首页 > 最新文献

2007 16th International Conference on Computer Communications and Networks最新文献

英文 中文
SHM: Scalable and Backbone Topology-Aware Hybrid Multicast SHM:可扩展和骨干拓扑感知混合组播
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317899
Shaofei Lu, Jianxin Wang, Guanzhong Yang, Chao Guo
Application layer multicast (ALM) has been proposed as a promising alternative to the IP multicast due to the difficulties in deploying network layer multicast in an operational network at the Internet scale. However, most of existing application layer multicast approaches build their overlay networks based on simple measurement with the end-to-end delay without considering the physical network topology and IP multicast deploying in local scale on the Internet. Thus, they might suffer some inefficiency such as long join delay, large maintenance overhead, and little flexibility to extend. In this paper we propose a novel hybrid multicast approach named SHM, which combining ALM and IP multicast to achieve ubiquitous multicast delivery. Simulation results show that SHM is able to provide more efficient multicast with less maintenance overhead, higher flexibility and reliability.
由于网络层组播在Internet规模的运行网络中部署困难,应用层组播被提出作为IP组播的一种有前途的替代方案。然而,现有的应用层组播方法大多是基于端到端延迟的简单测量来构建覆盖网络,而没有考虑网络的物理拓扑和IP组播在Internet上的局部部署。因此,它们可能会受到一些低效率的影响,比如长时间的连接延迟、大的维护开销和很少的扩展灵活性。本文提出了一种新的混合组播方法SHM,该方法将ALM和IP组播相结合,实现了泛在组播的传输。仿真结果表明,SHM能够以更少的维护开销、更高的灵活性和可靠性提供更高效的组播。
{"title":"SHM: Scalable and Backbone Topology-Aware Hybrid Multicast","authors":"Shaofei Lu, Jianxin Wang, Guanzhong Yang, Chao Guo","doi":"10.1109/ICCCN.2007.4317899","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317899","url":null,"abstract":"Application layer multicast (ALM) has been proposed as a promising alternative to the IP multicast due to the difficulties in deploying network layer multicast in an operational network at the Internet scale. However, most of existing application layer multicast approaches build their overlay networks based on simple measurement with the end-to-end delay without considering the physical network topology and IP multicast deploying in local scale on the Internet. Thus, they might suffer some inefficiency such as long join delay, large maintenance overhead, and little flexibility to extend. In this paper we propose a novel hybrid multicast approach named SHM, which combining ALM and IP multicast to achieve ubiquitous multicast delivery. Simulation results show that SHM is able to provide more efficient multicast with less maintenance overhead, higher flexibility and reliability.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122367486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MBAL: A Mobile Beacon-Assisted Localization Scheme for Wireless Sensor Networks 移动信标辅助无线传感器网络定位方案
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317797
Kyunghwi Kim, Wonjun Lee
Localization is one of the critical issues on wireless sensor networks. Localization schemes are classified into range-based and range-free according to the method of whether to use range information. In this paper, we propose a novel range-based localization scheme which involves a movement strategy of mobile beacon, called mobile beacon-assisted localization (MBAL). Contrary to many research activities which have been carried out to design localization schemes using mobile beacons only based on random movement method, we consider totally a new scheme providing movement path selection with a low computational complexity. A new range check technique is also adopted into the MBAL as a useful solution to the position-ambiguity problem of bilateration in order to improve the performance of the proposed localization scheme. Simulation results verify that the MBAL impressively achieves energy efficiency because of its mobile beacon based approach using the proposed movement strategy and range check technique.
