首页 > 最新文献

2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)最新文献

英文 中文
Optimal link scheduling for real-time traffic in wireless mesh networks in both per-flow and per-path frameworks 无线网状网络中按流和按径框架下实时流量的最优链路调度
P. Cappanera, L. Lenzini, Alessandro Lori, G. Stea, G. Vaglini
In this paper we investigate link scheduling for Wireless Mesh Networks (WMNs) carrying real-time (i.e., delay-constrained) traffic. We show that the problem of computing a conflict-free link schedule with end-to-end delay constraints can be formulated as a mixed-integer non linear problem that can be optimally solved in reasonable time (i.e., minutes) for relatively large WMNs (up to 20–30 nodes). We use the above result to explore the schedulability region of a WMN with a given routing and input traffic, assessing whether and when aggregating flows which traverse the same path makes a given input flow set sched-ulable. Furthermore, we devise a heuristic solution strategy, which computes good suboptimal solutions within up to few seconds, thus being amenable for online admission control.
在本文中,我们研究了无线网状网络(WMNs)承载实时(即延迟约束)流量的链路调度。我们表明,计算具有端到端延迟约束的无冲突链路调度的问题可以表述为一个混合整数非线性问题,对于相对较大的wmn(多达20-30个节点),该问题可以在合理的时间(即分钟)内得到最佳解决。我们使用上述结果来探索具有给定路由和输入流量的WMN的可调度区域,评估遍历相同路径的聚合流是否以及何时使给定的输入流集可调度。此外,我们设计了一种启发式解决策略,该策略可以在几秒钟内计算出良好的次优解决方案,从而适用于在线准入控制。
{"title":"Optimal link scheduling for real-time traffic in wireless mesh networks in both per-flow and per-path frameworks","authors":"P. Cappanera, L. Lenzini, Alessandro Lori, G. Stea, G. Vaglini","doi":"10.1109/WOWMOM.2010.5534919","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534919","url":null,"abstract":"In this paper we investigate link scheduling for Wireless Mesh Networks (WMNs) carrying real-time (i.e., delay-constrained) traffic. We show that the problem of computing a conflict-free link schedule with end-to-end delay constraints can be formulated as a mixed-integer non linear problem that can be optimally solved in reasonable time (i.e., minutes) for relatively large WMNs (up to 20–30 nodes). We use the above result to explore the schedulability region of a WMN with a given routing and input traffic, assessing whether and when aggregating flows which traverse the same path makes a given input flow set sched-ulable. Furthermore, we devise a heuristic solution strategy, which computes good suboptimal solutions within up to few seconds, thus being amenable for online admission control.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114436664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the maximum performance in opportunistic routing 论机会路由的最大性能
Llorenç Cerdà-Alabern, A. Darehshoorzadeh, V. Pla
In recent years there has been a growing interest in Opportunistic Routing as a way to increase the capacity of wireless networks by exploiting its broadcast nature. By contrast to traditional uni-path routing, in opportunistic routing the nodes overhearing neighbor's transmissions can become candidates to forward the packets towards the destination. In this paper we address the question: What is the maximum performance that can be obtained using opportunistic routing? To answer this question we use an analytical model that allows to compute the optimal position of the nodes, such that the progress towards the destination is maximized. We use this model to compute bounds to the minimum expected number of transmissions that can be achieved in a network using opportunistic routing.
