首页 > 最新文献

2007 16th International Conference on Computer Communications and Networks最新文献

英文 中文
Multiple Access Interference Cancellation and Link Multiplexing for MIMO Mesh Network MIMO网状网络的多址干扰消除和链路复用
Pub Date : 2007-12-04 DOI: 10.1109/PIMRC.2007.4394712
F. Ono, K. Sakaguchi
Wireless mesh networks, consist of mesh routers and clients, have attracted researchers in the field of sensor network or wireless plant control for its potential to achieve high connectivity and wide area coverage in an ad-hoc way. The mesh routers should supply the backbone of the network with high capacity to support accumulated traffic from or to mesh clients. In the conventional mesh network it is a biggest problem of inefficient network channel capacity due to multiple access interference among the mesh routers. In this paper we will propose a novel MIMO mesh network, where the mesh routers support multiple antennas, to avoid multiple access interference and to supply higher network capacity via link multiplexing. As a MIMO transmission scheme, linear (such as Zero-Forcing) and nonlinear (such as Dirty Paper Coding / Successive Interference Cancellation) MIMO algorithm are developed for the proposed mesh network. It is found from numerical analysis that the proposed MIMO mesh network achieves extremely higher channel capacity than that of conventional mesh network.
由网状路由器和客户端组成的无线网状网络,因其具有以自组织方式实现高连接和广域覆盖的潜力而吸引了传感器网络或无线工厂控制领域的研究人员。网状路由器应为网络的骨干提供高容量,以支持来自或流向网状客户端的累积流量。在传统的网状网络中,由于网状路由器之间存在多址干扰,导致网络信道容量不足是最大的问题。在本文中,我们将提出一种新的MIMO网状网络,其中网状路由器支持多天线,以避免多址干扰,并通过链路复用提供更高的网络容量。作为一种MIMO传输方案,针对所提出的网状网络,提出了线性(如零强迫)和非线性(如脏纸编码/连续干扰消除)MIMO算法。数值分析表明,所提出的MIMO网状网络比传统的网状网络具有更高的信道容量。
{"title":"Multiple Access Interference Cancellation and Link Multiplexing for MIMO Mesh Network","authors":"F. Ono, K. Sakaguchi","doi":"10.1109/PIMRC.2007.4394712","DOIUrl":"https://doi.org/10.1109/PIMRC.2007.4394712","url":null,"abstract":"Wireless mesh networks, consist of mesh routers and clients, have attracted researchers in the field of sensor network or wireless plant control for its potential to achieve high connectivity and wide area coverage in an ad-hoc way. The mesh routers should supply the backbone of the network with high capacity to support accumulated traffic from or to mesh clients. In the conventional mesh network it is a biggest problem of inefficient network channel capacity due to multiple access interference among the mesh routers. In this paper we will propose a novel MIMO mesh network, where the mesh routers support multiple antennas, to avoid multiple access interference and to supply higher network capacity via link multiplexing. As a MIMO transmission scheme, linear (such as Zero-Forcing) and nonlinear (such as Dirty Paper Coding / Successive Interference Cancellation) MIMO algorithm are developed for the proposed mesh network. It is found from numerical analysis that the proposed MIMO mesh network achieves extremely higher channel capacity than that of conventional mesh network.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Multi-Mode Video Object Segmentation Scheme for Wireless Video Applications 一种用于无线视频应用的多模式视频对象分割方案
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317971
G. Dane, K. El-Maleh, Haohong Wang
This paper presents a new multi-mode video object segmentation scheme to automatically segment head-and-shoulder objects from a video sequence. The proposed system supports two modes of segmentation: intra-mode and inter-mode. The intra-mode segmentation integrates skin detection, facial feature localization and verification, object shape approximation, split-and-merge region growing, and object region selection and guarantees good performance of the proposed segmentation scheme. The inter-mode object segmentation makes use of background modeling and subtraction to take advantage of temporal correlation of video frame while increasing the robustness of the segmentation and speeding up the performance. The main contributions of the proposed method includes: (i) a robust and efficient background modeling in inter-mode object segmentation, (ii) a facial feature verification and a multi-face separation algorithm in intra-mode segmentation. The performance of the algorithm is illustrated by simulation results carried out on various head-and-shoulder video sequences.
