首页 > 最新文献

2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)最新文献

英文 中文
The Stratified Shortest-Paths Problem (invited paper) 分层最短路径问题(特邀论文)
Timothy G. Griffin
In the last ten years it has become clear that some Internet routing protocols do not compute globally optimal paths, but only locally optimal ones. This represents something rather novel in the context of the vast literature on routing protocols for data networking. This paper introduces the Stratified Shortest-Paths Problem as a tool for exploring the borderline between local and global optimality problems. The paper contains a tutorial overview of the algebraic concepts used.
在过去的十年里,很明显,一些互联网路由协议不计算全局最优路径,而只计算局部最优路径。在关于数据网络路由协议的大量文献中,这代表了一些相当新颖的东西。本文介绍了分层最短路径问题,作为探索局部最优性问题和全局最优性问题之间界限的工具。这篇论文包含了所使用的代数概念的教程概述。
{"title":"The Stratified Shortest-Paths Problem (invited paper)","authors":"Timothy G. Griffin","doi":"10.1109/COMSNETS.2010.5432000","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5432000","url":null,"abstract":"In the last ten years it has become clear that some Internet routing protocols do not compute globally optimal paths, but only locally optimal ones. This represents something rather novel in the context of the vast literature on routing protocols for data networking. This paper introduces the Stratified Shortest-Paths Problem as a tool for exploring the borderline between local and global optimality problems. The paper contains a tutorial overview of the algebraic concepts used.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121526106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On the robustness of wireless opportunistic routing toward inaccurate link-level measurements 关于无线机会路由对不准确链路电平测量的鲁棒性
P. Lee, V. Misra, D. Rubenstein
The quality of wireless links is inherently dynamic, and this often makes the measurements of link delivery probabilities inaccurate over short timescales. We present Stable Opportunistic Routing (SOR), which improves unicast throughput for wireless mesh routing in the presence of inaccurate link-level measurements. In essence, SOR integrates two key features of prior approaches: (i) nodes trigger or suppress transmissions by inferring the actual reception of packets by neighboring nodes through channel overhearing, and (ii) nodes use network coding to avoid redundant transmissions. In addition, SOR is less dependent on accurate timing estimates or measured loss rates than prior approaches. Our stance is to argue that by carefully incorporating prior approaches into the design space of SOR, we can make opportunistic routing more robust toward link-level measurement errors, a practical issue in wireless mesh routing. Using nsclick simulation, we show that SOR has higher throughput than existing shortest-path and opportunistic routing protocols in large-scale networks, and the performance gain is more prominent when link-level measurements are erroneous.
无线链路的质量本质上是动态的,这往往使得在短时间尺度内链路传递概率的测量不准确。我们提出了稳定机会路由(SOR),它在存在不准确的链路级别测量的情况下提高了无线网状路由的单播吞吐量。从本质上讲,SOR集成了先前方法的两个关键特征:(i)节点通过信道监听推断相邻节点实际接收数据包来触发或抑制传输,(ii)节点使用网络编码来避免冗余传输。此外,与先前的方法相比,SOR较少依赖于准确的时间估计或测量的损失率。我们的立场是,通过仔细地将先前的方法纳入SOR的设计空间,我们可以使机会路由对链路级测量误差更加稳健,这是无线网状路由中的一个实际问题。通过nsclick仿真,我们发现SOR在大规模网络中比现有的最短路径和机会路由协议具有更高的吞吐量,并且当链路级别测量错误时,性能增益更加突出。
{"title":"On the robustness of wireless opportunistic routing toward inaccurate link-level measurements","authors":"P. Lee, V. Misra, D. Rubenstein","doi":"10.1109/COMSNETS.2010.5431992","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431992","url":null,"abstract":"The quality of wireless links is inherently dynamic, and this often makes the measurements of link delivery probabilities inaccurate over short timescales. We present Stable Opportunistic Routing (SOR), which improves unicast throughput for wireless mesh routing in the presence of inaccurate link-level measurements. In essence, SOR integrates two key features of prior approaches: (i) nodes trigger or suppress transmissions by inferring the actual reception of packets by neighboring nodes through channel overhearing, and (ii) nodes use network coding to avoid redundant transmissions. In addition, SOR is less dependent on accurate timing estimates or measured loss rates than prior approaches. Our stance is to argue that by carefully incorporating prior approaches into the design space of SOR, we can make opportunistic routing more robust toward link-level measurement errors, a practical issue in wireless mesh routing. Using nsclick simulation, we show that SOR has higher throughput than existing shortest-path and opportunistic routing protocols in large-scale networks, and the performance gain is more prominent when link-level measurements are erroneous.