首页 > 最新文献

The 18th IEEE International Conference on Network Protocols最新文献

英文 中文
DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networks 水下传感器网络的传输延迟感知机会MAC协议
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762767
Youngtae Noh, Paul Wang, Uichin Lee, Dustin Torres, M. Gerla
Underwater Acoustic Sensor Networks (UW-ASNs) use acoustic links as a means of communications and are accordingly confronted with long propagation delays, low bandwidth, and high transmission power consumption. This unique situation, however, permits multiple packets to concurrently propagate in the underwater channel, which must be exploited in order to improve the overall throughput. To this end, we propose the Delay-aware Opportunistic Transmission Scheduling (DOTS) algorithm that uses passively obtained local information (i.e., neighboring nodes' propagation delay map and their expected transmission schedules) to increase the chances of concurrent transmissions while reducing the likelihood of collisions. Our extensive simulation results document that DOTS outperforms existing solutions and provides fair medium access.
水声传感器网络(uw - asn)采用水声链路作为通信手段,存在传输时延长、带宽低、传输功耗高等问题。然而,这种独特的情况允许多个数据包同时在水下信道中传播,必须利用这种情况来提高总体吞吐量。为此,我们提出了延迟感知的机会传输调度(DOTS)算法,该算法使用被动获取的本地信息(即相邻节点的传播延迟映射及其预期传输调度)来增加并发传输的机会,同时减少碰撞的可能性。我们广泛的模拟结果证明DOTS优于现有的解决方案,并提供公平的介质访问。
{"title":"DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networks","authors":"Youngtae Noh, Paul Wang, Uichin Lee, Dustin Torres, M. Gerla","doi":"10.1109/ICNP.2010.5762767","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762767","url":null,"abstract":"Underwater Acoustic Sensor Networks (UW-ASNs) use acoustic links as a means of communications and are accordingly confronted with long propagation delays, low bandwidth, and high transmission power consumption. This unique situation, however, permits multiple packets to concurrently propagate in the underwater channel, which must be exploited in order to improve the overall throughput. To this end, we propose the Delay-aware Opportunistic Transmission Scheduling (DOTS) algorithm that uses passively obtained local information (i.e., neighboring nodes' propagation delay map and their expected transmission schedules) to increase the chances of concurrent transmissions while reducing the likelihood of collisions. Our extensive simulation results document that DOTS outperforms existing solutions and provides fair medium access.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125031730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Neighbor-specific BGP: An algebraic exploration 基于邻居的BGP:一种代数探索
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762759
Alexander J. T. Gurney, T. Griffin
There are several situations in which it would be advantageous to allow route preferences to be dependent on which neighbor is to receive the route. This idea could be realised in many possible ways and could interact differently with other elements of route choice, such as filtering: not all of these will have the property that a unique routing solution can always be found. We develop an algebraic model of route selection to aid in the analysis of neighbor-specific preferences in multipath routing. Using this model, we are able to identify a set of such routing schemes in which convergence is guaranteed.
在几种情况下,允许路由首选项依赖于接收路由的邻居是有利的。这个想法可以通过许多可能的方式实现,并且可以与路由选择的其他元素进行不同的交互,例如过滤:并非所有这些都具有总能找到唯一路由解决方案的属性。我们建立了一个路由选择的代数模型,以帮助分析多路径路由中邻居特定的偏好。利用该模型,我们能够确定一组保证收敛的路由方案。
{"title":"Neighbor-specific BGP: An algebraic exploration","authors":"Alexander J. T. Gurney, T. Griffin","doi":"10.1109/ICNP.2010.5762759","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762759","url":null,"abstract":"There are several situations in which it would be advantageous to allow route preferences to be dependent on which neighbor is to receive the route. This idea could be realised in many possible ways and could interact differently with other elements of route choice, such as filtering: not all of these will have the property that a unique routing solution can always be found. We develop an algebraic model of route selection to aid in the analysis of neighbor-specific preferences in multipath routing. Using this model, we are able to identify a set of such routing schemes in which convergence is guaranteed.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124483934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization 基于痕迹包含变换和在线最小化的认证授权协议安全特性分析
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762765
Yating Hsu, David Lee
A major hurdle of formal analysis of protocol security properties is the well-known state explosion - a protocol system usually contains infinitely many or a formidable number of states. As a result, most of the analysis resorts to heuristics, such as state space pruning. Given the temporal property of authentication and authorization protocols, we introduce trace inclusion transformation of protocol specification to reduce significantly the state space. We further cut down the number of states by online minimization for obtaining a model of a manageable size for a formal and rigorous analysis. However, the two state space reduction procedures may result in false negative and false positives. We show that our trace inclusion transformation and online minimization do not introduce any false negative. On the other hand, we design an efficient algorithm for ruling out all the possible false positives. Therefore, our analysis is sound and complete. For a case study, we analyze OAuth, a standardization of API authentication protocols. Our automated analysis identifies a number of attacks in the original specification, including the one that has been detected. We also analyze the second version of OAuth and prove it is secure if the API interface is secure.