本文提出了一种新的多模式视频目标分割方案,用于从视频序列中自动分割头肩目标。系统支持两种模式的分割:模式内分割和模式间分割。模式内分割集成了皮肤检测、人脸特征定位与验证、目标形状逼近、分割合并区域生长、目标区域选择等功能,保证了所提出分割方案的良好性能。模间目标分割利用背景建模和减法,利用视频帧的时间相关性,增强了分割的鲁棒性,提高了分割速度。该方法的主要贡献包括:(1)在模间目标分割中实现了鲁棒高效的背景建模;(2)在模内分割中实现了人脸特征验证和多人脸分离算法。通过对各种头肩视频序列的仿真,验证了该算法的有效性。
{"title":"A Multi-Mode Video Object Segmentation Scheme for Wireless Video Applications","authors":"G. Dane, K. El-Maleh, Haohong Wang","doi":"10.1109/ICCCN.2007.4317971","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317971","url":null,"abstract":"This paper presents a new multi-mode video object segmentation scheme to automatically segment head-and-shoulder objects from a video sequence. The proposed system supports two modes of segmentation: intra-mode and inter-mode. The intra-mode segmentation integrates skin detection, facial feature localization and verification, object shape approximation, split-and-merge region growing, and object region selection and guarantees good performance of the proposed segmentation scheme. The inter-mode object segmentation makes use of background modeling and subtraction to take advantage of temporal correlation of video frame while increasing the robustness of the segmentation and speeding up the performance. The main contributions of the proposed method includes: (i) a robust and efficient background modeling in inter-mode object segmentation, (ii) a facial feature verification and a multi-face separation algorithm in intra-mode segmentation. The performance of the algorithm is illustrated by simulation results carried out on various head-and-shoulder video sequences.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114991684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ringed Filters for Peer-to-Peer Keyword Searching 点对点关键字搜索的环状过滤器
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317911
Y. Sei, S. Honiden
Distributed hash tables (DHTs) are a class of decentralized distributed systems that can efficiently search for objects desired by the user. However, a lot of communication traffic comes from multi-word searches. A lot of work has been done to reduce this traffic by using bloom filters, which are space-efficient probabilistic data structures. There are two kinds of bloom filters: fixed-size and variable-size bloom filters. We cannot use variable- size bloom filters because doing so would mean wasting time to calculating hash values. On the other hand, when using fixed- size bloom filters, all the nodes in a DHT are unable to adjust their false positive rate parameters. Therefore, the reduction of traffic is limited because the best false positive rate differs from one node to another. Moreover, in related works, the authors took only two-word searches into consideration. In this paper, we present a method for determining the best false positive rate for three- or more word searches. We also used a new filter called a ringed filter, in which each node can set the approximately best false positive rate. Experiments showed that the ringed filter was able to greatly reduce the traffic.
分布式哈希表(dht)是一类分散的分布式系统,可以有效地搜索用户所需的对象。然而,大量的通信流量来自于多词搜索。为了减少这种流量,已经做了大量的工作,使用布隆过滤器,这是一种空间效率高的概率数据结构。有两种类型的布隆过滤器:固定大小和可变大小的布隆过滤器。我们不能使用可变大小的布隆过滤器,因为这样做意味着浪费时间来计算哈希值。另一方面,当使用固定大小的布隆过滤器时,DHT中的所有节点都无法调整其假阳性率参数。因此,流量的减少是有限的,因为最佳的假阳性率因节点而异。此外,在相关作品中,作者只考虑了双词搜索。在本文中,我们提出了一种确定三个或更多单词搜索的最佳误报率的方法。我们还使用了一种新的滤波器,称为环状滤波器,其中每个节点可以设置近似最佳误报率。实验表明,环形滤波器可以大大减少流量。
{"title":"Ringed Filters for Peer-to-Peer Keyword Searching","authors":"Y. Sei, S. Honiden","doi":"10.1109/ICCCN.2007.4317911","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317911","url":null,"abstract":"Distributed hash tables (DHTs) are a class of decentralized distributed systems that can efficiently search for objects desired by the user. However, a lot of communication traffic comes from multi-word searches. A lot of work has been done to reduce this traffic by using bloom filters, which are space-efficient probabilistic data structures. There are two kinds of bloom filters: fixed-size and variable-size bloom filters. We cannot use variable- size bloom filters because doing so would