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115245257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MTorrent: A multicast enabled BitTorrent protocol MTorrent:一种支持多播的BitTorrent协议
P. Agrawal, Hitesh Khandelwal, R. Ghosh
In this paper we address the problem of repetitive data transmission in BitTorrent. and propose a new protocol called MTorrent to restrict the same by exploiting IP Multicast functionality wherever available. A prototype system of our protocol have been implemented, and large scale measurement studies were conducted over Emulab network consisting of 44 nodes, spread over 9 LANs and 36 end clients. MTorrent leads to 44% reduction in download time, 65% reduction in traffic load on the Internet links and 40% reduction in download of redundant packets when compared to the BitTorrent. MTorrent is interoperable with BitTorrent, and requires only a few changes at the client end.
在本文中,我们解决了BitTorrent中重复数据传输的问题。并提出了一个名为MTorrent的新协议,通过利用IP多播功能来限制相同的情况。该协议的原型系统已经实现,并在包含44个节点、分布在9个局域网和36个终端客户端的Emulab网络上进行了大规模的测量研究。与BitTorrent相比,MTorrent导致下载时间减少44%,互联网链接流量负载减少65%,冗余数据包下载减少40%。MTorrent与BitTorrent是可互操作的,并且只需要在客户端进行一些更改。
{"title":"MTorrent: A multicast enabled BitTorrent protocol","authors":"P. Agrawal, Hitesh Khandelwal, R. Ghosh","doi":"10.1109/COMSNETS.2010.5431979","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431979","url":null,"abstract":"In this paper we address the problem of repetitive data transmission in BitTorrent. and propose a new protocol called MTorrent to restrict the same by exploiting IP Multicast functionality wherever available. A prototype system of our protocol have been implemented, and large scale measurement studies were conducted over Emulab network consisting of 44 nodes, spread over 9 LANs and 36 end clients. MTorrent leads to 44% reduction in download time, 65% reduction in traffic load on the Internet links and 40% reduction in download of redundant packets when compared to the BitTorrent. MTorrent is interoperable with BitTorrent, and requires only a few changes at the client end.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116072200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An end-to-end QoS aware greedy distributed scheduling framework for WiMAX mesh networks 面向WiMAX网状网络的端到端QoS感知贪婪分布式调度框架
A. Kapoor, V. Ribeiro
In this paper, we propose a greedy framework for distributed scheduling in the IEEE 802.16 MeSH mode, which uses a novel “End-to-end QoS aware bandwidth Reservation Protocol” (EQRP) to provide end-to-end QoS guarantee to intramesh flows. The proposed framework provides an efficient and integrated solution to QoS aware routing and call admission control in distributed WiMAX mesh networks. The framework does not rely on any special node for resource management which makes it more scalable and robust to node failures. To save expensive control overheads, EQRP learns from previous bandwidth reservation failures to maintain a rank list of next hops for every destination and uses the “Greedy Forwarding” algorithm to do bandwidth reservation using slot information from only two hop neighbor routers'. We compare EQRP with Race Free Protocol (RFP) and evaluate its performance with extensive simulations in ns2. Simulations show that for static WiMAX mesh network, the “Greedy Forwarding” algorithm used by EQRP admits approximately 10% more VOIP calls. For a random topology of 25 mesh routers, the aggregate signaling overhead generated by EQRP at a high call arrival rate of 1/2000 (calls/milli-seconds) is 76% less than that generated by RFP. In comparison with RFP, EQRP took 200 milli-seconds less average call setup time.