协议安全属性形式化分析的一个主要障碍是众所周知的状态爆炸——协议系统通常包含无限多或数量惊人的状态。因此,大多数分析都采用启发式方法,例如状态空间修剪。考虑到认证和授权协议的时间特性,引入协议规范的跟踪包含变换,显著减小了协议的状态空间。我们进一步通过在线最小化来减少状态的数量,以获得一个可管理的大小的模型,用于正式和严格的分析。然而,这两种状态空间约简过程可能导致假阴性和假阳性。我们证明我们的痕迹包含变换和在线最小化不会引入任何假阴性。另一方面,我们设计了一个有效的算法来排除所有可能的误报。因此,我们的分析是合理和完整的。作为案例研究,我们分析了OAuth,一种API认证协议的标准化。我们的自动分析识别了原始规范中的许多攻击,包括已检测到的攻击。我们还分析了第二个版本的OAuth,并证明如果API接口是安全的,那么它是安全的。
{"title":"Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization","authors":"Yating Hsu, David Lee","doi":"10.1109/ICNP.2010.5762765","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762765","url":null,"abstract":"A major hurdle of formal analysis of protocol security properties is the well-known state explosion - a protocol system usually contains infinitely many or a formidable number of states. As a result, most of the analysis resorts to heuristics, such as state space pruning. Given the temporal property of authentication and authorization protocols, we introduce trace inclusion transformation of protocol specification to reduce significantly the state space. We further cut down the number of states by online minimization for obtaining a model of a manageable size for a formal and rigorous analysis. However, the two state space reduction procedures may result in false negative and false positives. We show that our trace inclusion transformation and online minimization do not introduce any false negative. On the other hand, we design an efficient algorithm for ruling out all the possible false positives. Therefore, our analysis is sound and complete. For a case study, we analyze OAuth, a standardization of API authentication protocols. Our automated analysis identifies a number of attacks in the original specification, including the one that has been detected. We also analyze the second version of OAuth and prove it is secure if the API interface is secure.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115207531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Routing in max-min fair networks: A game theoretic approach 最大最小公平网络中的路由:一种博弈论方法
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762749
Dejun Yang, G. Xue, Xi Fang, S. Misra, Jin Zhang
In this paper, we study the problem of routing in networks with max-min fair congestion control at the link level. The goal of each user is to maximize its own bandwidth by selecting its path. The problem is formulated as a non-cooperative game. We first prove the existence of Nash Equilibria. This is important, because at a Nash Equilibrium (NE), no user has the incentive to change its routing strategy. In addition, we investigate how the selfish behavior of the users may affect the performance of the network as a whole. We next introduce a novel concept of observed available bandwidth on each link. It allows a user to find a path with maximum bandwidth under max-min fair congestion control in polynomial time. We then present a game based algorithm to compute an NE and prove that by following the natural game course the network converges to an NE. Extensive experiments show that the network can converge to an NE in less than 10 iterations and also significantly improves the fairness compared with other algorithms. Our results have the implication for the future routing protocol design.
