首页 > 最新文献

2007 IEEE International Performance, Computing, and Communications Conference最新文献

英文 中文
Optimising Networks Against Malware 针对恶意软件优化网络
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358935
P. Bureau, José M. Fernandez
Rapidly-spreading malicious software is an important threat on today's computer networks. Most solutions that have been proposed to counter this threat are based on our ability to quickly detect the malware-generated traffic or the malware instances themselves, something that in many cases can be beyond our ability. Nonetheless, it seems intuitive that certain defensive postures adopted in configuring networks or machines can have a positive impact on countering malware, regardless of our ability to detect it. It is thus important to quantitatively understand how changes in design and deployment strategies can affect malware performance; only then does it become possible to make optimal decisions. To that purpose, we study in this paper the impact of network interconnection topologies on the propagation of malware. We first use a theoretical model based on Markov processes to try to predict the progression of an infection under varying interconnection scenarios. We then compare these predictions with experimental results obtained by launching a malware emulation agent on three differently configured networks. Both theoretical and experimental results provide quantitative confirmation of the intuition that networks with higher degrees of interconnection allow faster spread of malware. In addition to this, we believe that the models, experimental methodology and tools described here can be safely and fruitfully used to study other aspects of malware performance, and hence of the relative effectiveness of defensive counter-measures.
迅速传播的恶意软件是当今计算机网络的一个重要威胁。针对这种威胁提出的大多数解决方案都是基于我们快速检测恶意软件生成的流量或恶意软件实例本身的能力,而在许多情况下,这可能超出了我们的能力。尽管如此,在配置网络或机器时采用的某些防御姿态似乎可以对对抗恶意软件产生积极影响,而不管我们是否有能力检测到它。因此,定量地了解设计和部署策略的变化如何影响恶意软件的性能是很重要的;只有这样,才有可能做出最佳决策。为此,本文研究了网络互连拓扑结构对恶意软件传播的影响。我们首先使用基于马尔可夫过程的理论模型来尝试预测在不同互连场景下感染的进展。然后,我们将这些预测与通过在三个不同配置的网络上启动恶意软件仿真代理获得的实验结果进行比较。理论和实验结果都定量地证实了这样一种直觉,即互联程度越高的网络,恶意软件的传播速度越快。除此之外,我们相信这里描述的模型、实验方法和工具可以安全而有效地用于研究恶意软件性能的其他方面,从而研究防御对策的相对有效性。
{"title":"Optimising Networks Against Malware","authors":"P. Bureau, José M. Fernandez","doi":"10.1109/PCCC.2007.358935","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358935","url":null,"abstract":"Rapidly-spreading malicious software is an important threat on today's computer networks. Most solutions that have been proposed to counter this threat are based on our ability to quickly detect the malware-generated traffic or the malware instances themselves, something that in many cases can be beyond our ability. Nonetheless, it seems intuitive that certain defensive postures adopted in configuring networks or machines can have a positive impact on countering malware, regardless of our ability to detect it. It is thus important to quantitatively understand how changes in design and deployment strategies can affect malware performance; only then does it become possible to make optimal decisions. To that purpose, we study in this paper the impact of network interconnection topologies on the propagation of malware. We first use a theoretical model based on Markov processes to try to predict the progression of an infection under varying interconnection scenarios. We then compare these predictions with experimental results obtained by launching a malware emulation agent on three differently configured networks. Both theoretical and experimental results provide quantitative confirmation of the intuition that networks with higher degrees of interconnection allow faster spread of malware. In addition to this, we believe that the models, experimental methodology and tools described here can be safely and fruitfully used to study other aspects of malware performance, and hence of the relative effectiveness of defensive counter-measures.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124211251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TCP Vegas Performance with Streaming Media TCP Vegas性能与流媒体
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358877
Sean D. Boyden, A. Mahanti, C. Williamson
In this paper we study the use of TCP Vegas as a transport protocol for streaming media. We also consider TCP NewReno as a transport protocol for streaming media. We find that: 1) TCP is able to transport streaming media with good performance in a wide variety of scenarios; 2) TCP Vegas performs better than TCP NewReno in many cases; and 3) for viable media streams, both TCP variants need to achieve mean throughputs that are at least 1.5 times the encoding rate of the media objects being carried.