本文提出了一种基于IEEE 802.16 MeSH模式的贪婪分布式调度框架,该框架使用一种新颖的“端到端QoS感知带宽保留协议”(EQRP)为网内流提供端到端的QoS保证。该框架为分布式WiMAX网状网络中的QoS感知路由和呼叫接纳控制提供了一种高效、集成的解决方案。该框架不依赖于任何特殊的节点进行资源管理,这使得它在节点故障时更具可扩展性和鲁棒性。为了节省昂贵的控制开销,EQRP从以前的带宽保留失败中学习,维护每个目的地的下一跳的秩列表,并使用“贪婪转发”算法,只使用来自两个邻居路由器的槽位信息来进行带宽保留。我们将EQRP与RFP (Race Free Protocol)进行了比较,并在ns2中进行了大量的仿真,评估了其性能。仿真结果表明,对于静态WiMAX网状网络,EQRP采用的“贪婪转发”算法可多接收约10%的VOIP呼叫。对于25个网状路由器的随机拓扑,EQRP在1/2000(呼叫/毫秒)的高呼叫到达率下产生的总信令开销比RFP产生的总信令开销少76%。与RFP相比,EQRP的平均呼叫建立时间减少了200毫秒。
{"title":"An end-to-end QoS aware greedy distributed scheduling framework for WiMAX mesh networks","authors":"A. Kapoor, V. Ribeiro","doi":"10.1109/COMSNETS.2010.5431964","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431964","url":null,"abstract":"In this paper, we propose a greedy framework for distributed scheduling in the IEEE 802.16 MeSH mode, which uses a novel “End-to-end QoS aware bandwidth Reservation Protocol” (EQRP) to provide end-to-end QoS guarantee to intramesh flows. The proposed framework provides an efficient and integrated solution to QoS aware routing and call admission control in distributed WiMAX mesh networks. The framework does not rely on any special node for resource management which makes it more scalable and robust to node failures. To save expensive control overheads, EQRP learns from previous bandwidth reservation failures to maintain a rank list of next hops for every destination and uses the “Greedy Forwarding” algorithm to do bandwidth reservation using slot information from only two hop neighbor routers'. We compare EQRP with Race Free Protocol (RFP) and evaluate its performance with extensive simulations in ns2. Simulations show that for static WiMAX mesh network, the “Greedy Forwarding” algorithm used by EQRP admits approximately 10% more VOIP calls. For a random topology of 25 mesh routers, the aggregate signaling overhead generated by EQRP at a high call arrival rate of 1/2000 (calls/milli-seconds) is 76% less than that generated by RFP. In comparison with RFP, EQRP took 200 milli-seconds less average call setup time.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129037927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Network bandwidth configuration tool for Xen virtual machines 用于Xen虚拟机的网络带宽配置工具
K. Mathew, Purushottam Kulkarni, V. Apte
Performance differentiation has always been a requirement in virtualized environments, especially in case where virtualization is used in high-end data center applications. In this paper, we present a command-line tool for Network bandwidth differentiation in Xen, which is an open source solution for virtualization. Though the CPU credit scheduler in Xen can be configured using command-line tools to specify weights and caps for a virtual machine, no such tools exist to specify the network bandwidth limits. Through our tool, xmsetbw, network bandwidth limits for a virtual machine in Xen can be specified and dynamically reconfigured (without kernel recompilation). Experimental evaluations show that bandwidth utilization is limited within specified values.