近年来,机会路由作为一种利用其广播性质来增加无线网络容量的方法,受到了越来越多的关注。与传统的单路径路由相比,在机会路由中,侦听邻居传输的节点可以成为向目的地转发数据包的候选节点。在本文中,我们解决了这样一个问题:使用机会路由可以获得的最大性能是什么?为了回答这个问题,我们使用了一个分析模型,该模型允许计算节点的最佳位置,从而使到达目的地的进度最大化。我们使用该模型来计算使用机会路由在网络中可以实现的最小期望传输数的界限。
{"title":"On the maximum performance in opportunistic routing","authors":"Llorenç Cerdà-Alabern, A. Darehshoorzadeh, V. Pla","doi":"10.1109/WOWMOM.2010.5534897","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534897","url":null,"abstract":"In recent years there has been a growing interest in Opportunistic Routing as a way to increase the capacity of wireless networks by exploiting its broadcast nature. By contrast to traditional uni-path routing, in opportunistic routing the nodes overhearing neighbor's transmissions can become candidates to forward the packets towards the destination. In this paper we address the question: What is the maximum performance that can be obtained using opportunistic routing? To answer this question we use an analytical model that allows to compute the optimal position of the nodes, such that the progress towards the destination is maximized. We use this model to compute bounds to the minimum expected number of transmissions that can be achieved in a network using opportunistic routing.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127593147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Investigating the impact of human activity on the performance of wireless networks — An experimental approach 研究人类活动对无线网络性能的影响。一种实验方法
Elyes Ben Hamida, G. Chelius
In this paper, we are interested in evaluating the performance of indoor wireless networks in LOS and NLOS conditions. We first provide a thorough analysis of received signal strength indicator (RSSI) measurements obtained in indoor experiments. We aim to better understand the temporal and spatial correlations of RSSI values. Moreover, we analyze in detail the stability of radio links over time. We show that human activity has a significant impact on the performance of wireless networks and that RSSI is not always a robust indicator for the radio link quality. Based on our results, we then propose a time-varying simulation model to reproduce the RSSI variability as observed in our experiments. We argue that this model results in more realistic and accurate RSSI values to be used in simulation.
在本文中,我们感兴趣的是评估室内无线网络在LOS和NLOS条件下的性能。我们首先对室内实验中获得的接收信号强度指标(RSSI)测量结果进行了全面分析。我们的目的是更好地了解RSSI值的时空相关性。此外,我们还详细分析了无线电链路随时间的稳定性。我们表明,人类活动对无线网络的性能有重大影响,并且RSSI并不总是无线电链路质量的可靠指标。基于我们的结果,我们提出了一个时变模拟模型来再现我们在实验中观察到的RSSI变异性。我们认为,该模型的结果更真实和准确的RSSI值用于仿真。
{"title":"Investigating the impact of human activity on the performance of wireless networks — An experimental approach","authors":"Elyes Ben Hamida, G. Chelius","doi":"10.1109/WOWMOM.2010.5534913","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534913","url":null,"abstract":"In this paper, we are interested in evaluating the performance of indoor wireless networks in LOS and NLOS conditions. We first provide a thorough analysis of received signal strength indicator (RSSI) measurements obtained in indoor experiments. We aim to better understand the temporal and spatial correlations of RSSI values. Moreover, we analyze in detail the stability of radio links over time. We show that human activity has a significant impact on the performance of wireless networks and that RSSI is not always a robust indicator for the radio link quality. Based on our results, we then propose a time-varying simulation model to reproduce the RSSI variability as observed in our experiments. We argue that this model results in more realistic and accurate RSSI values to be used in simulation.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126953656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Towards securing mintroute in wireless sensor networks 无线传感器网络的分钟安全研究
I. Hegazy, R. Safavi-Naini, C. Williamson
In a Wireless Sensor Network (WSN), the sensor nodes rely upon a multi-hop routing protocol to relay their data to the base station. However, most WSN routing protocols are vulnerable to attacks in which a malicious node can disrupt the routes, drop, modify, or divert data away from the base station. In this paper, we use the ns-2 network simulator to demonstrate the vulnerability of the MintRoute protocol to link quality attacks by a malicious node. We then propose a novel "sequence number gap trick" as a lightweight means to test for and detect the presence of a malicious attacker. The simulation results show that judicious use of the sequence number gap trick provides robust detection of malicious nodes, preserving the data delivery capabilities of the WSN.
