首页 > 最新文献

2013 27th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Access Control with RFID in the Internet of Things 物联网中的RFID门禁
Steffen Elmstrom Holst Jensen, R. Jacobsen
Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things, to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology.
未来的互联网研究需要将互联网和物更紧密地联系在一起,形成物联网。随着我们日常生活中的物品变得越来越智能,将这些物品联网的好处也越来越大。在本文中,提出了一种将对象(即物)耦合到Internet的方法。该解决方案通过使用低成本的无源RFID标签在互联网上为对象提供身份,从而使用对象的虚拟表示。构造了一个将RFID标识映射到IPv6地址的原型。说明了如何在基于开放网络协议和包过滤的访问控制系统中使用这种方法。该解决方案包括一种新颖的RFID读取器架构,该架构支持基于网络层技术的未来访问控制系统组件的互连。
{"title":"Access Control with RFID in the Internet of Things","authors":"Steffen Elmstrom Holst Jensen, R. Jacobsen","doi":"10.1109/WAINA.2013.199","DOIUrl":"https://doi.org/10.1109/WAINA.2013.199","url":null,"abstract":"Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things, to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115708979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design and Implementation of Real-Time Flow Viewer across Different Domains 跨域实时流查看器的设计与实现
Wun-Yuan Huang, Jen-Wei Hu, Tahsin Chou, Te-Lung Liu
Due to rapid development of Internet, the amount of users around the globe is fast-growing in the past 30 years. It leads to the appearance of many problems, such as lack of IPaddresses, worse quality of service, and so on. In order to resolve these problems, many researchers start to design and implement innovative network architectures, which we call Future Internet. Most Future Internet projects in the world deploy OpenFlow technology developed by Stanford University in current network backbone to setup programmable Future Internet test beds. Currently, many international experiments have at least one controller for each organization in order to decrease overheads in single controller environment. In this paper, we study and implement real-time flow viewer across different domains based on the automatic network topology discovery system from our previous work. The real-time flow viewer can be used as a network management tool for validation of inter-domain flow assignment and observation of network activities across different domains.
由于互联网的快速发展,在过去的30年里,全球用户数量快速增长。这导致了许多问题的出现,如缺乏ip地址,服务质量下降,等等。为了解决这些问题,许多研究者开始设计和实现创新的网络架构,我们称之为未来互联网。世界上大多数未来互联网项目在现有的网络骨干网上部署了斯坦福大学开发的OpenFlow技术,以建立可编程的未来互联网测试平台。目前,国际上许多实验都要求每个组织至少有一个控制器,以减少单控制器环境下的开销。本文在前人研究的网络拓扑自动发现系统的基础上,研究并实现了跨域的实时流查看器。实时流查看器可以作为网络管理工具,用于验证域间流分配和观察跨不同域的网络活动。
{"title":"Design and Implementation of Real-Time Flow Viewer across Different Domains","authors":"Wun-Yuan Huang, Jen-Wei Hu, Tahsin Chou, Te-Lung Liu","doi":"10.1109/WAINA.2013.67","DOIUrl":"https://doi.org/10.1109/WAINA.2013.67","url":null,"abstract":"Due to rapid development of Internet, the amount of users around the globe is fast-growing in the past 30 years. It leads to the appearance of many problems, such as lack of IPaddresses, worse quality of service, and so on. In order to resolve these problems, many researchers start to design and implement innovative network architectures, which we call Future Internet. Most Future Internet projects in the world deploy OpenFlow technology developed by Stanford University in current network backbone to setup programmable Future Internet test beds. Currently, many international experiments have at least one controller for each organization in order to decrease overheads in single controller environment. In this paper, we study and implement real-time flow viewer across different domains based on the automatic network topology discovery system from our previous work. The real-time flow viewer can be used as a network management tool for validation of inter-domain flow assignment and observation of network activities across different domains.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116688660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effects of Signaling Attacks on LTE Networks 信令攻击对LTE网络的影响
R. Bassil, I. Elhajj, A. Chehab, A. Kayssi
Attacks on the signaling plane have been well documented for different generations of cellular networks. The effects of these attacks vary from a decrease in the quality of service (QoS) all the way to a denial of service (DoS). Long Term Evolution (LTE) is the next generation cellular network that is primarily designed based on the IP protocol and is expected to achieve wide scale adoption worldwide. LTE employs a different network architecture than its predecessors that should allow for more efficient processing of signaling and data packets. In this paper, we investigate the effects of signaling attacks against Timeworks. An attack consists of malicious users who take advantage of the signaling overhead required to setup and release dedicated bearers in order to overload the signaling plane by repeatedly triggering dedicated bearers requests. The attack is simulated in OPNET under diverse scenarios in order to assess the effects of the increased signaling on the different LTE network entities. The results show that the increased signaling traffic causes higher processing loads at the Enhanced Node-B(eNB) as well as the Evolved Packet Core. We also present a comparison of the signaling requirements in LTE and UMTS.