mean wasting time to calculating hash values. On the other hand, when using fixed- size bloom filters, all the nodes in a DHT are unable to adjust their false positive rate parameters. Therefore, the reduction of traffic is limited because the best false positive rate differs from one node to another. Moreover, in related works, the authors took only two-word searches into consideration. In this paper, we present a method for determining the best false positive rate for three- or more word searches. We also used a new filter called a ringed filter, in which each node can set the approximately best false positive rate. Experiments showed that the ringed filter was able to greatly reduce the traffic.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114651314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protection Mechanisms for Well-behaved TCP Flows from Tampered-TCP at Edge Routers 边缘路由器对篡改TCP的保护机制
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317842
Junichi Maruyama, G. Hasegawa, M. Murata
In this paper, we propose a new mechanism which detects tampered-TCP connections at edge routers and protects well-behaved TCP connections from the tampered-TCP connections, resulting in maintaining the fairness amongst TCP connections. The proposed mechanism monitors the TCP packets at an edge router and estimates the window size or the throughput for each TCP connection. By using estimation results, the proposed mechanism assesses whether each TCP connection is tampered or not and drops packets intentionally if necessary to improve the fairness amongst TCP connections. From the results of simulation experiments, we exhibit that the proposed mechanism can accurately identify tampered-TCP connections. We also show that the proposed mechanism can regulate throughput ratio between tampered-TCP connections and competing TCP Reno connections to about 1.
在本文中,我们提出了一种新的机制来检测边缘路由器上的篡改TCP连接,并保护行为良好的TCP连接免受篡改TCP连接的影响,从而保持TCP连接之间的公平性。该机制监控边缘路由器上的TCP数据包,并估计每个TCP连接的窗口大小或吞吐量。通过使用估计结果,该机制评估每个TCP连接是否被篡改,并在必要时有意丢弃数据包,以提高TCP连接之间的公平性。仿真实验结果表明,该机制能够准确识别被篡改的tcp连接。我们还表明,该机制可以将被篡改的TCP连接与竞争的TCP Reno连接之间的吞吐量比调节到1左右。
{"title":"Protection Mechanisms for Well-behaved TCP Flows from Tampered-TCP at Edge Routers","authors":"Junichi Maruyama, G. Hasegawa, M. Murata","doi":"10.1109/ICCCN.2007.4317842","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317842","url":null,"abstract":"In this paper, we propose a new mechanism which detects tampered-TCP connections at edge routers and protects well-behaved TCP connections from the tampered-TCP connections, resulting in maintaining the fairness amongst TCP connections. The proposed mechanism monitors the TCP packets at an edge router and estimates the window size or the throughput for each TCP connection. By using estimation results, the proposed mechanism assesses whether each TCP connection is tampered or not and drops packets intentionally if necessary to improve the fairness amongst TCP connections. From the results of simulation experiments, we exhibit that the proposed mechanism can accurately identify tampered-TCP connections. We also show that the proposed mechanism can regulate throughput ratio between tampered-TCP connections and competing TCP Reno connections to about 1.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117181256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack Containment Framework for Large-Scale Critical Infrastructures 大型关键基础设施的攻击遏制框架
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317859
Hoang Nguyen, K. Nahrstedt
We present an attack containment framework against value-changing attacks in large-scale critical infrastructures, based on early warning and cooperative response approaches. We define an information structure, called attack container, which captures the trust behavior of a group of nodes and assists to contain the damage of the attack. The attack container is then used for distributed early warning and cooperative response in our framework. The simulation results show that our containment framework can detect, mitigate and contain large-scale attacks quickly.