在无线传感器网络(WSN)中,传感器节点依靠多跳路由协议将其数据中继到基站。然而,大多数WSN路由协议容易受到攻击,其中恶意节点可以破坏路由,丢弃,修改或将数据从基站转移。在本文中,我们使用ns-2网络模拟器来演示MintRoute协议在受到恶意节点的链路质量攻击时的漏洞。然后,我们提出了一种新的“序列号间隙技巧”作为一种轻量级的方法来测试和检测恶意攻击者的存在。仿真结果表明,明智地使用序列号间隙技巧可以提供对恶意节点的鲁棒检测,并保持WSN的数据传输能力。
{"title":"Towards securing mintroute in wireless sensor networks","authors":"I. Hegazy, R. Safavi-Naini, C. Williamson","doi":"10.1109/WOWMOM.2010.5535004","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5535004","url":null,"abstract":"In a Wireless Sensor Network (WSN), the sensor nodes rely upon a multi-hop routing protocol to relay their data to the base station. However, most WSN routing protocols are vulnerable to attacks in which a malicious node can disrupt the routes, drop, modify, or divert data away from the base station. In this paper, we use the ns-2 network simulator to demonstrate the vulnerability of the MintRoute protocol to link quality attacks by a malicious node. We then propose a novel \"sequence number gap trick\" as a lightweight means to test for and detect the presence of a malicious attacker. The simulation results show that judicious use of the sequence number gap trick provides robust detection of malicious nodes, preserving the data delivery capabilities of the WSN.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131459556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Performance analysis of the IEEE 802.11 MAC protocol for DSRC with and without Retransmissions IEEE 802.11 MAC协议在重传和不重传情况下的DSRC性能分析
M. Hassan, H. Vu, T. Sakurai
We develop an accurate analytical model for a dedicated short range communication (DSRC) network that uses the IEEE 802.11 distributed coordination function (DCF) MAC protocol, as adopted by the forthcoming IEEE 802.11p specification for DSRC. The specific focus is on broadcast vehicle-to-vehicle safety messages. We derive explicit expressions for the mean of the total packet delay and the packet delivery ratio (PDR) in an unsaturated network formed by moving vehicles on a highway. Our model is validated using extensive simulations and we show that our model yields better predictive accuracy than other existing models. The model is then used to investigate the performance of a modified DCF that uses a fixed number of sequential retransmissions to improve the reliability of packet delivery. We find that with sequential retransmissions, the PDR improves at low vehicle density (i.e. low traffic load), but degrades at heavy loads where higher collisions induced by the retransmissions outweighs the benefit of repeated attempts.
我们为专用短距离通信(DSRC)网络开发了一个精确的分析模型,该网络使用IEEE 802.11分布式协调功能(DCF) MAC协议,该协议将被即将发布的IEEE 802.11p DSRC规范所采用。具体的重点是广播车辆对车辆的安全信息。导出了高速公路上由移动车辆组成的不饱和网络中总数据包延迟均值和数据包投递率(PDR)的显式表达式。我们的模型通过大量的模拟验证,我们表明我们的模型比其他现有模型具有更好的预测精度。然后利用该模型研究了一种改进的DCF的性能,该DCF使用固定数量的顺序重传来提高分组传递的可靠性。我们发现,通过顺序重传,PDR在低车辆密度(即低交通负载)下得到改善,但在重负载下下降,重传引起的更高碰撞超过了重复尝试的好处。
{"title":"Performance analysis of the IEEE 802.11 MAC protocol for DSRC with and without Retransmissions","authors":"M. Hassan, H. Vu, T. Sakurai","doi":"10.1109/WOWMOM.2010.5534909","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534909","url":null,"abstract":"We develop an accurate analytical model for a dedicated short range communication (DSRC) network that uses the IEEE 802.11 distributed coordination function (DCF) MAC protocol, as adopted by the forthcoming IEEE 802.11p specification for DSRC. The specific focus is on broadcast vehicle-to-vehicle safety messages. We derive explicit expressions for the mean of the total packet delay and the packet delivery ratio (PDR) in an unsaturated network formed by moving vehicles on a highway. Our model is validated using extensive simulations and we show that our model yields better predictive accuracy than other existing models. The model is then used to investigate the performance of a modified DCF that uses a fixed number of sequential retransmissions to improve the reliability of packet delivery. We find that with sequential retransmissions, the PDR improves at low vehicle density (i.e. low traffic load), but degrades at heavy loads where higher collisions induced by the retransmissions outweighs the benefit of repeated attempts.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129913924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A signal combining technique based on channel shortening for cooperative sensor networks 基于信道缩短的协同传感器网络信号合并技术
S. I. Hussain, Mohamed-Slim Alouini, M. Hasna
The cooperative relaying process needs proper coordination among the communicating and the relaying nodes. This coordination and the required capabilities may not be available in some wireless systems, e.g. wireless sensor networks where the nodes are equipped with very basic communication hardware. In this paper, we consider a scenario where the source node transmits its signal to the destination through multiple relays in an uncoordinated fashion. The destination can capture the multiple copies of the transmitted signal through a Rake receiver. We analyze a situation where the number of Rake fingers N is less than that of the relaying nodes L. In this case, the receiver can combine N strongest signals out of L. The remaining signals will be lost and act as interference to the desired signal components. To tackle this problem, we develop a novel signal combining technique based on channel shortening. This technique proposes a processing block before the Rake reception which compresses the energy of L signal components over N branches while keeping the noise level at its minimum. The proposed scheme saves the system resources and makes the received signal compatible to the available hardware. Simulation results show that it outperforms the selection combining scheme.
