首页 > 最新文献

2007 16th International Conference on Computer Communications and Networks最新文献

英文 中文
SCUBE: A DoS-Resistant Distributed Search Protocol SCUBE:一个抗dos的分布式搜索协议
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317808
Souvik Ray, Zhao Zhang
Many P2P-based storage systems use distributed indexing service for searching documents. There are two security issues when the nodes providing the index service are compromised by adversaries. First, the adversaries may delete the indexes or stop the program of indexing service, making the affected documents disappear in the search infrastructure. Second, the adversaries may leak the locations of the storage nodes hosting certain documents, making those nodes the target of DOS attacks. We propose a protocol called SCUBE which addresses these attacks by using secret-sharing based threshold cryptography and the concept of virtual addresses. Our results show that SCUBE performs appreciably well under different attack scenarios and incurs nominal overhead. A working prototype of SCUBE has also been implemented and tested on the Planetlab testbed.
许多基于p2p的存储系统都使用分布式索引服务来搜索文档。当提供索引服务的节点被攻击者破坏时,会出现两个安全问题。首先,攻击者可能会删除索引或停止索引服务程序,使受影响的文档在搜索基础结构中消失。其次,攻击者可能会泄露存放某些文档的存储节点的位置,使这些节点成为DOS攻击的目标。我们提出了一个名为SCUBE的协议,该协议通过使用基于秘密共享的阈值加密和虚拟地址的概念来解决这些攻击。我们的结果表明,SCUBE在不同的攻击场景下表现相当好,并且会产生名义上的开销。SCUBE的工作原型也已在Planetlab测试台上实现并进行了测试。
{"title":"SCUBE: A DoS-Resistant Distributed Search Protocol","authors":"Souvik Ray, Zhao Zhang","doi":"10.1109/ICCCN.2007.4317808","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317808","url":null,"abstract":"Many P2P-based storage systems use distributed indexing service for searching documents. There are two security issues when the nodes providing the index service are compromised by adversaries. First, the adversaries may delete the indexes or stop the program of indexing service, making the affected documents disappear in the search infrastructure. Second, the adversaries may leak the locations of the storage nodes hosting certain documents, making those nodes the target of DOS attacks. We propose a protocol called SCUBE which addresses these attacks by using secret-sharing based threshold cryptography and the concept of virtual addresses. Our results show that SCUBE performs appreciably well under different attack scenarios and incurs nominal overhead. A working prototype of SCUBE has also been implemented and tested on the Planetlab testbed.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fair Efficiency, or Low Average Delay without Starvation 公平的效率,或无饥饿的低平均延迟
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317856
Sergey Gorinsky, Christoph Jechlitschek
File transfer, web download, and many other applications are primarily interested in minimal delay achievable for their messages. In this paper, we investigate allocating the bottleneck link capacity to transmit messages efficiently but fairly. While SRPT (Shortest Remaining Processing Time) is an optimally efficient algorithm that minimizes average delay of messages, large messages might starve under SRPT in heavy load conditions. PS (Processor Sharing) and ViFi (Virtual Finish Time First) are fair but yield higher average delays than under SRPT. We explore the class of fair algorithms further and prove that no online algorithm in this class is optimally efficient. Then, we derive a fair algorithm SFS (Shortest Fair Sojourn) and report extensive experimental evidence that SFS is consistently more efficient than PS and even ViFi during either temporal overload or steady-state operation, with largest benefits achieved when average load is around the bottleneck link capacity. Furthermore, average delay under the fair SFS remains close to the minimum attained under the unfair SRPT.