定位是无线传感器网络的关键问题之一。根据是否使用距离信息的方式,将定位方案分为基于距离和无距离两种。本文提出了一种新的基于距离的定位方案,该方案采用移动信标的运动策略,称为移动信标辅助定位(MBAL)。与以往仅基于随机运动方法设计移动信标定位方案的研究不同,本文提出了一种计算复杂度较低的移动信标定位方案。为了提高定位方案的性能,在MBAL中引入了一种新的距离校验技术,有效地解决了双边定位的位置模糊问题。仿真结果验证了基于移动信标的MBAL方法在使用所提出的运动策略和距离检测技术的情况下取得了令人印象深刻的能源效率。
{"title":"MBAL: A Mobile Beacon-Assisted Localization Scheme for Wireless Sensor Networks","authors":"Kyunghwi Kim, Wonjun Lee","doi":"10.1109/ICCCN.2007.4317797","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317797","url":null,"abstract":"Localization is one of the critical issues on wireless sensor networks. Localization schemes are classified into range-based and range-free according to the method of whether to use range information. In this paper, we propose a novel range-based localization scheme which involves a movement strategy of mobile beacon, called mobile beacon-assisted localization (MBAL). Contrary to many research activities which have been carried out to design localization schemes using mobile beacons only based on random movement method, we consider totally a new scheme providing movement path selection with a low computational complexity. A new range check technique is also adopted into the MBAL as a useful solution to the position-ambiguity problem of bilateration in order to improve the performance of the proposed localization scheme. Simulation results verify that the MBAL impressively achieves energy efficiency because of its mobile beacon based approach using the proposed movement strategy and range check technique.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment SIP漏洞和反吐痰机制评估
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317883
G. Marias, S. Dritsas, M. Theoharidou, John Mallios, D. Gritzalis
Although VoIP provides new ways of communication, at the same time it offers new possibilities for transmitting bulk unsolicited messages and calls, enabling spam over internet telephony (SPIT). The VoIP prevailing protocol is SIP, which it is vulnerable to threats that allow SPIT to be deployed. In this paper we assess the risk of identified threats and vulnerabilities of the SIP protocol. Then, we conduct an analytical survey of already proposed anti-SPIT techniques and we evaluate their effectiveness, in terms of how they deal with the threats and vulnerabilities. Finally, we complete our evaluation by presenting a theoretical evaluation framework, based on additional qualitative and quantitative criteria.
尽管VoIP提供了新的通信方式,但同时它也为大量未经请求的信息和电话的传输提供了新的可能性,使垃圾邮件通过互联网电话(SPIT)成为可能。VoIP流行的协议是SIP,它很容易受到允许部署SPIT的威胁。在本文中,我们评估了已识别的SIP协议的威胁和漏洞的风险。然后,我们对已经提出的反spit技术进行了分析调查,并根据它们如何处理威胁和漏洞来评估它们的有效性。最后,我们根据额外的定性和定量标准,通过提出一个理论评估框架来完成我们的评估。
{"title":"SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment","authors":"G. Marias, S. Dritsas, M. Theoharidou, John Mallios, D. Gritzalis","doi":"10.1109/ICCCN.2007.4317883","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317883","url":null,"abstract":"Although VoIP provides new ways of communication, at the same time it offers new possibilities for transmitting bulk unsolicited messages and calls, enabling spam over internet telephony (SPIT). The VoIP prevailing protocol is SIP, which it is vulnerable to threats that allow SPIT to be deployed. In this paper we assess the risk of identified threats and vulnerabilities of the SIP protocol. Then, we conduct an analytical survey of already proposed anti-SPIT techniques and we evaluate their effectiveness, in terms of how they deal with the threats and vulnerabilities. Finally, we complete our evaluation by presenting a theoretical evaluation framework, based on additional qualitative and quantitative criteria.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132520594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Generalized Aho-Corasick Algorithm for Signature Based Anti-Virus Applications 基于签名的反病毒应用的广义Aho-Corasick算法
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317914
Tsern-Huei Lee
Because of its accuracy, signature matching is considered an important technique in anti-virus/worm applications. Among some famous pattern matching algorithms, the Aho-Corasick (AC) algorithm can match multiple patterns simultaneously and guarantee deterministic performance under all circumstances and thus is widely adopted in various systems, especially when worst-case performance such as wire speed requirement is a design factor. However, the AC algorithm was developed only for strings while virus/worm signatures could be specified by simple regular expressions. In this paper, we generalize the AC algorithm to systematically construct a finite state pattern matching machine which can indicate the ending position in a finite input string for the first occurrence of virus/worm signatures that are specified by strings or simple regular expressions. The regular expressions studied in this paper may contain the following operators: * (match any number of symbols), ? (match any symbol), and {min, max} (match minimum of min, maximum of max symbols), which are defined in ClamAV, a popular open source anti-virus/worm software module, for signature specification.