协作中继过程需要通信节点和中继节点之间的适当协调。这种协调和所需的能力在某些无线系统中可能是不可用的,例如无线传感器网络,其中节点配备了非常基本的通信硬件。在本文中,我们考虑了一种场景,其中源节点以不协调的方式通过多个中继将其信号传输到目的地。目的地可以通过Rake接收器捕获传输信号的多个副本。我们分析了一种Rake指数N小于中继节点数l的情况,在这种情况下,接收器可以从l中组合出N个最强的信号,剩余的信号将丢失并对所需的信号分量起干扰作用。为了解决这个问题,我们开发了一种新的基于信道缩短的信号合并技术。该技术在Rake接收之前提出了一个处理块,该处理块压缩了N个支路上L个信号分量的能量,同时将噪声水平保持在最低水平。该方案节省了系统资源,并使接收到的信号与现有硬件兼容。仿真结果表明,该方法优于选择组合方案。
{"title":"A signal combining technique based on channel shortening for cooperative sensor networks","authors":"S. I. Hussain, Mohamed-Slim Alouini, M. Hasna","doi":"10.1109/WOWMOM.2010.5534947","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534947","url":null,"abstract":"The cooperative relaying process needs proper coordination among the communicating and the relaying nodes. This coordination and the required capabilities may not be available in some wireless systems, e.g. wireless sensor networks where the nodes are equipped with very basic communication hardware. In this paper, we consider a scenario where the source node transmits its signal to the destination through multiple relays in an uncoordinated fashion. The destination can capture the multiple copies of the transmitted signal through a Rake receiver. We analyze a situation where the number of Rake fingers N is less than that of the relaying nodes L. In this case, the receiver can combine N strongest signals out of L. The remaining signals will be lost and act as interference to the desired signal components. To tackle this problem, we develop a novel signal combining technique based on channel shortening. This technique proposes a processing block before the Rake reception which compresses the energy of L signal components over N branches while keeping the noise level at its minimum. The proposed scheme saves the system resources and makes the received signal compatible to the available hardware. Simulation results show that it outperforms the selection combining scheme.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tradeoffs between security and communication performance in wireless mesh networks 无线网状网络中安全性与通信性能的权衡
Reza Curtmola, Jing Dong, C. Nita-Rotaru
In the context of wireless mesh networks (WMNs), we ask the question whether a high level of security can be achieved while providing good communication performance. To answer this question, we examine two techniques designed and shown to improve throughput performance in WMNs: high-throughput routing and network coding. Although the advantages of using these techniques hold in a benign setting, it is not clear whether they can be preserved under an adversarial setting. We analyze these techniques and reveal a wide range of security vulnerabilities. We then investigate whether alternative schemes can be designed to be secure and still preserve most of the advantages achieved in benign settings.