文件传输、web下载和许多其他应用程序主要对其消息的最小延迟感兴趣。本文研究了如何合理分配瓶颈链路容量,从而有效而公平地传输消息。虽然SRPT(最短剩余处理时间)是一种最有效的算法,可以最小化消息的平均延迟,但是在重负载条件下,使用SRPT可能会饿死大消息。PS(处理器共享)和ViFi(虚拟完成时间优先)是公平的,但产生比SRPT更高的平均延迟。我们进一步探讨了公平算法,并证明了这类算法中没有最优效率的在线算法。然后,我们推导了一个公平的算法SFS(最短公平逗留),并报告了大量的实验证据,表明SFS在时间过载或稳态运行期间始终比PS甚至ViFi更有效,当平均负载在瓶颈链路容量附近时获得最大的收益。此外,公平SFS下的平均延迟仍然接近于不公平SRPT下的最小延迟。
{"title":"Fair Efficiency, or Low Average Delay without Starvation","authors":"Sergey Gorinsky, Christoph Jechlitschek","doi":"10.1109/ICCCN.2007.4317856","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317856","url":null,"abstract":"File transfer, web download, and many other applications are primarily interested in minimal delay achievable for their messages. In this paper, we investigate allocating the bottleneck link capacity to transmit messages efficiently but fairly. While SRPT (Shortest Remaining Processing Time) is an optimally efficient algorithm that minimizes average delay of messages, large messages might starve under SRPT in heavy load conditions. PS (Processor Sharing) and ViFi (Virtual Finish Time First) are fair but yield higher average delays than under SRPT. We explore the class of fair algorithms further and prove that no online algorithm in this class is optimally efficient. Then, we derive a fair algorithm SFS (Shortest Fair Sojourn) and report extensive experimental evidence that SFS is consistently more efficient than PS and even ViFi during either temporal overload or steady-state operation, with largest benefits achieved when average load is around the bottleneck link capacity. Furthermore, average delay under the fair SFS remains close to the minimum attained under the unfair SRPT.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114460893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Temporal Quality Evaluation for Enhancing Compressed Video 增强压缩视频的时间质量评价
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317976
Kai-Chieh Yang, G. Dane, K. El-Maleh
This paper proposes a metric to quantify the effect of the video frame loss according to their impact toward perceived temporal quality. This metric utilizes information obtained from pixel domain and particularly aims at measuring the temporal video quality degradation caused by both regular and irregular frame loss. As one application, the proposed temporal quality metric is used to evaluate the benefit of adaptive thresholding in frame skipping algorithms at the encoder. Temporal quality metric shows high prediction accuracy compared to subjective quality evaluation. Furthermore, it is shown by the experimental results that proposed temporal quality metric precisely differentiates between different frame skipping approaches and can be effectively used to evaluate them. With the help of the proposed quality metric, encoders can be designed to drop frames effectively with minimal perceptual video quality degradation.
本文提出了一个度量来量化视频帧丢失对感知时间质量的影响。该度量利用从像素域获得的信息,特别针对测量规则和不规则帧丢失引起的时间视频质量下降。作为一个应用,提出的时间质量度量用于评估自适应阈值在编码器跳帧算法中的优势。与主观质量评价相比,时间质量度量具有较高的预测精度。实验结果表明,本文提出的时间质量度量能够准确区分不同的跳帧方法,并能有效地对其进行评价。在提出的质量度量的帮助下,编码器可以被设计成在最小的感知视频质量下降的情况下有效地丢帧。
{"title":"Temporal Quality Evaluation for Enhancing Compressed Video","authors":"Kai-Chieh Yang, G. Dane, K. El-Maleh","doi":"10.1109/ICCCN.2007.4317976","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317976","url":null,"abstract":"This paper proposes a metric to quantify the effect of the video frame loss according to their impact toward perceived temporal quality. This metric utilizes information obtained from pixel domain and particularly aims at measuring the temporal video quality degradation caused by both regular and irregular frame loss. As one application, the proposed temporal quality metric is used to evaluate the benefit of adaptive thresholding in frame skipping algorithms at the encoder. Temporal quality metric shows high prediction accuracy compared to subjective quality evaluation. Furthermore, it is shown by the experimental results that proposed temporal quality metric precisely differentiates between different frame skipping approaches and can be effectively used to evaluate them. With the help of the proposed quality metric, encoders can be designed to drop frames effectively with minimal perceptual video quality degradation.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluating Xen for Router Virtualization 评估Xen路由器虚拟化
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317993
Norbert Egi, A. Greenhalgh, M. Handley, Mickaël Hoerdt, L. Mathy, Tim Schooley
In this paper, we evaluate the performance of a software IP router forwarding plane inside the Xen virtual machine monitor environment with a view to identifying (some) design issues in Virtual Routers. To this end, we evaluate and compare the forwarding performance of two identical Linux software router configurations, run either above the Xen hypervisor or within vanilla Linux. Even with minimal sized packets, we show that the Xen DomO privileged domain offers near native forwarding performance at the condition that the sollicitation to unpriviledged domains stay minimal, whereas Xen unprivileged domains offer very poor performance in every cases. This shows that an important design principle for virtual router platforms must be to handle all forwarding, for all virtual routers, onto the same forwarding engine, in order to avoid much detrimental per-packet context switching.