对于不同代的蜂窝网络,对信号平面的攻击已经有了很好的记录。这些攻击的影响各不相同,从降低服务质量(QoS)一直到拒绝服务(DoS)。长期演进(LTE)是主要基于IP协议设计的下一代蜂窝网络,预计将在全球范围内实现大规模采用。LTE采用了一种不同于其前身的网络架构,可以更有效地处理信令和数据包。在本文中,我们研究了信号攻击对Timeworks的影响。攻击由恶意用户组成,他们利用设置和释放专用承载者所需的信令开销,通过反复触发专用承载者请求来使信令平面过载。在OPNET中模拟了不同场景下的攻击,以评估增加的信令对不同LTE网络实体的影响。结果表明,信令流量的增加导致增强型节点b (eNB)和演进分组核心的处理负荷增加。我们还比较了LTE和UMTS的信令要求。
{"title":"Effects of Signaling Attacks on LTE Networks","authors":"R. Bassil, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/WAINA.2013.136","DOIUrl":"https://doi.org/10.1109/WAINA.2013.136","url":null,"abstract":"Attacks on the signaling plane have been well documented for different generations of cellular networks. The effects of these attacks vary from a decrease in the quality of service (QoS) all the way to a denial of service (DoS). Long Term Evolution (LTE) is the next generation cellular network that is primarily designed based on the IP protocol and is expected to achieve wide scale adoption worldwide. LTE employs a different network architecture than its predecessors that should allow for more efficient processing of signaling and data packets. In this paper, we investigate the effects of signaling attacks against Timeworks. An attack consists of malicious users who take advantage of the signaling overhead required to setup and release dedicated bearers in order to overload the signaling plane by repeatedly triggering dedicated bearers requests. The attack is simulated in OPNET under diverse scenarios in order to assess the effects of the increased signaling on the different LTE network entities. The results show that the increased signaling traffic causes higher processing loads at the Enhanced Node-B(eNB) as well as the Evolved Packet Core. We also present a comparison of the signaling requirements in LTE and UMTS.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Reducing Energy Cost of Keepalive Messages in 3G Mobiles 降低3G手机Keepalive消息的能源成本
Mohamed Oulmahdi, C. Chassot, E. Exposito
Mobile phones are characterized by limited energy sources. Saving this energy is therefore a primordial subject. As well as for the low level communication protocols (typically from Physical and MAC layers), unnecessary energy consumption can be caused by the behavior of high level protocols, typically from Application and Transport layers. In this paper, we study the case of a classical but not well-known mechanism, the "keep alive mechanism", that induces increase of the energetic cost on mobile phones. We then propose a solution to reduce this cost and provide NS-3 experimentations that show the resulting benefits.