在无线网状网络(WMNs)的背景下,我们提出了一个问题,即能否在提供良好通信性能的同时实现高水平的安全性。为了回答这个问题,我们研究了两种旨在提高wmn吞吐量性能的技术:高吞吐量路由和网络编码。尽管在良性环境下使用这些技术的优势仍然存在,但在敌对环境下是否能保持这些优势尚不清楚。我们分析了这些技术并揭示了广泛的安全漏洞。然后,我们研究是否可以设计替代方案是安全的,并且仍然保留在良性设置中获得的大多数优势。
{"title":"Tradeoffs between security and communication performance in wireless mesh networks","authors":"Reza Curtmola, Jing Dong, C. Nita-Rotaru","doi":"10.1109/WOWMOM.2010.5535005","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5535005","url":null,"abstract":"In the context of wireless mesh networks (WMNs), we ask the question whether a high level of security can be achieved while providing good communication performance. To answer this question, we examine two techniques designed and shown to improve throughput performance in WMNs: high-throughput routing and network coding. Although the advantages of using these techniques hold in a benign setting, it is not clear whether they can be preserved under an adversarial setting. We analyze these techniques and reveal a wide range of security vulnerabilities. We then investigate whether alternative schemes can be designed to be secure and still preserve most of the advantages achieved in benign settings.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132658320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
P2P overlay topology control in MANETs manet中P2P覆盖拓扑控制
Afzal Mawji, H. Hassanein
P2P applications are enormously popular on the Internet and their uses vary from file sharing to Voice-over-IP to gaming and more. Increasingly, users are moving toward wireless networked devices and wish to continue using P2P applications in these new environments. MANETs are expected to grow in use as wireless mesh and 4G networks increase in popularity. P2P and MANETs share some similarities, such as self-organization, dynamism, and resilience to failure, but it is necessary that P2P algorithms should take advantage of the realities of MANETs. In P2P networks, the overlay peers must form a topology of connections between themselves and this topology should reflect the underlying network in order to reduce delay and energy consumption. We study the results of a game-theoretic topology control algorithm which considers energy and distance between nodes in a P2P network running atop a MANET. We find that the minimum cost topologies are very highly connected and thus resilient, but in most cases the topologies do not stabilize even without peer mobility or churn.
P2P应用程序在互联网上非常流行,其用途从文件共享到ip语音到游戏等等。越来越多的用户转向无线网络设备,并希望在这些新环境中继续使用P2P应用程序。随着无线网状网络和4G网络的普及,预计manet的使用将会增长。P2P和manet有一些相似之处,如自组织、动态性和故障恢复能力,但P2P算法有必要利用manet的现实。在P2P网络中,为了减少时延和能量消耗,覆盖节点之间必须形成一种相互连接的拓扑结构,这种拓扑结构应反映底层网络。本文研究了一种博弈论拓扑控制算法的结果,该算法考虑了运行在MANET上的P2P网络中节点之间的能量和距离。我们发现最小成本拓扑具有非常高的连接性,因此具有弹性,但在大多数情况下,即使没有对等移动或流失,拓扑也不会稳定。
{"title":"P2P overlay topology control in MANETs","authors":"Afzal Mawji, H. Hassanein","doi":"10.1109/WOWMOM.2010.5534905","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534905","url":null,"abstract":"P2P applications are enormously popular on the Internet and their uses vary from file sharing to Voice-over-IP to gaming and more. Increasingly, users are moving toward wireless networked devices and wish to continue using P2P applications in these new environments. MANETs are expected to grow in use as wireless mesh and 4G networks increase in popularity. P2P and MANETs share some similarities, such as self-organization, dynamism, and resilience to failure, but it is necessary that P2P algorithms should take advantage of the realities of MANETs. In P2P networks, the overlay peers must form a topology of connections between themselves and this topology should reflect the underlying network in order to reduce delay and energy consumption. We study the results of a game-theoretic topology control algorithm which considers energy and distance between nodes in a P2P network running atop a MANET. We find that the minimum cost topologies are very highly connected and thus resilient, but in most cases the topologies do not stabilize even without peer mobility or churn.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133809500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Achievement notification in a real-world achievement system 现实世界成就系统中的成就通知
Tonio Triebel, S. Schnaufer, W. Effelsberg
We propose a global system for acquisition, maintenance and communication of achievements in the real-world. The main focus of the proposal lies on a context-aware notification service for achievements. Users of the system can browse the achievement web application and will only get notifications of users within the same context. The definition of context is based on the network infrastructure of the client accessing the system. Our server utilizes information derived from IP-routing traces to build the notification groups.