本文研究了TCP Vegas作为流媒体传输协议的使用。我们还考虑了TCP NewReno作为流媒体的传输协议。我们发现:1)TCP能够在各种场景下以良好的性能传输流媒体;2) TCP Vegas在很多情况下比TCP NewReno性能更好;3)对于可行的媒体流,两个TCP变体都需要达到平均吞吐量,至少是所携带媒体对象编码速率的1.5倍。
{"title":"TCP Vegas Performance with Streaming Media","authors":"Sean D. Boyden, A. Mahanti, C. Williamson","doi":"10.1109/PCCC.2007.358877","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358877","url":null,"abstract":"In this paper we study the use of TCP Vegas as a transport protocol for streaming media. We also consider TCP NewReno as a transport protocol for streaming media. We find that: 1) TCP is able to transport streaming media with good performance in a wide variety of scenarios; 2) TCP Vegas performs better than TCP NewReno in many cases; and 3) for viable media streams, both TCP variants need to achieve mean throughputs that are at least 1.5 times the encoding rate of the media objects being carried.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133849606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce 移动电子商务中电子支付系统的欺诈与入侵检测方法
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358919
P. Venkataram, B. Babu, M. Naveen, G. H. S. Gungal
The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abases in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as activity-event-symptoms (AES) model for detecting fraud and intrusion attacks which appears daring payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs daring mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.
使用移动设备支付的需求推动了移动电子商务支付系统的发展。本文考虑了电子支付系统中检测的两个重要基础。欺诈是指为了获得不公平的利益而进行的故意欺骗;入侵是指试图破坏资源的完整性、保密性或可用性的任何一组行为。大多数用于电子支付的欺诈和入侵检测系统都是特定于它们被纳入的系统的。针对移动商务环境下支付过程中出现的欺诈和入侵攻击,提出了一种通用的活动-事件-症状(AES)模型。AES模型旨在通过观察移动商务活动中发生的各种事件/交易来识别欺诈和入侵的症状。在症状识别之后,计算事件属性的怀疑因素,并使用这些怀疑因素生成欺诈和入侵的确定性因素。我们已在内部建立的有线及无线网络的流动商业环境测试台上,进行不同的个案研究,以测试建议的系统。
{"title":"A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce","authors":"P. Venkataram, B. Babu, M. Naveen, G. H. S. Gungal","doi":"10.1109/PCCC.2007.358919","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358919","url":null,"abstract":"The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abases in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as activity-event-symptoms (AES) model for detecting fraud and intrusion attacks which appears daring payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs daring mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133987792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Composite Event Detection in Wireless Sensor Networks 无线传感器网络中的复合事件检测
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358903
Chinh T. Vu, R. Beyah, Yingshu Li
Sensor networks can be used for event alarming applications. To date, in most of the proposed schemes, the raw or aggregated sensed data is periodically sent to a data consuming center. However, with this scheme, the occurrence of an emergency event such as a fire is hardly reported in a timely manner which is a strict requirement for event alarming applications. In sensor networks, it is also highly desired to conserve energy so that the network lifetime can be maximized. Furthermore, to ensure the quality of surveillance, some applications require that if an event occurs, it needs to be detected by at least k sensors where k is a user-defined parameter. In this work, we examine the timely energy-efficient k-watching event detection problem (TEKWEO). A topology-and-routing-supported algorithm is proposed which constructs a set of detection sets that satisfy the short notification time, energy conservation, and tunable quality of surveillance requirements for event alarming applications. Simulation results are shown to validate the proposed algorithm.