由于其准确性,特征匹配被认为是反病毒/蠕虫应用中的一项重要技术。在一些著名的模式匹配算法中,AC (Aho-Corasick)算法可以同时匹配多个模式,并保证在任何情况下的确定性性能,因此被广泛应用于各种系统中,特别是当最坏情况性能(如线速度要求)是一个设计因素时。但是,AC算法只针对字符串开发,而病毒/蠕虫签名可以通过简单的正则表达式来指定。本文对AC算法进行了推广,系统地构造了一个有限状态模式匹配机,该匹配机能够指示由字符串或简单正则表达式指定的病毒/蠕虫签名首次出现时在有限输入字符串中的结束位置。本文研究的正则表达式可能包含以下操作符:*(匹配任意数量的符号),?(匹配任何符号)和{min, max}(匹配最小的最小值,最大的最大符号),这是流行的开源杀毒/蠕虫软件模块ClamAV中定义的签名规范。
{"title":"Generalized Aho-Corasick Algorithm for Signature Based Anti-Virus Applications","authors":"Tsern-Huei Lee","doi":"10.1109/ICCCN.2007.4317914","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317914","url":null,"abstract":"Because of its accuracy, signature matching is considered an important technique in anti-virus/worm applications. Among some famous pattern matching algorithms, the Aho-Corasick (AC) algorithm can match multiple patterns simultaneously and guarantee deterministic performance under all circumstances and thus is widely adopted in various systems, especially when worst-case performance such as wire speed requirement is a design factor. However, the AC algorithm was developed only for strings while virus/worm signatures could be specified by simple regular expressions. In this paper, we generalize the AC algorithm to systematically construct a finite state pattern matching machine which can indicate the ending position in a finite input string for the first occurrence of virus/worm signatures that are specified by strings or simple regular expressions. The regular expressions studied in this paper may contain the following operators: * (match any number of symbols), ? (match any symbol), and {min, max} (match minimum of min, maximum of max symbols), which are defined in ClamAV, a popular open source anti-virus/worm software module, for signature specification.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Reduce IP Address Fragmentation through Allocation 通过分配减少IP地址碎片
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317847
Mei Wang, L. Dunn, Wei Mao, Tao Chen
The scalability of Internet addressing and routing has been a serious issue and becomes a more urgent problem today because of driving factors like IPv6. A radical impacting element of the scalability is address allocation, as it directly affects routing table structure, hence, IP lookup and routing efficiency. A key problem in IPv4 today is address fragmentation, i.e., one entity is represented by multiple non-contiguous IP address blocks in the routing table. Address fragmentation increases routing table size, therefore degrades scalability. Existing address allocation practices are a major contributor to address fragmentation. In this paper, we demonstrate that the performance of address allocation can be dramatically improved. We propose a new address allocation algorithm called GAP: Growth-based Address Partitioning. Through real data, we show that GAP can reduce fragmentation by 90% compared to the existing allocation schemes. This is significant for reducing routing table size, increasing scalability, and improving the performance of the Internet. We also introduce a software tool being developed for address allocation.
