects to hear others send.
我们描述了一种新的无线网状网络碰撞避免算法——授予-发送算法。使用grant-to-send的节点不是宣布它打算发送的数据包,而是宣布它希望听到其他节点发送的数据包。
{"title":"Granting silence to avoid wireless collisions","authors":"J. Choi, Mayank Jain, Maria A. Kazandjieva, P. Levis","doi":"10.1109/ICNP.2010.5762757","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762757","url":null,"abstract":"We describe grant-to-send, a novel collision avoidance algorithm for wireless mesh networks. Rather than announce packets it intends to send, a node using grant-to-send announces packets it expects to hear others send.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Assigning AS relationships to satisfy the Gao-Rexford conditions 分配AS关系以满足Gao-Rexford条件
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762760
L. Cittadini, G. Battista, T. Erlebach, M. Patrignani, M. Rimondini
Compliance with the Gao-Rexford conditions [1] is perhaps the most realistic explanation of Internet routing stability, although BGP is renowned to be prone to oscillations. Informally, the Gao-Rexford conditions assume that (i) the business relationships between Internet Service Providers (ISPs) yield a hierarchy, (ii) each ISP behaves in a rational way, i.e., it does not offer transit to other ISPs for free, and (iii) each ISP ranks routes through customers better than routes through providers and peers.
遵从Gao-Rexford条件[1]可能是对互联网路由稳定性最现实的解释,尽管众所周知BGP容易出现振荡。非正式地,Gao-Rexford条件假设(i)互联网服务提供商(ISP)之间的业务关系产生层次结构,(ii)每个ISP以合理的方式行事,即,它不向其他ISP免费提供传输,以及(iii)每个ISP通过客户排列路由比通过提供商和对等体排列路由更好。
{"title":"Assigning AS relationships to satisfy the Gao-Rexford conditions","authors":"L. Cittadini, G. Battista, T. Erlebach, M. Patrignani, M. Rimondini","doi":"10.1109/ICNP.2010.5762760","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762760","url":null,"abstract":"Compliance with the Gao-Rexford conditions [1] is perhaps the most realistic explanation of Internet routing stability, although BGP is renowned to be prone to oscillations. Informally, the Gao-Rexford conditions assume that (i) the business relationships between Internet Service Providers (ISPs) yield a hierarchy, (ii) each ISP behaves in a rational way, i.e., it does not offer transit to other ISPs for free, and (iii) each ISP ranks routes through customers better than routes through providers and peers.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115865052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation TOP:蜂窝无线资源分配的尾部优化协议
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762777
Feng Qian, Zhaoguang Wang, Alexandre Gerber, Z. Morley Mao, S. Sen, O. Spatscheck
In 3G cellular networks, the release of radio resources is controlled by inactivity timers. However, the timeout value itself, also known as the tail time, can last up to 15 seconds due to the necessity of trading off resource utilization efficiency for low management overhead and good stability, thus wasting considerable amount of radio resources and battery energy at user handsets. In this paper, we propose Tail Optimization Protocol (TOP), which enables cooperation between the phone and the radio access network to eliminate the tail whenever possible. Intuitively, applications can often accurately predict a long idle time. Therefore the phone can notify the cellular network on such an imminent tail, allowing the latter to immediately release radio resources. To realize TOP, we utilize a recent proposal of 3GPP specification called fast dormancy, a mechanism for a handset to notify the cellular network for immediate radio resource release. TOP thus requires no change to the cellular infrastructure and only minimal changes to smartphone applications. Our experimental results based on real traces show that with a reasonable prediction accuracy, TOP saves the overall radio energy (up to 17%) and radio resources (up to 14%) by reducing tail times by up to 60%. For applications such as multimedia streaming, TOP can achieve even more significant savings of radio energy (up to 60%) and radio resources (up to 50%).
在3G蜂窝网络中,无线资源的释放由非活动计时器控制。然而,超时值本身(也称为尾时间)可能会持续长达15秒,这是由于必须权衡资源利用效率以获得较低的管理开销和良好的稳定性,因此在用户手持设备上浪费了大量的无线电资源和电池能量。在本文中,我们提出了尾巴优化协议(TOP),它使电话和无线接入网之间的合作尽可能地消除尾巴。直观地说,应用程序通常可以准确地预测很长的空闲时间。因此,手机可以在这样一个即将到来的尾巴上通知蜂窝网络,允许后者立即释放无线电资源。为了实现TOP,我们利用了3GPP规范中最近提出的一项名为快速休眠的建议,这是一种手机通知蜂窝网络立即释放无线电资源的机制。因此,TOP不需要更改蜂窝基础设施,只需要对智能手机应用程序进行最小的更改。我们基于真实轨迹的实验结果表明,在合理的预测精度下,TOP通过减少高达60%的尾巴次数,节省了总无线电能量(高达17%)和无线电资源(高达14%)。对于多媒体流媒体等应用,TOP可以实现更显著的无线电能量节约(高达60%)和无线电资源节约(高达50%)。
{"title":"TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation","authors":"Feng Qian, Zhaoguang Wang, Alexandre Gerber, Z. Morley Mao, S. Sen, O. Spatscheck","doi":"10.1109/ICNP.2010.5762777","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762777","url":null,"abstract":"In 3G cellular networks, the release of radio resources is controlled by inactivity timers. However, the timeout value itself, also known as the tail time, can last up to 15 seconds due to the necessity of trading off resource utilization efficiency for low management overhead and good stability, thus wasting considerable amount of radio resources and battery energy at user handsets. In this paper, we propose Tail Optimization Protocol (TOP), which enables cooperation between the phone and the radio access network to eliminate the tail whenever possible. Intuitively, applications can often accurately predict a long idle time. Therefore the phone can notify the cellular network on such an imminent tail, allowing the latter to immediately release radio resources. To realize TOP, we utilize a recent proposal of 3GPP specification called fast dormancy, a mechanism for a handset to notify the cellular network for immediate radio resource release. TOP thus requires no change to the cellular infrastructure and only minimal changes to smartphone applications. Our experimental results based on real traces show that with a reasonable prediction accuracy, TOP saves the overall radio energy (up to 17%) and radio resources (up to 14%) by reducing tail times by up to 60%. For applications such as multimedia streaming, TOP can achieve even more significant savings of radio energy (up to 60%) and radio resources (up to 50%).","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122181361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 145
期刊
The 18th IEEE International Conference on Network Protocols
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1