传感器网络可用于事件报警应用。迄今为止,在大多数提出的方案中,原始或聚合的感测数据定期发送到数据消费中心。但是,这种方案在发生火灾等突发事件时,很难及时上报,这是对事件报警应用的严格要求。在传感器网络中,人们也非常希望节约能量,以使网络寿命最大化。此外,为了确保监视的质量,一些应用程序要求,如果发生事件,它需要被至少k个传感器检测到,其中k是用户定义的参数。在这项工作中,我们研究了及时节能的k-观察事件检测问题(TEKWEO)。提出了一种支持拓扑和路由的算法,该算法构建了一组满足事件报警应用中通知时间短、节能和监控质量可调要求的检测集。仿真结果验证了该算法的有效性。
{"title":"Composite Event Detection in Wireless Sensor Networks","authors":"Chinh T. Vu, R. Beyah, Yingshu Li","doi":"10.1109/PCCC.2007.358903","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358903","url":null,"abstract":"Sensor networks can be used for event alarming applications. To date, in most of the proposed schemes, the raw or aggregated sensed data is periodically sent to a data consuming center. However, with this scheme, the occurrence of an emergency event such as a fire is hardly reported in a timely manner which is a strict requirement for event alarming applications. In sensor networks, it is also highly desired to conserve energy so that the network lifetime can be maximized. Furthermore, to ensure the quality of surveillance, some applications require that if an event occurs, it needs to be detected by at least k sensors where k is a user-defined parameter. In this work, we examine the timely energy-efficient k-watching event detection problem (TEKWEO). A topology-and-routing-supported algorithm is proposed which constructs a set of detection sets that satisfy the short notification time, energy conservation, and tunable quality of surveillance requirements for event alarming applications. Simulation results are shown to validate the proposed algorithm.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130134781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Self-Adaptive Two-Dimensional RAID Arrays 自适应二维RAID
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358901
Jehan-Francois Pâris, T. Schwarz, D. Long
We propose increasing the survivability of data stored in two-dimensional RAID arrays by causing these arrays to reorganize themselves whenever they detect a disk failure. This reorganization will rebalance as much as possible the redundancy level of all stored data, thus reducing the potential impact of additional disk failures. It remains in effect until the failed disk gets repaired. We show how our technique can be applied to two-dimensional RAID arrays consisting of n2 data disks and 2n parity disks and show how it can increase the mean time to data loss of the array by at least 200 percent as long as the reorganization process takes less than half the time it takes to replace a failed disk.
我们建议通过使二维RAID阵列在检测到磁盘故障时重新组织自己来提高存储在二维RAID阵列中的数据的生存能力。这种重组将尽可能地重新平衡所有存储数据的冗余级别,从而减少额外磁盘故障的潜在影响。它一直有效,直到故障磁盘被修复。我们展示了如何将我们的技术应用于由n2个数据磁盘和2n个奇偶校验磁盘组成的二维RAID阵列,并展示了只要重组过程所需的时间少于更换故障磁盘所需时间的一半,它如何将阵列的平均数据丢失时间增加至少200%。
{"title":"Self-Adaptive Two-Dimensional RAID Arrays","authors":"Jehan-Francois Pâris, T. Schwarz, D. Long","doi":"10.1109/PCCC.2007.358901","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358901","url":null,"abstract":"We propose increasing the survivability of data stored in two-dimensional RAID arrays by causing these arrays to reorganize themselves whenever they detect a disk failure. This reorganization will rebalance as much as possible the redundancy level of all stored data, thus reducing the potential impact of additional disk failures. It remains in effect until the failed disk gets repaired. We show how our technique can be applied to two-dimensional RAID arrays consisting of n2 data disks and 2n parity disks and show how it can increase the mean time to data loss of the array by at least 200 percent as long as the reorganization process takes less than half the time it takes to replace a failed disk.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Additive Increase Smooth Decrease (AISD) Strategy for Data and Streaming Applications 数据和流应用的加性增加平滑减少(AISD)策略
Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358876
Sivakumar Bakthavachalu, Steven Bassi, Xu Jianxuan, M. Labrador
Voice over IP and video applications continue to increase the amount of real-time traffic over the Internet. These applications utilize the UDP protocol because TCP is not suitable for streaming applications since its congestion control mechanism can change the connection's transmission rate drastically, affecting the user-perceived quality of the transmission. Nonetheless, the use of end-to-end flow and congestion control mechanisms for streaming applications has been acknowledged as an important measure to ease or eliminate the congestion collapse problem in the Internet, and the unfairness problem that exist when TCP and UDP share the same congested bottleneck link. In this paper, we propose the smooth fair TCP SACK-based (SF-SACK) protocol to address these problems. SF-SACK implements the well-known end-to-end window-based congestion control algorithm of TCP but uses an additive increase smooth decrease (AISD) strategy that considers history in the evolution of the congestion window. Through simulations and experimentation, we show that if SF-SACK is used by both streaming and data-oriented applications, streaming applications receive a smooth service, and fairness is achieved. If SF-SACK is used for streaming applications only, it is unfair to TCP (not TCP-friendly) but substantially fairer and beneficial than UDP.