手机的特点是能源有限。因此,节约这种能量是一个原始的课题。对于低层通信协议(通常来自物理层和MAC层),高层协议(通常来自应用层和传输层)的行为可能会导致不必要的能耗。本文研究了一个经典但不为人所知的机制——“保持活力机制”,它导致了手机能量成本的增加。然后,我们提出了一个解决方案来降低这一成本,并提供了NS-3实验,显示了由此产生的好处。
{"title":"Reducing Energy Cost of Keepalive Messages in 3G Mobiles","authors":"Mohamed Oulmahdi, C. Chassot, E. Exposito","doi":"10.1109/WAINA.2013.247","DOIUrl":"https://doi.org/10.1109/WAINA.2013.247","url":null,"abstract":"Mobile phones are characterized by limited energy sources. Saving this energy is therefore a primordial subject. As well as for the low level communication protocols (typically from Physical and MAC layers), unnecessary energy consumption can be caused by the behavior of high level protocols, typically from Application and Transport layers. In this paper, we study the case of a classical but not well-known mechanism, the \"keep alive mechanism\", that induces increase of the energetic cost on mobile phones. We then propose a solution to reduce this cost and provide NS-3 experimentations that show the resulting benefits.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127123649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-Class Mobility Model for Dynamic and Dependable Systems 动态可靠系统的多类可移动性模型
P. Bull, G. Antonopoulos, L. Guan, Xingang Wang, Xunli Fan
The complex interactions inherent in mobile, dynamic systems require a representative model of node movement properties. Dynamic systems proposed within industry, particularly in the military domain, have a requirement for dependable communication and include heterogeneous nodes (varying from personal devices, to aircraft with complex sensors). Existing node mobility models have been found to not be adequate for capturing the properties of these systems due to their tendency to focus on systems with nodes of a single type, or characteristic. In this paper, a Multi-Class Mobility Model (MCMM) is proposed. This is a hybrid, class-based model operating with both single entity and group mobility patterns. Within this model nodes can be specified in a range of classes, based on their movement properties (including acceleration/deceleration factors and maximum speed). Simulation based experimentation implements MCMM, in conjunction with a previously proposed Quality of Service framework. This provides an opportunity to evaluate the mobility model in terms of its affect on system utilisation and stability. Through simulation, MCMM is compared with existing Random Walk/Random Waypoint and Reference Point Group Models. MCMM is shown to offer a more representative node movement, resulting in a comparable and representative system utilisation. This is achieved while offering a more stable system model with less communication disruption due to lost network connections.
移动、动态系统中固有的复杂交互需要一个具有代表性的节点运动属性模型。工业中提出的动态系统,特别是在军事领域,需要可靠的通信,并且包括异构节点(从个人设备到具有复杂传感器的飞机)。现有的节点迁移模型已被发现不足以捕获这些系统的属性,因为它们倾向于关注具有单一类型或特征节点的系统。本文提出了一种多类移动模型(MCMM)。这是一种混合的、基于阶级的模式,同时具有单一实体和群体流动模式。在这个模型中,节点可以根据它们的运动属性(包括加速/减速因素和最大速度)在一系列类中指定。基于模拟的实验与先前提出的服务质量框架一起实现了MCMM。这为评估移动性模型对系统利用率和稳定性的影响提供了机会。通过仿真,将MCMM与现有的随机行走/随机路径点和参考点组模型进行了比较。MCMM提供了更具代表性的节点移动,从而产生了可比较且具有代表性的系统利用率。这是在提供更稳定的系统模型的同时实现的,并且由于网络连接丢失而减少了通信中断。
{"title":"A Multi-Class Mobility Model for Dynamic and Dependable Systems","authors":"P. Bull, G. Antonopoulos, L. Guan, Xingang Wang, Xunli Fan","doi":"10.1109/WAINA.2013.28","DOIUrl":"https://doi.org/10.1109/WAINA.2013.28","url":null,"abstract":"The complex interactions inherent in mobile, dynamic systems require a representative model of node movement properties. Dynamic systems proposed within industry, particularly in the military domain, have a requirement for dependable communication and include heterogeneous nodes (varying from personal devices, to aircraft with complex sensors). Existing node mobility models have been found to not be adequate for capturing the