在本文中,我们评估了软件IP路由器转发平面在Xen虚拟机监控环境中的性能,以识别虚拟路由器中的一些设计问题。为此,我们评估和比较了两个相同的Linux软件路由器配置的转发性能,它们运行在Xen管理程序之上或在普通Linux中。即使使用最小大小的数据包,我们也表明,在对非特权域的请求保持最小的条件下,Xen DomO特权域提供了接近本机的转发性能,而Xen非特权域在每种情况下都提供了非常差的性能。这表明,虚拟路由器平台的一个重要设计原则必须是将所有虚拟路由器的所有转发处理到相同的转发引擎上,以避免大量有害的每包上下文切换。
{"title":"Evaluating Xen for Router Virtualization","authors":"Norbert Egi, A. Greenhalgh, M. Handley, Mickaël Hoerdt, L. Mathy, Tim Schooley","doi":"10.1109/ICCCN.2007.4317993","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317993","url":null,"abstract":"In this paper, we evaluate the performance of a software IP router forwarding plane inside the Xen virtual machine monitor environment with a view to identifying (some) design issues in Virtual Routers. To this end, we evaluate and compare the forwarding performance of two identical Linux software router configurations, run either above the Xen hypervisor or within vanilla Linux. Even with minimal sized packets, we show that the Xen DomO privileged domain offers near native forwarding performance at the condition that the sollicitation to unpriviledged domains stay minimal, whereas Xen unprivileged domains offer very poor performance in every cases. This shows that an important design principle for virtual router platforms must be to handle all forwarding, for all virtual routers, onto the same forwarding engine, in order to avoid much detrimental per-packet context switching.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126554760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
IEEE 802.11e EDCA QoS Provisioning with Dynamic Fuzzy Control and Cross-Layer Interface 基于动态模糊控制和跨层接口的IEEE 802.11e EDCA QoS提供
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317910
Chao-Lieh Chen
We propose a dynamic fuzzy logic control (DFLC) for further enhancement of the IEEE 802.11e enhanced distributed channel access (EDCA) function. Although legacy IEEE 802.11 was enhanced by the 802.11e, in wireless networks real-time traffics over the IEEE 802.11e suffer unacceptable quality especially when network state is dynamic. We adopt fuzzy logic for tackling uncertainty in wireless networks. To deal with the dynamics in wireless networks, fuzzy rules with cognitive consequents are adopted. For streaming multimedia objects over wireless networks, the dynamic fuzzy controller tunes the backoff parameters of the EDCA function to meet the dynamic traffic specification (TSPEC), which is defined by upper layers. Moreover, to support cross-layer design, a cross-layer interface is provided to transport the TSPEC to the MAC layer. Analysis and experiments show that the dynamic fuzzy control provides realtime bandwidth allocation and at the same time preserves fairness.