在虚拟化环境中,性能差异一直是一个需求,特别是在高端数据中心应用程序中使用虚拟化的情况下。在本文中,我们介绍了Xen中用于网络带宽区分的命令行工具,Xen是一种用于虚拟化的开源解决方案。虽然可以使用命令行工具配置Xen中的CPU信用调度器,以指定虚拟机的权重和上限,但不存在这样的工具来指定网络带宽限制。通过我们的工具xmsetbw,可以指定Xen中虚拟机的网络带宽限制并动态重新配置(无需重新编译内核)。实验评估表明,带宽利用率被限制在规定的范围内。
{"title":"Network bandwidth configuration tool for Xen virtual machines","authors":"K. Mathew, Purushottam Kulkarni, V. Apte","doi":"10.1109/COMSNETS.2010.5431965","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431965","url":null,"abstract":"Performance differentiation has always been a requirement in virtualized environments, especially in case where virtualization is used in high-end data center applications. In this paper, we present a command-line tool for Network bandwidth differentiation in Xen, which is an open source solution for virtualization. Though the CPU credit scheduler in Xen can be configured using command-line tools to specify weights and caps for a virtual machine, no such tools exist to specify the network bandwidth limits. Through our tool, xmsetbw, network bandwidth limits for a virtual machine in Xen can be specified and dynamically reconfigured (without kernel recompilation). Experimental evaluations show that bandwidth utilization is limited within specified values.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An energy efficient and Fault-Tolerant Clock Synchronization Protocol for wireless sensor networks 一种用于无线传感器网络的节能容错时钟同步协议
Amulya Ratna Swain, R. Hansdah
Recent advances in the development of wireless sensor networks(WSNs) have considerably increased the interest in their applications for a wide range of problems such as environmental monitoring, target tracking, habitat monitoring etc. Many of these applications and the wireless sensor network(WSN) itself require that the clocks of the sensor nodes are synchronized with certain accuracy. Existing approaches to clock synchronization in WSNs are mostly hierarchical in nature. A hierarchical structure is usually difficult to maintain, and it results in longer synchronization phase and reduced synchronization accuracy for large WSNs. Traditional internal clock synchronization protocols that have been proposed for distributed systems assume that the network is complete, i.e., every node can communicate with every other node directly. But WSNs, in general, are not a complete network, and hence, traditional internal clock synchronization protocols are not directly suitable for WSNs. In this paper, we propose a novel peer-to-peer based fully distributed internal clock synchronization protocol for wireless sensor networks which are not a complete network. We have analyzed our protocol for bounds on synchronization error, and shown that the synchronization error is always upper bounded. We have carried out extensive simulation studies using Castalia simulator (up to 1000 nodes) to evaluate the performance of our protocol and also compared its performance with that of TPSN. The accuracy achieved is consistently better than that of TPSN, and the energy consumption per node is considerably less than that of TPSN except for small WSNs requiring higher accuracy. We have also implemented our protocol using TinyOS in a WSN consisting of a few TelosB motes. The experimental results from the above implementation of our protocol show that the synchronization error is bounded and the accuracy is within a few tics of the external clock.
近年来,无线传感器网络(WSNs)的发展大大增加了人们对其在环境监测、目标跟踪、栖息地监测等广泛问题中的应用的兴趣。这些应用和无线传感器网络(WSN)本身都要求传感器节点的时钟以一定的精度同步。现有的无线传感器网络时钟同步方法本质上大多是分层的。对于大型无线传感器网络,分层结构往往难以维护,导致同步阶段变长,同步精度降低。传统的分布式系统内部时钟同步协议假设网络是完整的,即每个节点都可以直接与其他节点通信。但一般来说,无线传感器网络并不是一个完整的网络,因此传统的内部时钟同步协议并不直接适用于无线传感器网络。本文针对非完整网络的无线传感器网络,提出了一种基于点对点的全分布式内部时钟同步协议。分析了同步误差的边界,证明了同步误差总是上界的。我们使用Castalia模拟器(多达1000个节点)进行了广泛的仿真研究,以评估我们的协议性能,并将其性能与TPSN进行了比较。所获得的精度始终优于TPSN,并且除了需要更高精度的小型wsn外,每个节点的能耗明显低于TPSN。我们还在一个由几个TelosB模块组成的WSN中使用TinyOS实现了我们的协议。上述协议实现的实验结果表明,同步误差是有界的,精度在外部时钟的几个tics以内。