properties of these systems due to their tendency to focus on systems with nodes of a single type, or characteristic. In this paper, a Multi-Class Mobility Model (MCMM) is proposed. This is a hybrid, class-based model operating with both single entity and group mobility patterns. Within this model nodes can be specified in a range of classes, based on their movement properties (including acceleration/deceleration factors and maximum speed). Simulation based experimentation implements MCMM, in conjunction with a previously proposed Quality of Service framework. This provides an opportunity to evaluate the mobility model in terms of its affect on system utilisation and stability. Through simulation, MCMM is compared with existing Random Walk/Random Waypoint and Reference Point Group Models. MCMM is shown to offer a more representative node movement, resulting in a comparable and representative system utilisation. This is achieved while offering a more stable system model with less communication disruption due to lost network connections.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123300776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Benchmarking Internet of Things Deployments in Smart Cities 智慧城市中物联网部署的基准测试
F. Gall, Sophie Vallet Chevillard, A. Gluhak, Zhan Xueli
The development of an IoT deployment benchmarking framework is proposed. The framework, aimed at supporting policy decision process, expresses visions from 4 different stakeholders and proposes a comprehensive approach including 7 dimensions within a taxonomy to be used as a basis for the selection of benchmarking indicators. A consultative approach based on web survey and stakeholders interviews is proposed to evaluate robustness of the proposed benchmark.
提出了物联网部署基准框架的开发。该框架旨在支持政策决策过程,表达了4个不同利益攸关方的愿景,并提出了一种综合方法,包括分类中的7个维度,作为选择基准指标的基础。提出了一种基于网络调查和利益相关者访谈的咨询方法来评估所提出基准的稳健性。
{"title":"Benchmarking Internet of Things Deployments in Smart Cities","authors":"F. Gall, Sophie Vallet Chevillard, A. Gluhak, Zhan Xueli","doi":"10.1109/WAINA.2013.230","DOIUrl":"https://doi.org/10.1109/WAINA.2013.230","url":null,"abstract":"The development of an IoT deployment benchmarking framework is proposed. The framework, aimed at supporting policy decision process, expresses visions from 4 different stakeholders and proposes a comprehensive approach including 7 dimensions within a taxonomy to be used as a basis for the selection of benchmarking indicators. A consultative approach based on web survey and stakeholders interviews is proposed to evaluate robustness of the proposed benchmark.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125382056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Gaussian Characteristics of Aggregated Short-Lived Flows on High-Bandwidth Links 高带宽链路上聚合短寿命流的高斯特性研究
G. Kahe, A. Jahangir
Traffic modeling, traffic decomposition, and traffic engineering are some of the applications of traffic characterization that are mainly based on statistical characteristics of the network traffic. Many empirical analyses on Internet traffic traces show that the flow inter-arrival time distribution generally follows the Weibull distribution. As the scale of the network becomes larger, the Weibull distribution degrades to the Poisson distribution and when the flow arrival rate is high, it asymptotically converges to the Normal distribution. The aggregated traffic on high bandwidth links is the result of statistical multiplexing of many traffic sources, and the flow arrival rate on these links is sufficiently large. In this paper, using empirical analysis conducted by means of our Trace Analyzing Tool, along with ns2 simulations, we show that the aggregated short-lived flows on high-bandwidth links show Gaussian characteristics. Hence, using an adequate denoising filter, the short-lived flows can be separated.