IP语音和视频应用继续增加互联网上的实时通信量。这些应用程序使用UDP协议,因为TCP不适合流应用程序,因为它的拥塞控制机制可以大幅改变连接的传输速率,影响用户感知的传输质量。尽管如此,在流应用程序中使用端到端流量和拥塞控制机制已被认为是缓解或消除互联网中的拥塞崩溃问题以及TCP和UDP共享相同拥塞瓶颈链路时存在的不公平问题的重要措施。在本文中,我们提出了一种平滑公平的基于TCP sack (SF-SACK)协议来解决这些问题。SF-SACK实现了著名的TCP端到端基于窗口的拥塞控制算法,但使用了在拥塞窗口演化过程中考虑历史的加性增加平滑减少(AISD)策略。通过仿真和实验,我们表明,如果流和面向数据的应用都使用SF-SACK,流应用可以获得平滑的服务,并且实现了公平性。如果SF-SACK只用于流应用程序,它对TCP是不公平的(不是TCP友好的),但实质上比UDP更公平和有益。
{"title":"An Additive Increase Smooth Decrease (AISD) Strategy for Data and Streaming Applications","authors":"Sivakumar Bakthavachalu, Steven Bassi, Xu Jianxuan, M. Labrador","doi":"10.1109/PCCC.2007.358876","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358876","url":null,"abstract":"Voice over IP and video applications continue to increase the amount of real-time traffic over the Internet. These applications utilize the UDP protocol because TCP is not suitable for streaming applications since its congestion control mechanism can change the connection's transmission rate drastically, affecting the user-perceived quality of the transmission. Nonetheless, the use of end-to-end flow and congestion control mechanisms for streaming applications has been acknowledged as an important measure to ease or eliminate the congestion collapse problem in the Internet, and the unfairness problem that exist when TCP and UDP share the same congested bottleneck link. In this paper, we propose the smooth fair TCP SACK-based (SF-SACK) protocol to address these problems. SF-SACK implements the well-known end-to-end window-based congestion control algorithm of TCP but uses an additive increase smooth decrease (AISD) strategy that considers history in the evolution of the congestion window. Through simulations and experimentation, we show that if SF-SACK is used by both streaming and data-oriented applications, streaming applications receive a smooth service, and fairness is achieved. If SF-SACK is used for streaming applications only, it is unfair to TCP (not TCP-friendly) but substantially fairer and beneficial than UDP.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127859500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Scheduling of Periodic Packets in Energy-Aware Wireless Networks 能量感知无线网络中周期数据包的调度
Pub Date : 2007-04-01 DOI: 10.1109/PCCC.2007.358897
X. Qin, Mohammed I. Alghamdi, Mais Nijim, Ziliang Zong, K. Bellam
Existing packets scheduling algorithms designed for energy-efficient wireless networks ignore important features of periodic packets, thereby being inadequate for periodic packets with energy constraints. To remedy this problem, we present in this paper an approach to scheduling periodic packets in wireless networks subject to both timing and energy constraints. We propose a necessary and sufficient feasibility check for a set of periodic packets to be transmitted over a wireless link. Next, we develop an algorithm to schedule periodic packets (or ESPP for short) over a wireless link. The ESPP algorithm aims at minimizing energy dissipation of periodic packets without missing deadlines of periodic packets. We show through simulation studies that ESPP can significantly reduce energy consumption of wireless networks by an average of 46.4% while guaranteeing timing constraints of periodic packets.