本文研究了具有链路级最大最小公平拥塞控制的网络中的路由问题。每个用户的目标是通过选择自己的路径来最大化自己的带宽。这个问题被表述为一个非合作博弈。首先证明了纳什均衡的存在性。这一点很重要,因为在纳什均衡(NE)中,没有用户有改变其路由策略的动机。此外,我们研究了用户的自私行为如何影响整个网络的性能。接下来,我们将介绍每个链路上观察到的可用带宽的新概念。它允许用户在多项式时间内找到在最大最小公平拥塞控制下带宽最大的路径。然后,我们提出了一种基于博弈的算法来计算网元,并证明通过遵循自然博弈过程,网络收敛到网元。大量的实验表明,该网络可以在不到10次迭代的时间内收敛到一个网元,并且与其他算法相比,显著提高了公平性。研究结果对未来的路由协议设计具有一定的指导意义。
{"title":"Routing in max-min fair networks: A game theoretic approach","authors":"Dejun Yang, G. Xue, Xi Fang, S. Misra, Jin Zhang","doi":"10.1109/ICNP.2010.5762749","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762749","url":null,"abstract":"In this paper, we study the problem of routing in networks with max-min fair congestion control at the link level. The goal of each user is to maximize its own bandwidth by selecting its path. The problem is formulated as a non-cooperative game. We first prove the existence of Nash Equilibria. This is important, because at a Nash Equilibrium (NE), no user has the incentive to change its routing strategy. In addition, we investigate how the selfish behavior of the users may affect the performance of the network as a whole. We next introduce a novel concept of observed available bandwidth on each link. It allows a user to find a path with maximum bandwidth under max-min fair congestion control in polynomial time. We then present a game based algorithm to compute an NE and prove that by following the natural game course the network converges to an NE. Extensive experiments show that the network can converge to an NE in less than 10 iterations and also significantly improves the fairness compared with other algorithms. Our results have the implication for the future routing protocol design.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115122997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A new VPN routing approach for large scale networks 一种新的大规模网络VPN路由方法
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762761
Zied Ben-Houidi, M. Meulle
One of the most common provider provisioned VPN technologies uses MPLS as a data plane for customer flow isolation and BGP as a control plane for routing between VPN sites. From a data plane perspective, such networks can provision hundreds of thousands of VPN sites. However, the BGP control plane is prone to scalability concerns. Some BGP routers in VPN backbones must handle routes for all the VPN sites that the provider connects. The number of sites can generate two million BGP routes in large VPN backbones, almost ten times the number of routes in a core Internet router. Prior work proposed solutions to evolve such networks. Yet, we argue that they fail to address the root cause of VPN routing performance issues. In this paper, we show that VPN routing scheme's poor scalability stems from the application to VPNs of a protocol originally designed for full routing, specifically the Internet. Rather than evolving the current standard based on BGP, we take a principled approach to rethink routing in large VPNs. We propose Two-Step VPN Routing, a new approach for scalable VPN routing. We validate our design choices and compare our approach to existing ones, using both BGP updates and router configurations collected from a large VPN provider.
最常见的提供商配置的VPN技术之一使用MPLS作为数据平面来隔离客户流,使用BGP作为控制平面来在VPN站点之间进行路由。从数据平面的角度来看,这样的网络可以提供数十万个VPN站点。但是,BGP控制平面容易出现可扩展性问题。某些VPN骨干网中的BGP路由器必须处理提供商连接的所有VPN站点的路由。大型VPN骨干网的站点数量可以产生200万条BGP路由,几乎是互联网核心路由器路由数量的10倍。先前的工作提出了发展这种网络的解决方案。然而,我们认为他们未能解决VPN路由性能问题的根本原因。在本文中,我们证明了VPN路由方案的可扩展性差源于将最初为全路由设计的协议应用于VPN,特别是Internet。我们不是基于BGP发展当前的标准,而是采取原则性的方法重新考虑大型vpn中的路由。我们提出了两步VPN路由,一种新的可扩展VPN路由方法。我们验证我们的设计选择,并将我们的方法与现有的方法进行比较,使用从大型VPN提供商收集的BGP更新和路由器配置。
{"title":"A new VPN routing approach for large scale networks","authors":"Zied Ben-Houidi, M. Meulle","doi":"10.1109/ICNP.2010.5762761","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762761","url":null,"abstract":"One of the most common provider provisioned VPN technologies uses MPLS as a data plane for customer flow isolation and BGP as a control plane for routing between VPN sites. From a data plane perspective, such networks can provision hundreds of thousands of VPN sites. However, the BGP control plane is prone to scalability concerns. Some BGP routers in VPN backbones must handle routes for all the VPN sites that the provider connects. The number of sites can generate two million BGP routes in large VPN backbones, almost ten times the number of routes in a core Internet router. Prior work proposed solutions to evolve such networks. Yet, we argue that they fail to address the root cause of VPN routing performance issues. In this paper, we show that VPN routing scheme's poor scalability stems from the application to VPNs of a protocol originally designed for full routing, specifically the Internet. Rather than evolving the current standard based on BGP, we take a principled approach to rethink routing in large VPNs. We propose Two-Step VPN Routing, a new approach for scalable VPN routing. We validate our design choices and compare our approach to existing ones, using both BGP updates and router configurations collected from a large VPN provider.