我们提出了一个基于早期预警和合作响应方法的攻击遏制框架,以应对大规模关键基础设施中改变价值的攻击。我们定义了一个称为攻击容器的信息结构,它捕获一组节点的信任行为,并有助于遏制攻击的损害。然后,攻击容器在我们的框架中用于分布式早期预警和协作响应。仿真结果表明,该遏制框架能够快速检测、缓解和遏制大规模攻击。
{"title":"Attack Containment Framework for Large-Scale Critical Infrastructures","authors":"Hoang Nguyen, K. Nahrstedt","doi":"10.1109/ICCCN.2007.4317859","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317859","url":null,"abstract":"We present an attack containment framework against value-changing attacks in large-scale critical infrastructures, based on early warning and cooperative response approaches. We define an information structure, called attack container, which captures the trust behavior of a group of nodes and assists to contain the damage of the attack. The attack container is then used for distributed early warning and cooperative response in our framework. The simulation results show that our containment framework can detect, mitigate and contain large-scale attacks quickly.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124983510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Principles of IEEE 802.11s IEEE 802.11s基本原理
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317949
G. Hiertz, Sebastian Max, Rui Zhao, D. Denteneer, L. Berlemann
In 2003, interests in the Institute of Electronics and Electrical Engineering (IEEE) 802.11 Working Group (WG) led to the formation of Task Group (TG) "S". 802.11s develops a Wireless Mesh Network (WMN) amendment. Unlike existing Mesh products, 802.11s forms a transparent 802 broadcast domain that supports any higher layer protocols. Therefore, 802.11s provides frame forwarding and path selection at layer-2. 802.11i describes a security concept for stations that associate with an Access Point (AP). However, in a Mesh Basic Service Set (BSS) devices need to mutually authenticate to provide integrity of the network. Thus, 802.11s adds additional elements to the concepts of 802.11L While traditional Wireless Local Area Networks (WLANs) are AP centred an 802.11 Mesh is fully distributed. Hence, 802.11s considers extensions to the Medium Access Control (MAC) too. The authors have contributed to the standardization of 802.11s since 2003. As constant participants we give insight to draft 1.02 of TG "s" and provide an outlook to future evolution of 802.11's first Mesh standard.
2003年,对电子和电气工程协会(IEEE) 802.11工作组(WG)的兴趣导致了任务组(TG)的成立。“S”。802.11s发展了无线网状网络(WMN)的修订版。与现有的Mesh产品不同,802.11s形成了一个透明的802广播域,支持任何更高层的协议。因此,802.11s在第二层提供帧转发和路径选择功能。802.11i描述了与接入点(AP)相关联的站点的安全概念。然而,在Mesh基本服务集(BSS)中,设备需要相互认证以提供网络的完整性。因此,802.11s为802.11 l的概念增加了额外的元素,而传统的无线局域网(wlan)以AP为中心,802.11 Mesh是完全分布式的。因此,802.11s也考虑了对介质访问控制(MAC)的扩展。自2003年以来,作者一直在为802.11s的标准化做出贡献。作为长期的参与者,我们对TG“s”的1.02草案提供了见解,并对802.11第一个Mesh标准的未来发展提供了展望。
{"title":"Principles of IEEE 802.11s","authors":"G. Hiertz, Sebastian Max, Rui Zhao, D. Denteneer, L. Berlemann","doi":"10.1109/ICCCN.2007.4317949","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317949","url":null,"abstract":"In 2003, interests in the Institute of Electronics and Electrical Engineering (IEEE) 802.11 Working Group (WG) led to the formation of Task Group (TG) \"S\". 802.11s develops a Wireless Mesh Network (WMN) amendment. Unlike existing Mesh products, 802.11s forms a transparent 802 broadcast domain that supports any higher layer protocols. Therefore, 802.11s provides frame forwarding and path selection at layer-2. 802.11i describes a security concept for stations that associate with an Access Point (AP). However, in a Mesh Basic Service Set (BSS) devices need to mutually authenticate to provide integrity of the network. Thus, 802.11s adds additional elements to the concepts of 802.11L While traditional Wireless Local Area Networks (WLANs) are AP centred an 802.11 Mesh is fully distributed. Hence, 802.11s considers extensions to the Medium Access Control (MAC) too. The authors have contributed to the standardization of 802.11s since 2003. As constant participants we give insight to draft 1.02 of TG \"s\" and provide an outlook to future evolution of 802.11's first Mesh standard.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 124
Signaling Transport Options in GMPLS Networks: In-band or Out-of-band GMPLS网络中的信令传输选项:带内或带外
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317869
M. Veeraraghavan, Tao Li
Signaling protocols for GMPLS networks have been standardized and implemented in switch controllers. Most switch vendors allow for signaling messages to be carried over in-band signaling channels as well as through out-of-band networks. In this paper, we compare these two signaling transport options. In carrying out this analysis, we allow for both software-implemented signaling protocol processors, as is common in most off-the-shelf switches today, as well as hardware-accelerated signaling protocol engines. Our motivating application is file transfers, which have high call arrival rates and low call holding times. The resulting high signaling message load makes the question of which signaling transport solution to use important. Network delays are lower in the in-band option given that there are no IP routers on these paths, but the per-channel transmitter rates are lower for in-band channels. To study this tradeoff, we set up queueing models and obtained delay estimates. Our analysis shows that with hardware-accelerated signaling engines, in-band signaling is the better option to keep end-to-end call setup delays low. With software signaling protocol processors, the most significant component is the message processing delay, which is likely to include queueing delays, making the question of in-band or out-of-band transport less important.