现有的针对高能效无线网络设计的分组调度算法忽略了周期性分组的重要特征,因此对于具有能量约束的周期性分组来说是不够的。为了解决这个问题,我们在本文中提出了一种在时间和能量约束下的无线网络中调度周期性数据包的方法。我们提出了一个必要的和充分的可行性检查一组定期数据包在无线链路上传输。接下来,我们开发了一种算法来调度无线链路上的周期性数据包(简称ESPP)。ESPP算法的目标是最小化周期报文的能量消耗,同时又不会错过周期报文的截止时间。我们通过仿真研究表明,ESPP可以在保证周期数据包的时间约束的情况下,显著降低无线网络的平均能耗46.4%。
{"title":"Scheduling of Periodic Packets in Energy-Aware Wireless Networks","authors":"X. Qin, Mohammed I. Alghamdi, Mais Nijim, Ziliang Zong, K. Bellam","doi":"10.1109/PCCC.2007.358897","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358897","url":null,"abstract":"Existing packets scheduling algorithms designed for energy-efficient wireless networks ignore important features of periodic packets, thereby being inadequate for periodic packets with energy constraints. To remedy this problem, we present in this paper an approach to scheduling periodic packets in wireless networks subject to both timing and energy constraints. We propose a necessary and sufficient feasibility check for a set of periodic packets to be transmitted over a wireless link. Next, we develop an algorithm to schedule periodic packets (or ESPP for short) over a wireless link. The ESPP algorithm aims at minimizing energy dissipation of periodic packets without missing deadlines of periodic packets. We show through simulation studies that ESPP can significantly reduce energy consumption of wireless networks by an average of 46.4% while guaranteeing timing constraints of periodic packets.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128054552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Workload Characterization for News-on-Demand Streaming Services 新闻点播流媒体服务的工作负载表征
Pub Date : 2007-04-01 DOI: 10.1109/PCCC.2007.358909
F. T. Johnsen, T. Hafsoe, C. Griwodz, P. Halvorsen
This paper focuses on design issues for multimedia distribution architectures and the impact workload characteristics have on architecture design. Our contribution is an analysis of server load and user behavior in a news-on-demand environment, with focus on access patterns, popularity modeling, and the formation of traffic peaks. Finally, we evaluate an existing synthetic workload generator, MediSyn, and suggest some enhancements which will improve its suitability for news-on-demand workload modeling.
本文重点研究了多媒体分发体系结构的设计问题以及工作负载特性对体系结构设计的影响。我们的贡献是分析按需新闻环境中的服务器负载和用户行为,重点关注访问模式、流行度建模和流量峰值的形成。最后,我们评估了现有的合成工作负载生成器MediSyn,并提出了一些改进建议,以提高其对按需新闻工作负载建模的适用性。
{"title":"Workload Characterization for News-on-Demand Streaming Services","authors":"F. T. Johnsen, T. Hafsoe, C. Griwodz, P. Halvorsen","doi":"10.1109/PCCC.2007.358909","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358909","url":null,"abstract":"This paper focuses on design issues for multimedia distribution architectures and the impact workload characteristics have on architecture design. Our contribution is an analysis of server load and user behavior in a news-on-demand environment, with focus on access patterns, popularity modeling, and the formation of traffic peaks. Finally, we evaluate an existing synthetic workload generator, MediSyn, and suggest some enhancements which will improve its suitability for news-on-demand workload modeling.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128621847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures 面向第一响应者和关键基础设施的公共安全无线电和商用蜂窝综合网络的QoS提供
Pub Date : 2007-04-01 DOI: 10.1109/PCCC.2007.358942
F. Yu, Helen Tang, Victor C. M. Leung
The complementary characteristics of public safety radio networks and commercial cellular networks make it attractive to integrate these two wireless access technologies to provide first responders with a wide variety of advanced services (e.g., multimedia). In this integrated system, service availability is a critical quality of service (QoS) requirement. This paper formulates the QoS provisioning problem and proposes an algorithm for solving the problem. The QoS constraint can be guaranteed in the proposed scheme by reserving some bandwidth in cellular networks for first responders. Numerical examples illustrate that the proposed scheme can significantly improve the service availability QoS for first responders.
公共安全无线网络和商用蜂窝网络的互补特性使得将这两种无线接入技术结合起来,为第一响应者提供各种各样的先进服务(例如,多媒体)具有吸引力。在这个集成系统中,服务可用性是一个关键的服务质量(QoS)需求。本文提出了QoS提供问题,并提出了一种解决该问题的算法。该方案通过在蜂窝网络中为第一响应者保留一定的带宽来保证QoS约束。数值算例表明,该方案能显著提高第一响应者的服务可用性QoS。
{"title":"QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures","authors":"F. Yu, Helen Tang, Victor C. M. Leung","doi":"10.1109/PCCC.2007.358942","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358942","url":null,"abstract":"The complementary characteristics of public safety radio networks and commercial cellular networks make it attractive to integrate these two wireless access technologies to provide first responders with a wide variety of advanced services (e.g., multimedia). In this integrated system, service availability is a critical quality of service (QoS) requirement. This paper formulates the QoS provisioning problem and proposes an algorithm for solving the problem. The QoS constraint can be guaranteed in the proposed scheme by reserving some bandwidth in cellular networks for first responders. Numerical examples illustrate that the proposed scheme can significantly improve the service availability QoS for first responders.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123658837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2007 IEEE International Performance, Computing, and Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1