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116174737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
RELICS: In-network realization of incentives to combat selfishness in DTNs 遗物:在ddn中对抗自私的激励的网络内实现
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762769
Md Yusuf Sarwar Uddin, Brighten Godfrey, T. Abdelzaher
In this paper, we develop a cooperative mechanism, RELICS, to combat selfishness in DTNs. In DTNs, nodes belong to self-interested individuals. A node may be selfish in expending resources, such as energy, on forwarding messages from others, unless offered incentives. We devise a rewarding scheme that provides incentives to nodes in a physically realizable way in that the rewards are reflected into network operation. We call it in-network realization of incentives. We introduce explicit ranking of nodes depending on their transit behavior, and translate those ranks into message priority. Selfishness drives each node to set its energy depletion rate as low as possible while maintaining its own delivery ratio above some threshold. We show that our cooperative mechanism compels nodes to cooperate and also achieves higher energy-economy compared to other previous results.
在本文中,我们开发了一种合作机制,即遗物,来对抗DTNs中的自私。在dtn中,节点属于自利益个体。除非提供激励,否则节点在转发来自其他节点的消息时可能会自私地消耗资源(如能量)。我们设计了一种奖励方案,以物理上可实现的方式为节点提供激励,奖励反映到网络运行中。我们称之为激励的网络内实现。我们根据节点的传输行为引入节点的显式排名,并将这些排名转换为消息优先级。自私驱使每个节点将其能量消耗率设置得尽可能低,同时保持其自身的交付率高于某个阈值。研究表明,与以往的研究结果相比,我们的合作机制在促使节点相互合作的同时,也实现了更高的能源经济性。
{"title":"RELICS: In-network realization of incentives to combat selfishness in DTNs","authors":"Md Yusuf Sarwar Uddin, Brighten Godfrey, T. Abdelzaher","doi":"10.1109/ICNP.2010.5762769","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762769","url":null,"abstract":"In this paper, we develop a cooperative mechanism, RELICS, to combat selfishness in DTNs. In DTNs, nodes belong to self-interested individuals. A node may be selfish in expending resources, such as energy, on forwarding messages from others, unless offered incentives. We devise a rewarding scheme that provides incentives to nodes in a physically realizable way in that the rewards are reflected into network operation. We call it in-network realization of incentives. We introduce explicit ranking of nodes depending on their transit behavior, and translate those ranks into message priority. Selfishness drives each node to set its energy depletion rate as low as possible while maintaining its own delivery ratio above some threshold. We show that our cooperative mechanism compels nodes to cooperate and also achieves higher energy-economy compared to other previous results.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126661810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Network Coding aware Rate Selection in multi-rate IEEE 802.11 多速率IEEE 802.11中的网络编码感知速率选择
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762758
Raju Kumar, S. Tati, Felipe de Mello, S. Krishnamurthy, T. L. Porta
Network coding has been proposed as an alternative to the conventional store-and-forward routing paradigm for data delivery in networks. When deployed in a multi-rate wireless network, network coding has to interact with rate adaptation. When multicasting packets (a requirement of network coding) in a multi-rate IEEE 802.11 wireless network, one must use care when selecting the transmission rate to use. We refer to this problem as rate selection. We analyze the performance of network coding for a small set of scenarios representative of common topologies in a network that lead to coding opportunities. Based on this analysis, we present our Network Coding aware Rate Selection (NCRS) algorithm which takes into account transmission rates used for unicast links to all multicast targets. Simulation results show that in a multi-hop wireless network, network coding with NCRS achieves up to 24% more gain over routing than network coding with other rate selection algorithms.