GMPLS网络的信令协议已经标准化并在交换机控制器中实现。大多数交换机供应商允许信令消息通过带内信令通道和带外网络传输。在本文中,我们比较了这两种信令传输选项。在进行此分析时,我们考虑到软件实现的信令协议处理器(这在当今大多数现成的交换机中很常见)以及硬件加速的信令协议引擎。我们的激励应用程序是文件传输,它具有高呼叫到达率和低呼叫保持时间。由此产生的高信令消息负载使得使用哪种信令传输解决方案的问题变得重要。考虑到在这些路径上没有IP路由器,带内选项中的网络延迟较低,但带内通道的每通道发射机速率较低。为了研究这种权衡,我们建立了排队模型并获得了延迟估计。我们的分析表明,使用硬件加速的信令引擎,带内信令是保持端到端呼叫设置延迟较低的更好选择。对于软件信令协议处理器,最重要的组件是消息处理延迟,它可能包括排队延迟,使得带内或带外传输的问题不那么重要。
{"title":"Signaling Transport Options in GMPLS Networks: In-band or Out-of-band","authors":"M. Veeraraghavan, Tao Li","doi":"10.1109/ICCCN.2007.4317869","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317869","url":null,"abstract":"Signaling protocols for GMPLS networks have been standardized and implemented in switch controllers. Most switch vendors allow for signaling messages to be carried over in-band signaling channels as well as through out-of-band networks. In this paper, we compare these two signaling transport options. In carrying out this analysis, we allow for both software-implemented signaling protocol processors, as is common in most off-the-shelf switches today, as well as hardware-accelerated signaling protocol engines. Our motivating application is file transfers, which have high call arrival rates and low call holding times. The resulting high signaling message load makes the question of which signaling transport solution to use important. Network delays are lower in the in-band option given that there are no IP routers on these paths, but the per-channel transmitter rates are lower for in-band channels. To study this tradeoff, we set up queueing models and obtained delay estimates. Our analysis shows that with hardware-accelerated signaling engines, in-band signaling is the better option to keep end-to-end call setup delays low. With software signaling protocol processors, the most significant component is the message processing delay, which is likely to include queueing delays, making the question of in-band or out-of-band transport less important.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115176458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Providing Quality of Service for Mesh Networks Using Link Delay Measurements 利用链路延迟测量为网状网络提供服务质量
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317947
Weverton Cordeiro, Elisangela Aguiar, W. Junior, A. Abelém, M. Stanton
One of the main problems faced by ad hoc networks is providing specific quality of service guarantees for multimedia applications, mainly due to factors such as radio signal fading and node mobility. Since mesh networks are a special type of ad hoc network, they inherit these networks' problems. This paper's main goal is to present OLSR-MD, an extension to OLSR (optimized link state routing), to provide quality of service based on link delay measurements. An evaluation of OLSR-MD in a mesh network to be deployed at the Federal University of Para, by means of ns2 (version 2.30) simulations, showed that this protocol performed better than other OLSR based alternatives studied in the simulations.