流量建模、流量分解和流量工程是流量表征的一些应用,主要是基于网络流量的统计特征。大量对互联网流量轨迹的实证分析表明,流量到达间隔时间分布一般服从威布尔分布。随着网络规模的增大,威布尔分布退化为泊松分布,当流量到达率较高时,威布尔分布渐近收敛为正态分布。高带宽链路上的聚合流量是多个流量源统计复用的结果,并且这些链路上的流量到达率足够大。在本文中,使用我们的跟踪分析工具进行的实证分析,以及ns2模拟,我们表明聚合的短寿命流在高带宽链路上显示高斯特征。因此,使用适当的去噪滤波器,可以分离短时间流。
{"title":"On the Gaussian Characteristics of Aggregated Short-Lived Flows on High-Bandwidth Links","authors":"G. Kahe, A. Jahangir","doi":"10.1109/WAINA.2013.109","DOIUrl":"https://doi.org/10.1109/WAINA.2013.109","url":null,"abstract":"Traffic modeling, traffic decomposition, and traffic engineering are some of the applications of traffic characterization that are mainly based on statistical characteristics of the network traffic. Many empirical analyses on Internet traffic traces show that the flow inter-arrival time distribution generally follows the Weibull distribution. As the scale of the network becomes larger, the Weibull distribution degrades to the Poisson distribution and when the flow arrival rate is high, it asymptotically converges to the Normal distribution. The aggregated traffic on high bandwidth links is the result of statistical multiplexing of many traffic sources, and the flow arrival rate on these links is sufficiently large. In this paper, using empirical analysis conducted by means of our Trace Analyzing Tool, along with ns2 simulations, we show that the aggregated short-lived flows on high-bandwidth links show Gaussian characteristics. Hence, using an adequate denoising filter, the short-lived flows can be separated.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125518551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Effect of Relay Nodes on End-to-End Delay in Multi-hop Wireless Ad-hoc Networks 中继节点对多跳无线自组网端到端时延的影响
Raja Vara Prasad Yerra, P. Rajalakshmi
Channel access delay in a wireless adhoc network is the major source of delay while considering the total end to-end delay. Channel access delays experienced by different relay nodes are different in multi-hop adhoc network scenario. These delays in multi-hop network are analysed in the literature assuming channel access delays are independent and are of same magnitude at all the nodes in the network. In this work, the end to-end delay in a multi-hop adhoc network is analysed taking into account the silent relay nodes. Along with silent relay node effect, Channel access probability (p), transmission radius (r) analogous to transmit power, network throughput and density of nodes arête other factors considered for the end-to-end delay analysis. Effect of network parameters along with silent relay nodes on end-to-end delay is found to be considerably high compared to the previous literature results. Given a bound on end-to-end delay with percentage of silent relay nodes, throughput, node density requirements for a multi-hop adhoc network, optimal ranges of transmission radius and channel access probability can be obtained from the proposed analysis. End-to-end delay increases with silent relay nodes along with transmission radius(r), channel access probability(p), node density and throughput. It is clear from the analysis, that the effect of silent relay nodes on end to-end delay cannot be ignored to maintain certain Quality of service (QoS) metrics for the multi-hop wireless adhoc network.