网络编码已被提出作为网络中数据传输的传统存储转发路由范式的替代方案。当部署在多速率无线网络中时,网络编码必须与速率适应相互作用。在多速率IEEE 802.11无线网络中多播数据包(网络编码的要求)时,必须谨慎选择要使用的传输速率。我们把这个问题称为费率选择。我们分析了一小组场景的网络编码性能,这些场景代表了网络中导致编码机会的常见拓扑。在此基础上,我们提出了考虑到单播链路到所有组播目标的传输速率的网络编码感知速率选择(NCRS)算法。仿真结果表明,在多跳无线网络中,使用NCRS进行网络编码比使用其他速率选择算法进行网络编码的路由增益可提高24%。
{"title":"Network Coding aware Rate Selection in multi-rate IEEE 802.11","authors":"Raju Kumar, S. Tati, Felipe de Mello, S. Krishnamurthy, T. L. Porta","doi":"10.1109/ICNP.2010.5762758","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762758","url":null,"abstract":"Network coding has been proposed as an alternative to the conventional store-and-forward routing paradigm for data delivery in networks. When deployed in a multi-rate wireless network, network coding has to interact with rate adaptation. When multicasting packets (a requirement of network coding) in a multi-rate IEEE 802.11 wireless network, one must use care when selecting the transmission rate to use. We refer to this problem as rate selection. We analyze the performance of network coding for a small set of scenarios representative of common topologies in a network that lead to coding opportunities. Based on this analysis, we present our Network Coding aware Rate Selection (NCRS) algorithm which takes into account transmission rates used for unicast links to all multicast targets. Simulation results show that in a multi-hop wireless network, network coding with NCRS achieves up to 24% more gain over routing than network coding with other rate selection algorithms.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127319528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Granting silence to avoid wireless collisions 授予沉默以避免无线碰撞
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762757
J. Choi, Mayank Jain, Maria A. Kazandjieva, P. Levis
We describe grant-to-send, a novel collision avoidance algorithm for wireless mesh networks. Rather than announce packets it intends to send, a node using grant-to-send announces packets it expects to hear others send.
我们描述了一种新的无线网状网络碰撞避免算法——授予-发送算法。使用grant-to-send的节点不是宣布它打算发送的数据包,而是宣布它希望听到其他节点发送的数据包。
{"title":"Granting silence to avoid wireless collisions","authors":"J. Choi, Mayank Jain, Maria A. Kazandjieva, P. Levis","doi":"10.1109/ICNP.2010.5762757","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762757","url":null,"abstract":"We describe grant-to-send, a novel collision avoidance algorithm for wireless mesh networks. Rather than announce packets it intends to send, a node using grant-to-send announces packets it expects to hear others send.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Assigning AS relationships to satisfy the Gao-Rexford conditions 分配AS关系以满足Gao-Rexford条件
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762760
L. Cittadini, G. Battista, T. Erlebach, M. Patrignani, M. Rimondini
Compliance with the Gao-Rexford conditions [1] is perhaps the most realistic explanation of Internet routing stability, although BGP is renowned to be prone to oscillations. Informally, the Gao-Rexford conditions assume that (i) the business relationships between Internet Service Providers (ISPs) yield a hierarchy, (ii) each ISP behaves in a rational way, i.e., it does not offer transit to other ISPs for free, and (iii) each ISP ranks routes through customers better than routes through providers and peers.