Internet寻址和路由的可扩展性一直是一个严重的问题,并且由于IPv6等驱动因素而成为当今更加紧迫的问题。影响可伸缩性的一个根本因素是地址分配,因为它直接影响路由表结构,从而影响IP查找和路由效率。目前IPv4的一个关键问题是地址碎片,即一个实体在路由表中由多个不连续的IP地址块表示。地址碎片增加了路由表的大小,因此降低了可伸缩性。现有的地址分配实践是造成地址碎片的主要原因。在本文中,我们证明了地址分配的性能可以显著提高。我们提出了一种新的地址分配算法,称为GAP:基于增长的地址分区。通过实际数据,我们发现GAP比现有的分配方案可以减少90%的碎片化。这对于减小路由表大小、增加可伸缩性和改进Internet的性能非常重要。我们还介绍了一个正在开发的地址分配软件工具。
{"title":"Reduce IP Address Fragmentation through Allocation","authors":"Mei Wang, L. Dunn, Wei Mao, Tao Chen","doi":"10.1109/ICCCN.2007.4317847","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317847","url":null,"abstract":"The scalability of Internet addressing and routing has been a serious issue and becomes a more urgent problem today because of driving factors like IPv6. A radical impacting element of the scalability is address allocation, as it directly affects routing table structure, hence, IP lookup and routing efficiency. A key problem in IPv4 today is address fragmentation, i.e., one entity is represented by multiple non-contiguous IP address blocks in the routing table. Address fragmentation increases routing table size, therefore degrades scalability. Existing address allocation practices are a major contributor to address fragmentation. In this paper, we demonstrate that the performance of address allocation can be dramatically improved. We propose a new address allocation algorithm called GAP: Growth-based Address Partitioning. Through real data, we show that GAP can reduce fragmentation by 90% compared to the existing allocation schemes. This is significant for reducing routing table size, increasing scalability, and improving the performance of the Internet. We also introduce a software tool being developed for address allocation.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Coordinate-Based Routing for Overlay Networks 基于坐标的覆盖网络路由
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317900
V. Pappas, V. Hilt, M. Hofmann
Overlay networks are widely used as a way to introduce novel Internet services and to improve the reliability and performance of today's Internet. Traditionally, overlay networks perform routing by mimicking the underlying IP routing protocols, which does not scale well with the system size. In this paper, we propose a fundamentally new approach to overlay routing that is based on network coordinates. Our evaluation shows that this approach is scalable to a large number of overlay nodes with a message complexity of O(N) while providing routing decisions that are close to optimal in terms of error resilience and path delay.
覆盖网络作为一种引入新的互联网服务和提高当今互联网的可靠性和性能的方式被广泛使用。传统上,覆盖网络通过模仿底层IP路由协议来执行路由,这不能很好地随系统大小进行扩展。在本文中,我们提出了一种基于网络坐标的覆盖路由的全新方法。我们的评估表明,这种方法可以扩展到消息复杂度为0 (N)的大量覆盖节点,同时提供在错误弹性和路径延迟方面接近最佳的路由决策。
{"title":"Coordinate-Based Routing for Overlay Networks","authors":"V. Pappas, V. Hilt, M. Hofmann","doi":"10.1109/ICCCN.2007.4317900","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317900","url":null,"abstract":"Overlay networks are widely used as a way to introduce novel Internet services and to improve the reliability and performance of today's Internet. Traditionally, overlay networks perform routing by mimicking the underlying IP routing protocols, which does not scale well with the system size. In this paper, we propose a fundamentally new approach to overlay routing that is based on network coordinates. Our evaluation shows that this approach is scalable to a large number of overlay nodes with a message complexity of O(N) while providing routing decisions that are close to optimal in terms of error resilience and path delay.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132189299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Containing Hitlist-Based Worms with Polymorphic Signatures 包含多态签名的基于hitlist的蠕虫
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317891
Theodor Richardson, Chin-Tser Huang
Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms that attempt to propagate by searching for address book files on the host system and using the host's mail program to spread to the addresses found. This threat becomes more severe when the worms are assumed to be polymorphic in nature - able to dynamically change their signature to elude capture. Because the method of propagation for these worms is predictable, it is possible to contain their spread through the use of honeytoken e-mail addresses in the client address book. Any e-mail received by the honeytoken address will be immediately recognized as malicious and can therefore be used to flag client machines as infected. This paper provides a complete description of a method to allow for better containment of this class of worms. The results of the proposed method are examined and compared to a previous method of capturing this type of worm.