{"title":"An energy efficient and Fault-Tolerant Clock Synchronization Protocol for wireless sensor networks","authors":"Amulya Ratna Swain, R. Hansdah","doi":"10.1109/COMSNETS.2010.5432009","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5432009","url":null,"abstract":"Recent advances in the development of wireless sensor networks(WSNs) have considerably increased the interest in their applications for a wide range of problems such as environmental monitoring, target tracking, habitat monitoring etc. Many of these applications and the wireless sensor network(WSN) itself require that the clocks of the sensor nodes are synchronized with certain accuracy. Existing approaches to clock synchronization in WSNs are mostly hierarchical in nature. A hierarchical structure is usually difficult to maintain, and it results in longer synchronization phase and reduced synchronization accuracy for large WSNs. Traditional internal clock synchronization protocols that have been proposed for distributed systems assume that the network is complete, i.e., every node can communicate with every other node directly. But WSNs, in general, are not a complete network, and hence, traditional internal clock synchronization protocols are not directly suitable for WSNs. In this paper, we propose a novel peer-to-peer based fully distributed internal clock synchronization protocol for wireless sensor networks which are not a complete network. We have analyzed our protocol for bounds on synchronization error, and shown that the synchronization error is always upper bounded. We have carried out extensive simulation studies using Castalia simulator (up to 1000 nodes) to evaluate the performance of our protocol and also compared its performance with that of TPSN. The accuracy achieved is consistently better than that of TPSN, and the energy consumption per node is considerably less than that of TPSN except for small WSNs requiring higher accuracy. We have also implemented our protocol using TinyOS in a WSN consisting of a few TelosB motes. The experimental results from the above implementation of our protocol show that the synchronization error is bounded and the accuracy is within a few tics of the external clock.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131905676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
StrandCast: Peer-to-peer content distribution for latency tolerant applications StrandCast:用于容忍延迟应用程序的点对点内容分发
Ketan Mayer-Patel, Andrew Jones
Existing streaming peer-to-peer distribution architectures are designed to balance inherent trade-offs between stretch, stress, and robustness to churn. Several rely on multiple description coding in order to facilitate mesh-based or forest-based approaches. We believe, however, that a number of important applications such as broadcast video, pyramid video-on-demand, digital fountains, and data cycles to name a few exhibit a great deal of latency tolerance. For these applications, stretch is immaterial as long as join/leave latencies are minimized. If stretch is no longer a concern, simply chaining peers into a line emerges as a natural design choice for minimizing stress. The realities of loss, churn, and heterogeneous peer capabilities make implementing such a design challenging. In this paper, we show that by using a layered data model, a linear distribution scheme can be very effectively achieved and can be superior to MDC-based schemes. The paper describes our system called StrandCast and presents simulation results demonstrating its effectiveness and comparing it to SplitStream.
现有的流对等分布架构旨在平衡伸缩性、压力和健壮性之间的内在权衡。一些依赖于多重描述编码,以促进基于网格或基于森林的方法。然而,我们相信,许多重要的应用程序,如广播视频、金字塔视频点播、数字喷泉和数据周期等,都表现出很大的延迟容忍度。对于这些应用程序,只要连接/离开延迟最小化,拉伸就无关紧要。如果拉伸不再是一个问题,那么简单地将同伴连接成一条线就会成为最小化压力的自然设计选择。损失、流失和异构对等功能的现实使得实现这样的设计具有挑战性。在本文中,我们证明了通过使用分层数据模型,可以非常有效地实现线性分布方案,并且可以优于基于mdc的方案。本文介绍了我们的系统StrandCast,并给出了仿真结果,证明了它的有效性,并将其与SplitStream进行了比较。
{"title":"StrandCast: Peer-to-peer content distribution for latency tolerant applications","authors":"Ketan Mayer-Patel, Andrew Jones","doi":"10.1109/COMSNETS.2010.5431998","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5431998","url":null,"abstract":"Existing streaming peer-to-peer distribution architectures are designed to balance inherent trade-offs between stretch, stress, and robustness to churn. Several rely on multiple description coding in order to facilitate mesh-based or forest-based approaches. We believe, however, that a number of important applications such as broadcast video, pyramid video-on-demand, digital fountains, and data cycles to name a few exhibit a great deal of latency tolerance. For these applications, stretch is immaterial as long as join/leave latencies are minimized. If stretch is no longer a concern, simply chaining peers into a line emerges as a natural design choice for minimizing stress. The realities of loss, churn, and heterogeneous peer capabilities make implementing such a design challenging. In this paper, we show that by using a layered data model, a linear distribution scheme can be very effectively achieved and can be superior to MDC-based schemes. The paper describes our system called StrandCast and presents simulation results demonstrating its effectiveness and comparing it to SplitStream.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"349 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124303105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