考虑到端到端总时延,无线自组网中的信道接入时延是时延的主要来源。在多跳自组网中,不同中继节点经历的信道访问延迟是不同的。文献中对多跳网络中的这些延迟进行了分析,假设网络中所有节点的信道访问延迟是独立的且大小相同。本文分析了考虑静默中继节点的多跳自组网中的端到端时延问题。除了静默中继节点效应之外,信道访问概率(p)、类似于传输功率的传输半径(r)、网络吞吐量和节点密度arête也是端到端延迟分析所考虑的其他因素。与以往的文献结果相比,我们发现网络参数以及静默中继节点对端到端延迟的影响相当大。给定端到端延迟与多跳自组织网络的静默中继节点百分比、吞吐量、节点密度要求的界限,可以从所提出的分析中获得传输半径和信道接入概率的最佳范围。端到端延迟随传输半径(r)、信道访问概率(p)、节点密度和吞吐量的增加而增加。分析表明,为了保证多跳无线自组网的服务质量(QoS),静默中继节点对端到端时延的影响是不可忽视的。
{"title":"Effect of Relay Nodes on End-to-End Delay in Multi-hop Wireless Ad-hoc Networks","authors":"Raja Vara Prasad Yerra, P. Rajalakshmi","doi":"10.1109/WAINA.2013.181","DOIUrl":"https://doi.org/10.1109/WAINA.2013.181","url":null,"abstract":"Channel access delay in a wireless adhoc network is the major source of delay while considering the total end to-end delay. Channel access delays experienced by different relay nodes are different in multi-hop adhoc network scenario. These delays in multi-hop network are analysed in the literature assuming channel access delays are independent and are of same magnitude at all the nodes in the network. In this work, the end to-end delay in a multi-hop adhoc network is analysed taking into account the silent relay nodes. Along with silent relay node effect, Channel access probability (p), transmission radius (r) analogous to transmit power, network throughput and density of nodes arête other factors considered for the end-to-end delay analysis. Effect of network parameters along with silent relay nodes on end-to-end delay is found to be considerably high compared to the previous literature results. Given a bound on end-to-end delay with percentage of silent relay nodes, throughput, node density requirements for a multi-hop adhoc network, optimal ranges of transmission radius and channel access probability can be obtained from the proposed analysis. End-to-end delay increases with silent relay nodes along with transmission radius(r), channel access probability(p), node density and throughput. It is clear from the analysis, that the effect of silent relay nodes on end to-end delay cannot be ignored to maintain certain Quality of service (QoS) metrics for the multi-hop wireless adhoc network.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"1108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Priority Based Differentiation for Contention Mechanism in Legacy DCF Method 遗留DCF方法中基于优先级的争用区分机制
S. K. Dhurandher, I. Woungang, Sahil Sharma, Veeresh Goswami
Under the current scenario, many applications, across various domains of real world, are utilizing the Wireless LAN (WLAN) technology. With its growing usage, the requirement for QoS in WLAN has also gained significance. The most prevalent WLAN standard IEEE 802.11 does not provide QoS. In order to render service differentiation in the existing IEEE 802.11 scheme, we have presented a priority based differentiation scheme. The proposed scheme is implemented during the contention process of the existing DCF method. The contention window is divided with respect to various priority levels. The priority levels are decided on the basis of the data sensed by the station. The higher priority levels contend with a lower random back-off value and thus, are favored during transmission. Although, IEEE802.11e, the enhanced version of IEEE802.11, does provide QoS, our scheme is easier to implement on the existing legacy DCF systems. The proposed scheme modifies only the contention window and not parameters like Inter Frame Space, unlike IEEE 802.11e. We have presented the analysis of this suggested prioritization strategy on the basis of average delay, average throughput and packet received to packet sent ratio through the simulation result.
在当前的情况下,许多应用程序,跨越现实世界的各个领域,正在利用无线局域网(WLAN)技术。随着无线局域网的日益普及,对无线局域网QoS的要求也越来越高。最流行的WLAN标准IEEE 802.11不提供QoS。为了在现有IEEE 802.11方案中实现业务差异化,我们提出了一种基于优先级的差异化方案。该方案是在现有DCF方法的竞争过程中实现的。争用窗口根据不同的优先级级别进行划分。优先级是根据台站感知到的数据来决定的。较高的优先级与较低的随机后退值相竞争,因此在传输过程中受到青睐。虽然IEEE802.11e (IEEE802.11的增强版本)确实提供QoS,但我们的方案更容易在现有的遗留DCF系统上实现。与IEEE 802.11e不同,该方案只修改争用窗口,不修改帧间空间等参数。通过仿真结果,对该优化策略进行了基于平均时延、平均吞吐量和包收发比的分析。