蠕虫通过资源消耗和恶意活动对网络系统构成重大威胁。本文研究了一类基于hitlist的蠕虫的传播,这种蠕虫试图通过在主机系统上搜索地址簿文件并使用主机的邮件程序传播到找到的地址来传播。当蠕虫被认为是多态的——能够动态改变它们的特征以逃避捕获时,这种威胁变得更加严重。由于这些蠕虫的传播方法是可预测的,因此可以通过使用客户机地址簿中的蜂蜜令牌电子邮件地址来控制它们的传播。蜂蜜令牌地址收到的任何电子邮件都将立即被识别为恶意邮件,因此可用于将客户端计算机标记为受感染。本文提供了一种方法的完整描述,以允许更好地遏制这类蠕虫。所提出的方法的结果进行了检查,并与以前捕获这种类型的蠕虫的方法进行了比较。
{"title":"Containing Hitlist-Based Worms with Polymorphic Signatures","authors":"Theodor Richardson, Chin-Tser Huang","doi":"10.1109/ICCCN.2007.4317891","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317891","url":null,"abstract":"Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms that attempt to propagate by searching for address book files on the host system and using the host's mail program to spread to the addresses found. This threat becomes more severe when the worms are assumed to be polymorphic in nature - able to dynamically change their signature to elude capture. Because the method of propagation for these worms is predictable, it is possible to contain their spread through the use of honeytoken e-mail addresses in the client address book. Any e-mail received by the honeytoken address will be immediately recognized as malicious and can therefore be used to flag client machines as infected. This paper provides a complete description of a method to allow for better containment of this class of worms. The results of the proposed method are examined and compared to a previous method of capturing this type of worm.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"115 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113945112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SpotMAC: A Pencil-Beam MAC for Wireless Mesh Networks SpotMAC:用于无线网状网络的铅笔束MAC
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317801
Kwan-Wu Chin
Deafness is a key problem. It erodes the performance gains provided by directional antennas, and introduces a new hidden terminal problem. To address deafness, and hence the hidden terminal problem, we propose SpotMAC. By exploiting narrow or pencil beams, SpotMAC achieves high spatial reuse, throughput and fairness. In addition, pencil beams simplify the collision avoidance process and constrain the hidden terminal problem to a linear topology which can be solved using an inverse RTS/CTS exchange. From extensive simulation studies, we confirm nodes using SpotMAC have several orders of magnitude higher throughput than those using the IEEE 802.11 MAC with omni-directional antenna.
耳聋是一个关键问题。它侵蚀了定向天线提供的性能增益,并引入了一个新的隐藏终端问题。为了解决耳聋和潜在的终端问题,我们提出SpotMAC。通过利用窄梁或铅笔梁,SpotMAC实现了高空间重用、吞吐量和公平性。此外,铅笔束简化了避碰过程,并将隐藏终端问题约束为线性拓扑,可以使用反向RTS/CTS交换来解决。从广泛的仿真研究中,我们确认使用SpotMAC的节点比使用带全向天线的IEEE 802.11 MAC的节点具有几个数量级的吞吐量。
{"title":"SpotMAC: A Pencil-Beam MAC for Wireless Mesh Networks","authors":"Kwan-Wu Chin","doi":"10.1109/ICCCN.2007.4317801","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317801","url":null,"abstract":"Deafness is a key problem. It erodes the performance gains provided by directional antennas, and introduces a new hidden terminal problem. To address deafness, and hence the hidden terminal problem, we propose SpotMAC. By exploiting narrow or pencil beams, SpotMAC achieves high spatial reuse, throughput and fairness. In addition, pencil beams simplify the collision avoidance process and constrain the hidden terminal problem to a linear topology which can be solved using an inverse RTS/CTS exchange. From extensive simulation studies, we confirm nodes using SpotMAC have several orders of magnitude higher throughput than those using the IEEE 802.11 MAC with omni-directional antenna.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128955774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Blocking Analysis of Limited-Reconfigurable Optical Networks 有限可重构光网络的阻塞分析
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317822
O. Turkcu, S. Subramaniam
The blocking performance of limited-reconflgurable all-optical networks is investigated in this paper. Reconfigurability is achieved by reconflgurable optical add-drop multiplexers (ROADMs) and tunable transponders. An analytical model is developed adopting a share-per-node model for the sharing of transponders within a reconfigurable node. The set of wavelengths that can be added/dropped at a reconfigurable node depends on the constraints of ROADMs as well as the (possibly limited or narrowly) tunable transponders. The size of the wavelength set to which a transponder is tunable (tuning range), and the number of transponders are the key parameters that affect the blocking. A lightpath request can be established depending on the transponders' ability to tune to the available wavelengths along the route. We call this constraint as wavelength termination constraint. Both analytical and simulation results show that narrowly tunable transponders achieve a similar performance as widely tunable transponders. The effect of the number of transponders or the number of ports of a ROADM on blocking is also investigated.