我们建议建立一个全球系统来获取、维护和交流现实世界中的成就。该提案的主要焦点在于为成就提供上下文感知的通知服务。该系统的用户可以浏览成就web应用程序,并且只会收到同一上下文中用户的通知。上下文的定义基于访问系统的客户机的网络基础结构。我们的服务器利用来自ip路由跟踪的信息来构建通知组。
{"title":"Achievement notification in a real-world achievement system","authors":"Tonio Triebel, S. Schnaufer, W. Effelsberg","doi":"10.1109/WOWMOM.2010.5534943","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534943","url":null,"abstract":"We propose a global system for acquisition, maintenance and communication of achievements in the real-world. The main focus of the proposal lies on a context-aware notification service for achievements. Users of the system can browse the achievement web application and will only get notifications of users within the same context. The definition of context is based on the network infrastructure of the client accessing the system. Our server utilizes information derived from IP-routing traces to build the notification groups.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"645 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134065121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed storage in Disruption Tolerant Network 容中断网络中的分布式存储
Jingzhe Du, E. Kranakis, A. Nayak
We describe a novel Distributed Storage protocol in Disruption (Delay) Tolerant Networks (DTN). Since DTNs can not guarantee the connectivity of the network all the time, distributed data storage and look up has to be performed in a store-and-forward way. In this work, we define local distributed location regions which are called cells to facilitate the data storage and look up process. Nodes in a cell have high probability of moving within their cells. Our protocol resorts to storing data items in cells which have hierarchical structure to reduce routing information storage at nodes. Multiple copies of a data item may be stored at nodes to counter the adverse impact of the nature of DTNs. The cells are relatively stable regions and as a result, data exchange overheads among nodes are reduced. Through experimentation, we show that the proposed distributed storage protocol achieves higher successful data storage ratios with lower delays and limited data item exchange requirements than other protocols in the literature.
我们描述了一种新的分布式存储协议在容忍中断(延迟)网络(DTN)。由于ddn不能始终保证网络的连通性,因此必须采用存储转发的方式进行分布式数据存储和查找。在这项工作中,我们定义了局部分布的位置区域,称为单元,以方便数据存储和查找过程。细胞中的节点在其细胞内移动的概率很高。我们的协议将数据项存储在具有分层结构的单元中,以减少节点上的路由信息存储。一个数据项的多个副本可以存储在节点上,以抵消ddn特性的不利影响。单元是相对稳定的区域,因此减少了节点之间的数据交换开销。通过实验,我们表明所提出的分布式存储协议比文献中的其他协议具有更高的成功数据存储率和更低的延迟和有限的数据项交换需求。
{"title":"Distributed storage in Disruption Tolerant Network","authors":"Jingzhe Du, E. Kranakis, A. Nayak","doi":"10.1109/WOWMOM.2010.5534948","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534948","url":null,"abstract":"We describe a novel Distributed Storage protocol in Disruption (Delay) Tolerant Networks (DTN). Since DTNs can not guarantee the connectivity of the network all the time, distributed data storage and look up has to be performed in a store-and-forward way. In this work, we define local distributed location regions which are called cells to facilitate the data storage and look up process. Nodes in a cell have high probability of moving within their cells. Our protocol resorts to storing data items in cells which have hierarchical structure to reduce routing information storage at nodes. Multiple copies of a data item may be stored at nodes to counter the adverse impact of the nature of DTNs. The cells are relatively stable regions and as a result, data exchange overheads among nodes are reduced. Through experimentation, we show that the proposed distributed storage protocol achieves higher successful data storage ratios with lower delays and limited data item exchange requirements than other protocols in the literature.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133367190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1