{"title":"A Priority Based Differentiation for Contention Mechanism in Legacy DCF Method","authors":"S. K. Dhurandher, I. Woungang, Sahil Sharma, Veeresh Goswami","doi":"10.1109/WAINA.2013.251","DOIUrl":"https://doi.org/10.1109/WAINA.2013.251","url":null,"abstract":"Under the current scenario, many applications, across various domains of real world, are utilizing the Wireless LAN (WLAN) technology. With its growing usage, the requirement for QoS in WLAN has also gained significance. The most prevalent WLAN standard IEEE 802.11 does not provide QoS. In order to render service differentiation in the existing IEEE 802.11 scheme, we have presented a priority based differentiation scheme. The proposed scheme is implemented during the contention process of the existing DCF method. The contention window is divided with respect to various priority levels. The priority levels are decided on the basis of the data sensed by the station. The higher priority levels contend with a lower random back-off value and thus, are favored during transmission. Although, IEEE802.11e, the enhanced version of IEEE802.11, does provide QoS, our scheme is easier to implement on the existing legacy DCF systems. The proposed scheme modifies only the contention window and not parameters like Inter Frame Space, unlike IEEE 802.11e. We have presented the analysis of this suggested prioritization strategy on the basis of average delay, average throughput and packet received to packet sent ratio through the simulation result.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122599250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Novel Workflow Management System for Handling Process Adaptation and Compliance 一种处理过程适应性与遵从性的新型工作流管理系统
M. Omar, P. Chung, C. Dawson
Modern enterprise organisations rely on dynamic processes. Generally these processes cannot be modelled once and executed repeatedly without change. Enterprise processes execution may evolve unpredictably according to situations that cannot always be prescribed. However, no mechanism exists to ensure an updated process does not violate any compliance requirements. This paper presents a novel enterprise system architecture to combine the techniques of adaptive and compliance workflow solutions and adopting the Business Process Modelling Notation (BPMN) standards. The proposed Adaptive and Compliance Workflow Management System (ACWfMS) enables the development of a workflow management tool to create or update a standard and user-defined model. It automatically validates compliance by comparing a user-defined model against a standard model, and in case of violations, visual feedback is presented to the user. In addition, the architecture facilitates process migration to manage instances with modified definition. An example application of a postgraduate research process is discussed.
现代企业组织依赖于动态过程。一般来说,这些流程不可能建模一次,然后不加更改地重复执行。企业流程执行可能会根据不能总是规定的情况而不可预测地发展。但是,不存在任何机制来确保更新的流程不违反任何遵从性需求。本文提出了一种新的企业系统架构,该架构结合了自适应和遵从性工作流解决方案技术,并采用了业务流程建模符号(BPMN)标准。提出的适应性和遵从性工作流管理系统(ACWfMS)使工作流管理工具的开发能够创建或更新标准和用户定义的模型。它通过将用户定义的模型与标准模型进行比较来自动验证合规性,并且在违反的情况下,将可视反馈呈现给用户。此外,该体系结构促进了流程迁移,从而管理具有修改定义的实例。讨论了研究生研究过程的一个应用实例。
{"title":"A Novel Workflow Management System for Handling Process Adaptation and Compliance","authors":"M. Omar, P. Chung, C. Dawson","doi":"10.1109/WAINA.2013.258","DOIUrl":"https://doi.org/10.1109/WAINA.2013.258","url":null,"abstract":"Modern enterprise organisations rely on dynamic processes. Generally these processes cannot be modelled once and executed repeatedly without change. Enterprise processes execution may evolve unpredictably according to situations that cannot always be prescribed. However, no mechanism exists to ensure an updated process does not violate any compliance requirements. This paper presents a novel enterprise system architecture to combine the techniques of adaptive and compliance workflow solutions and adopting the Business Process Modelling Notation (BPMN) standards. The proposed Adaptive and Compliance Workflow Management System (ACWfMS) enables the development of a workflow management tool to create or update a standard and user-defined model. It automatically validates compliance by comparing a user-defined model against a standard model, and in case of violations, visual feedback is presented to the user. In addition, the architecture facilitates process migration to manage instances with modified definition. An example application of a postgraduate research process is discussed.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123027319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2013 27th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1