P2P content sharing in spontaneous multi-hop wireless networks 自发多跳无线网络中的P2P内容共享
M. Sbai, Emna Salhi, C. Barakat
Spontaneous multi-hop wireless networks provide a new environment for sharing content among communities of end users. Nodes interested in some content can share it on a multi-hop basis by relying on the collaboration of intermediate nodes. Organizing the communication overlay in such an environment is then a challenging task especially given the mobility of the nodes, the interference, and the scarcity of resources. In this work, we propose and implement a general, stand-alone and efficient P2P content sharing protocol for wireless ad hoc networks. We consider general and realistic scenarios ranging from a single overlay to multiple overlays coexisting in the same network, and for every single overlay, we consider different peer densities in the network. The main challenges are overlay disconnections, routing overhead, low sharing opportunities and instability of distant paths. Our protocol proposes efficient solutions for these problems leading to the best download times while guaranteeing the maximum sharing opportunities among the peers. We validate our protocol through extensive simulations and experimentations on the ORBIT platform.
自发多跳无线网络为终端用户社区之间的内容共享提供了一种新的环境。对某些内容感兴趣的节点可以依靠中间节点的协作,在多跳的基础上共享内容。在这样的环境中组织通信覆盖层是一项具有挑战性的任务,特别是考虑到节点的移动性、干扰和资源的稀缺性。在这项工作中,我们提出并实现了一种通用的、独立的、高效的无线自组织网络P2P内容共享协议。我们考虑了从单一覆盖到多个覆盖共存于同一网络中的一般和现实场景,并且对于每个覆盖,我们考虑了网络中不同的对等体密度。主要的挑战是覆盖断开、路由开销、低共享机会和远距离路径的不稳定性。我们的协议针对这些问题提出了有效的解决方案,从而在保证对等体之间最大共享机会的同时实现最佳下载时间。我们通过在ORBIT平台上的大量模拟和实验验证了我们的协议。
{"title":"P2P content sharing in spontaneous multi-hop wireless networks","authors":"M. Sbai, Emna Salhi, C. Barakat","doi":"10.1109/COMSNETS.2010.5432005","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5432005","url":null,"abstract":"Spontaneous multi-hop wireless networks provide a new environment for sharing content among communities of end users. Nodes interested in some content can share it on a multi-hop basis by relying on the collaboration of intermediate nodes. Organizing the communication overlay in such an environment is then a challenging task especially given the mobility of the nodes, the interference, and the scarcity of resources. In this work, we propose and implement a general, stand-alone and efficient P2P content sharing protocol for wireless ad hoc networks. We consider general and realistic scenarios ranging from a single overlay to multiple overlays coexisting in the same network, and for every single overlay, we consider different peer densities in the network. The main challenges are overlay disconnections, routing overhead, low sharing opportunities and instability of distant paths. Our protocol proposes efficient solutions for these problems leading to the best download times while guaranteeing the maximum sharing opportunities among the peers. We validate our protocol through extensive simulations and experimentations on the ORBIT platform.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114829306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Adaptive Power Control with Overhearing Avoidance for wireless sensor networks 无线传感器网络的自适应抗干扰功率控制
M. Ramakrishnan, P. Ranjan
In this paper, Adaptive Power Control with Overhearing Avoidance (APC-OA) has been proposed. The proposed power control algorithm has been implemented in PICSENSE wireless sensor nodes. The energy consumption of proposed MAC has been compared with that of On Demand Transmission Power Control[1] (ODTPC) protocol and it is shown that the Adaptive Power Control with Overhearing Avoidance gives higher energy conservation compared to ODTPC. The power level convergence towards the optimal power for APC-OA is two times faster than the ODTPC.