自组织网络面临的主要问题之一是为多媒体应用提供特定的服务质量保证,这主要是由于无线电信号衰落和节点移动等因素造成的。由于网状网络是一种特殊类型的自组织网络,它继承了这些网络的问题。本文的主要目标是提出OLSR- md, OLSR(优化链路状态路由)的扩展,以提供基于链路延迟测量的服务质量。通过ns2(2.30版本)模拟,对帕拉联邦大学部署的网状网络中的OLSR- md进行了评估,结果表明该协议比模拟中研究的其他基于OLSR的替代方案性能更好。
{"title":"Providing Quality of Service for Mesh Networks Using Link Delay Measurements","authors":"Weverton Cordeiro, Elisangela Aguiar, W. Junior, A. Abelém, M. Stanton","doi":"10.1109/ICCCN.2007.4317947","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317947","url":null,"abstract":"One of the main problems faced by ad hoc networks is providing specific quality of service guarantees for multimedia applications, mainly due to factors such as radio signal fading and node mobility. Since mesh networks are a special type of ad hoc network, they inherit these networks' problems. This paper's main goal is to present OLSR-MD, an extension to OLSR (optimized link state routing), to provide quality of service based on link delay measurements. An evaluation of OLSR-MD in a mesh network to be deployed at the Federal University of Para, by means of ns2 (version 2.30) simulations, showed that this protocol performed better than other OLSR based alternatives studied in the simulations.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116444863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Implementation of a Wireless Mesh Network Testbed for Traffic Control 无线网状网络流量控制试验台的实现
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317952
Kun-Chan Lan, Zhe Wang, Rodney Berriman, T. Moors, Mahbub Hassan, Lavy Libman, M. Ott, B. Landfeldt, Z. Zaidi, A. Seneviratne
Wireless mesh networks (WMN) have attracted considerable interest in years as a convenient, flexible and low-cost alternative to wired communication infrastructures in many contexts. However, the great majority of research on metropolitan-scale WMN has been centered around maximization of available bandwidth, suitable for non-real-time applications such as Internet access for the general public. On the other hand, the suitability of WMN for mission-critical infrastructure applications remains by and large unknown, as protocols typically employed in WMN are, for the most part, not designed for real-time communications. In this paper, we describe the smart transport and roads communications (STaRComm) project at National ICT Australia (NICTA), which sets a goal of designing a wireless mesh network architecture to solve the communication needs of the traffic control system in Sydney, Australia. This system, known as SCATS (Sydney coordinated adaptive traffic system) and used in over 100 cities around the world, connects a hierarchy of several thousand devices - from individual traffic light controllers to regional computers and the central traffic management centre (TMC) - and places stringent requirements on the reliability and latency of the data exchanges. We discuss our experience in the deployment of an initial testbed consisting of 7 mesh nodes placed at intersections with traffic lights, and share the results and insights learned from our measurements and initial trials in the process.
近年来,无线网状网络(WMN)作为一种方便、灵活、低成本的有线通信基础设施替代品,在许多情况下引起了人们的极大兴趣。然而,绝大多数城域规模WMN的研究都是围绕着可用带宽的最大化展开的,适合于非实时应用,如普通大众的互联网接入。另一方面,WMN对关键任务基础设施应用的适用性基本上仍然未知,因为WMN中通常采用的协议在很大程度上不是为实时通信而设计的。在本文中,我们描述了澳大利亚国家信息通信技术(NICTA)的智能交通和道路通信(STaRComm)项目,该项目设定了设计无线网状网络架构的目标,以解决澳大利亚悉尼交通控制系统的通信需求。这个系统被称为SCATS(悉尼协调自适应交通系统),在全球100多个城市使用,连接了数千个设备的层次结构-从单个交通灯控制器到区域计算机和中央交通管理中心(TMC) -并对数据交换的可靠性和延迟提出了严格的要求。我们讨论了在有交通灯的十字路口部署由7个网格节点组成的初始测试平台的经验,并分享了在此过程中从我们的测量和初始试验中获得的结果和见解。
{"title":"Implementation of a Wireless Mesh Network Testbed for Traffic Control","authors":"Kun-Chan Lan, Zhe Wang, Rodney Berriman, T. Moors, Mahbub Hassan, Lavy Libman, M. Ott, B. Landfeldt, Z. Zaidi, A. Seneviratne","doi":"10.1109/ICCCN.2007.4317952","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317952","url":null,"abstract":"Wireless mesh networks (WMN) have attracted considerable interest in years as a convenient, flexible and low-cost alternative to wired communication infrastructures in many contexts. However, the great majority of research on metropolitan-scale WMN has been centered around maximization of available bandwidth, suitable for non-real-time applications such as Internet access for the general