研究了有限可重构全光网络的阻塞性能。可重构性是通过可重构的光加丢多路复用器(roadm)和可调谐转发器实现的。采用每节点共享模型,建立了可重构节点内转发器共享的解析模型。可在可重构节点上添加/删除的波长集取决于roadm以及(可能有限或狭窄)可调谐转发器的约束。转发器可调谐的波长设置的大小(调谐范围)和转发器的数量是影响阻塞的关键参数。光路请求可以根据应答器调谐到路径上可用波长的能力来建立。我们称这个约束为波长终止约束。分析和仿真结果表明,窄可调谐转发器与宽可调谐转发器具有相似的性能。还研究了应答器数量或ROADM端口数量对阻塞的影响。
{"title":"Blocking Analysis of Limited-Reconfigurable Optical Networks","authors":"O. Turkcu, S. Subramaniam","doi":"10.1109/ICCCN.2007.4317822","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317822","url":null,"abstract":"The blocking performance of limited-reconflgurable all-optical networks is investigated in this paper. Reconfigurability is achieved by reconflgurable optical add-drop multiplexers (ROADMs) and tunable transponders. An analytical model is developed adopting a share-per-node model for the sharing of transponders within a reconfigurable node. The set of wavelengths that can be added/dropped at a reconfigurable node depends on the constraints of ROADMs as well as the (possibly limited or narrowly) tunable transponders. The size of the wavelength set to which a transponder is tunable (tuning range), and the number of transponders are the key parameters that affect the blocking. A lightpath request can be established depending on the transponders' ability to tune to the available wavelengths along the route. We call this constraint as wavelength termination constraint. Both analytical and simulation results show that narrowly tunable transponders achieve a similar performance as widely tunable transponders. The effect of the number of transponders or the number of ports of a ROADM on blocking is also investigated.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128496726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing Digital Objects on the Internet 管理互联网上的数字对象
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317779
R. Kahn
All types of information may be structured as digital objects. These may be subject to rights, require privacy or demand security. Some may be inaccessible without permission (eg. Behind firewalls) may move from place to place, or exist at multiple locations. Some may need to be accessible for very long period of time. An overall framework in which to address these issues will be presented and their revelence to network operations and management will be discussed.
所有类型的信息都可以结构化为数字对象。这些可能受制于权利、要求隐私或要求安全。有些未经允许不得进入(例如:在防火墙后面)可能从一个地方移动到另一个地方,或者存在于多个位置。有些可能需要很长一段时间才能访问。将提出一个解决这些问题的总体框架,并讨论它们与网络业务和管理的相关性。
{"title":"Managing Digital Objects on the Internet","authors":"R. Kahn","doi":"10.1109/ICCCN.2007.4317779","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317779","url":null,"abstract":"All types of information may be structured as digital objects. These may be subject to rights, require privacy or demand security. Some may be inaccessible without permission (eg. Behind firewalls) may move from place to place, or exist at multiple locations. Some may need to be accessible for very long period of time. An overall framework in which to address these issues will be presented and their revelence to network operations and management will be discussed.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115334506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2007 16th International Conference on Computer Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1