本文提出了一种具有防偷听功能的自适应功率控制(APC-OA)。所提出的功率控制算法已在PICSENSE无线传感器节点上实现。将所提出的MAC与按需传输功率控制[1](ODTPC)协议的能耗进行了比较,结果表明,与ODTPC相比,具有偷听避免的自适应功率控制具有更高的节能效果。APC-OA向最优功率的收敛速度比ODTPC快2倍。
{"title":"Adaptive Power Control with Overhearing Avoidance for wireless sensor networks","authors":"M. Ramakrishnan, P. Ranjan","doi":"10.1109/COMSNETS.2010.5432002","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5432002","url":null,"abstract":"In this paper, Adaptive Power Control with Overhearing Avoidance (APC-OA) has been proposed. The proposed power control algorithm has been implemented in PICSENSE wireless sensor nodes. The energy consumption of proposed MAC has been compared with that of On Demand Transmission Power Control[1] (ODTPC) protocol and it is shown that the Adaptive Power Control with Overhearing Avoidance gives higher energy conservation compared to ODTPC. The power level convergence towards the optimal power for APC-OA is two times faster than the ODTPC.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127190727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A channel-based hypothesis testing approach to enhance user authentication in wireless networks 一种基于信道假设检验的无线网络用户认证方法
Jitendra Tugnait, Hyosung Kim
We consider a physical layer approach to enhance wireless security by using the unique wireless channel state information (CSI) of a legitimate user to authenticate subsequent transmissions from this user, thereby denying access to any spoofer whose CSI would significantly differ from that of the legitimate user by virtue of a different spatial location. In some existing approaches, multicarrier systems have been considered where the channel frequency response at distinct frequencies is used to devise a hypothesis testing approach: is the CSI of the current transmission (packet) the same as that of the previous transmission? In this paper we investigate a single-carrier timedomain approach via either residual testing or time-domain CSI comparison. A hypothesis testing approach is formulated to test whiteness of residuals from current transmission where the residuals are generated using the estimated channel from the previous transmission. We also consider a hypothesis testing approach where the time-domain CSI of the current transmission is compared with that of the previous transmission. Two binary hypothesis testing approaches are formulated and illustrated via simulations.
我们考虑了一种物理层方法,通过使用合法用户的唯一无线信道状态信息(CSI)来验证来自该用户的后续传输,从而拒绝访问任何CSI与合法用户的CSI因不同的空间位置而显着不同的欺骗者。在一些现有的方法中,已经考虑了多载波系统,其中使用不同频率下的信道频率响应来设计假设检验方法:当前传输(分组)的CSI是否与先前传输的CSI相同?本文通过残差检验和时域CSI比较研究了一种单载波时域方法。提出了一种假设检验方法来检验当前传输残差的白度,其中残差是使用先前传输的估计信道产生的。我们还考虑了一种假设检验方法,其中将当前传输的时域CSI与先前传输的CSI进行比较。提出了两种二元假设检验方法,并通过仿真加以说明。
{"title":"A channel-based hypothesis testing approach to enhance user authentication in wireless networks","authors":"Jitendra Tugnait, Hyosung Kim","doi":"10.1109/COMSNETS.2010.5432018","DOIUrl":"https://doi.org/10.1109/COMSNETS.2010.5432018","url":null,"abstract":"We consider a physical layer approach to enhance wireless security by using the unique wireless channel state information (CSI) of a legitimate user to authenticate subsequent transmissions from this user, thereby denying access to any spoofer whose CSI would significantly differ from that of the legitimate user by virtue of a different spatial location. In some existing approaches, multicarrier systems have been considered where the channel frequency response at distinct frequencies is used to devise a hypothesis testing approach: is the CSI of the current transmission (packet) the same as that of the previous transmission? In this paper we investigate a single-carrier timedomain approach via either residual testing or time-domain CSI comparison. A hypothesis testing approach is formulated to test whiteness of residuals from current transmission where the residuals are generated using the estimated channel from the previous transmission. We also consider a hypothesis testing approach where the time-domain CSI of the current transmission is compared with that of the previous transmission. Two binary hypothesis testing approaches are formulated and illustrated via simulations.","PeriodicalId":369006,"journal":{"name":"2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127361820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
期刊
2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1