public. On the other hand, the suitability of WMN for mission-critical infrastructure applications remains by and large unknown, as protocols typically employed in WMN are, for the most part, not designed for real-time communications. In this paper, we describe the smart transport and roads communications (STaRComm) project at National ICT Australia (NICTA), which sets a goal of designing a wireless mesh network architecture to solve the communication needs of the traffic control system in Sydney, Australia. This system, known as SCATS (Sydney coordinated adaptive traffic system) and used in over 100 cities around the world, connects a hierarchy of several thousand devices - from individual traffic light controllers to regional computers and the central traffic management centre (TMC) - and places stringent requirements on the reliability and latency of the data exchanges. We discuss our experience in the deployment of an initial testbed consisting of 7 mesh nodes placed at intersections with traffic lights, and share the results and insights learned from our measurements and initial trials in the process.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122327476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
New Techniques for Efficient Traffic Grooming in WDM Mesh Networks WDM网状网络中高效业务量疏导新技术
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317836
A. Jaekel, A. Bari, Ying Chen, S. Bandyopadhyay
Traffic grooming techniques are used to combine low-speed data streams onto high-speed lightpaths with the objective of minimizing the network cost, or maximizing the network throughput. In this paper, we first present an efficient integer linear program (ILP) formulation for traffic grooming on mesh WDM networks. Our formulation can be easily modified to implement different objective functions. Unlike previous formulations, our ILP formulation can be used for practical sized networks with several hundred requests. We then propose a second ILP for traffic grooming, with the simplifying assumption that RWA is not an issue. This second formulation is able to generate, in a reasonable time, grooming strategies, for networks with over 30 nodes, with hundreds and even thousands of low-speed data streams. Finally, we introduce a set of ILP formulations for traffic grooming, where the logical topology is specified. We have studied, using simulation, the time needed to determine grooming strategies, using the different ILP formulations.
流量疏导技术用于将低速数据流结合到高速光路上,以最小化网络成本或最大化网络吞吐量。在本文中,我们首先提出了一种有效的整数线性规划(ILP)公式,用于网状WDM网络上的流量疏导。我们的公式可以很容易地修改以实现不同的目标函数。与以前的公式不同,我们的ILP公式可用于具有数百个请求的实际规模的网络。然后,我们提出了第二个用于流量梳理的ILP,并简化了RWA不是问题的假设。第二种公式能够在合理的时间内为拥有超过30个节点、数百甚至数千个低速数据流的网络生成梳理策略。最后,我们介绍了一组用于流量梳理的ILP公式,其中指定了逻辑拓扑。我们已经研究了,使用模拟,确定梳理策略所需的时间,使用不同的ILP配方。
{"title":"New Techniques for Efficient Traffic Grooming in WDM Mesh Networks","authors":"A. Jaekel, A. Bari, Ying Chen, S. Bandyopadhyay","doi":"10.1109/ICCCN.2007.4317836","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317836","url":null,"abstract":"Traffic grooming techniques are used to combine low-speed data streams onto high-speed lightpaths with the objective of minimizing the network cost, or maximizing the network throughput. In this paper, we first present an efficient integer linear program (ILP) formulation for traffic grooming on mesh WDM networks. Our formulation can be easily modified to implement different objective functions. Unlike previous formulations, our ILP formulation can be used for practical sized networks with several hundred requests. We then propose a second ILP for traffic grooming, with the simplifying assumption that RWA is not an issue. This second formulation is able to generate, in a reasonable time, grooming strategies, for networks with over 30 nodes, with hundreds and even thousands of low-speed data streams. Finally, we introduce a set of ILP formulations for traffic grooming, where the logical topology is specified. We have studied, using simulation, the time needed to determine grooming strategies, using the different ILP formulations.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122933815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2007 16th International Conference on Computer Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1