遵从Gao-Rexford条件[1]可能是对互联网路由稳定性最现实的解释,尽管众所周知BGP容易出现振荡。非正式地,Gao-Rexford条件假设(i)互联网服务提供商(ISP)之间的业务关系产生层次结构,(ii)每个ISP以合理的方式行事,即,它不向其他ISP免费提供传输,以及(iii)每个ISP通过客户排列路由比通过提供商和对等体排列路由更好。
{"title":"Assigning AS relationships to satisfy the Gao-Rexford conditions","authors":"L. Cittadini, G. Battista, T. Erlebach, M. Patrignani, M. Rimondini","doi":"10.1109/ICNP.2010.5762760","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762760","url":null,"abstract":"Compliance with the Gao-Rexford conditions [1] is perhaps the most realistic explanation of Internet routing stability, although BGP is renowned to be prone to oscillations. Informally, the Gao-Rexford conditions assume that (i) the business relationships between Internet Service Providers (ISPs) yield a hierarchy, (ii) each ISP behaves in a rational way, i.e., it does not offer transit to other ISPs for free, and (iii) each ISP ranks routes through customers better than routes through providers and peers.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115865052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
GreenTE: Power-aware traffic engineering 绿色:功率感知交通工程
Pub Date : 2010-10-05 DOI: 10.1109/ICNP.2010.5762751
Mingui Zhang, Cheng Yi, B. Liu, Beichuan Zhang
Current network infrastructures exhibit poor power efficiency, running network devices at full capacity all the time regardless of the traffic demand and distribution over the network. Most research on router power management are at component level or link level, treating routers as isolated devices. A complementary approach is to facilitate power management at network level by routing traffic through different paths to adjust the workload on individual routers or links. Given the high path redundancy and low link utilization in today's large networks, this approach can potentially allow more network devices or components to go into power saving mode. This paper proposes an intra-domain traffic engineering mechanism, GreenTE, which maximizes the number of links that can be put into sleep under given performance constraints such as link utilization and packet delay. Using network topologies and traffic data from several wide-area networks, our evaluation shows that GreenTE can reduce line-cards' power consumption by 27% to 42% under constraints that the maximum link utilization is below 50% and the network diameter remains the same as in shortest path routing.
当前的网络基础设施的功耗效率很低,网络设备一直在满负荷运行,而不考虑网络上的流量需求和分布。大多数对路由器电源管理的研究都停留在组件级或链路级,将路由器视为孤立的设备。一种补充方法是通过不同路径路由流量,以调整单个路由器或链路上的工作负载,从而促进网络级别的电源管理。考虑到当今大型网络中的高路径冗余和低链路利用率,这种方法可能允许更多的网络设备或组件进入节能模式。本文提出了一种域内流量工程机制GreenTE,该机制在给定的链路利用率和数据包延迟等性能约束下,最大限度地提高了可进入睡眠状态的链路数量。使用来自多个广域网的网络拓扑和流量数据,我们的评估表明,在最大链路利用率低于50%和网络直径与最短路径路由保持相同的约束下,GreenTE可以将线卡的功耗降低27%至42%。
{"title":"GreenTE: Power-aware traffic engineering","authors":"Mingui Zhang, Cheng Yi, B. Liu, Beichuan Zhang","doi":"10.1109/ICNP.2010.5762751","DOIUrl":"https://doi.org/10.1109/ICNP.2010.5762751","url":null,"abstract":"Current network infrastructures exhibit poor power efficiency, running network devices at full capacity all the time regardless of the traffic demand and distribution over the network. Most research on router power management are at component level or link level, treating routers as isolated devices. A complementary approach is to facilitate power management at network level by routing traffic through different paths to adjust the workload on individual routers or links. Given the high path redundancy and low link utilization in today's large networks, this approach can potentially allow more network devices or components to go into power saving mode. This paper proposes an intra-domain traffic engineering mechanism, GreenTE, which maximizes the number of links that can be put into sleep under given performance constraints such as link utilization and packet delay. Using network topologies and traffic data from several wide-area networks, our evaluation shows that GreenTE can reduce line-cards' power consumption by 27% to 42% under constraints that the maximum link utilization is below 50% and the network diameter remains the same as in shortest path routing.","PeriodicalId":344208,"journal":{"name":"The 18th IEEE International Conference on Network Protocols","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122820481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 281
期刊
The 18th IEEE International Conference on Network Protocols
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1