为了进一步增强IEEE 802.11e增强分布式信道访问(EDCA)功能,我们提出了一种动态模糊逻辑控制(DFLC)。尽管传统的IEEE 802.11通过802.11e得到了增强,但在无线网络中,IEEE 802.11e上的实时流量的质量难以接受,尤其是在网络状态是动态的情况下。我们采用模糊逻辑来处理无线网络中的不确定性。为了处理无线网络中的动态问题,采用了带有认知结果的模糊规则。对于无线网络上的流媒体对象,动态模糊控制器通过调整EDCA函数的回退参数来满足上层定义的动态流量规范(TSPEC)。此外,为了支持跨层设计,还提供了一个跨层接口将TSPEC传输到MAC层。分析和实验表明,动态模糊控制在保证公平性的同时,提供了实时的带宽分配。
{"title":"IEEE 802.11e EDCA QoS Provisioning with Dynamic Fuzzy Control and Cross-Layer Interface","authors":"Chao-Lieh Chen","doi":"10.1109/ICCCN.2007.4317910","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317910","url":null,"abstract":"We propose a dynamic fuzzy logic control (DFLC) for further enhancement of the IEEE 802.11e enhanced distributed channel access (EDCA) function. Although legacy IEEE 802.11 was enhanced by the 802.11e, in wireless networks real-time traffics over the IEEE 802.11e suffer unacceptable quality especially when network state is dynamic. We adopt fuzzy logic for tackling uncertainty in wireless networks. To deal with the dynamics in wireless networks, fuzzy rules with cognitive consequents are adopted. For streaming multimedia objects over wireless networks, the dynamic fuzzy controller tunes the backoff parameters of the EDCA function to meet the dynamic traffic specification (TSPEC), which is defined by upper layers. Moreover, to support cross-layer design, a cross-layer interface is provided to transport the TSPEC to the MAC layer. Analysis and experiments show that the dynamic fuzzy control provides realtime bandwidth allocation and at the same time preserves fairness.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126578376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment SIP漏洞和反吐痰机制评估
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317883
G. Marias, S. Dritsas, M. Theoharidou, John Mallios, D. Gritzalis
Although VoIP provides new ways of communication, at the same time it offers new possibilities for transmitting bulk unsolicited messages and calls, enabling spam over internet telephony (SPIT). The VoIP prevailing protocol is SIP, which it is vulnerable to threats that allow SPIT to be deployed. In this paper we assess the risk of identified threats and vulnerabilities of the SIP protocol. Then, we conduct an analytical survey of already proposed anti-SPIT techniques and we evaluate their effectiveness, in terms of how they deal with the threats and vulnerabilities. Finally, we complete our evaluation by presenting a theoretical evaluation framework, based on additional qualitative and quantitative criteria.
尽管VoIP提供了新的通信方式,但同时它也为大量未经请求的信息和电话的传输提供了新的可能性,使垃圾邮件通过互联网电话(SPIT)成为可能。VoIP流行的协议是SIP,它很容易受到允许部署SPIT的威胁。在本文中,我们评估了已识别的SIP协议的威胁和漏洞的风险。然后,我们对已经提出的反spit技术进行了分析调查,并根据它们如何处理威胁和漏洞来评估它们的有效性。最后,我们根据额外的定性和定量标准,通过提出一个理论评估框架来完成我们的评估。
{"title":"SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment","authors":"G. Marias, S. Dritsas, M. Theoharidou, John Mallios, D. Gritzalis","doi":"10.1109/ICCCN.2007.4317883","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317883","url":null,"abstract":"Although VoIP provides new ways of communication, at the same time it offers new possibilities for transmitting bulk unsolicited messages and calls, enabling spam over internet telephony (SPIT). The VoIP prevailing protocol is SIP, which it is vulnerable to threats that allow SPIT to be deployed. In this paper we assess the risk of identified threats and vulnerabilities of the SIP protocol. Then, we conduct an analytical survey of already proposed anti-SPIT techniques and we evaluate their effectiveness, in terms of how they deal with the threats and vulnerabilities. Finally, we complete our evaluation by presenting a theoretical evaluation framework, based on additional qualitative and quantitative criteria.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132520594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Containing Hitlist-Based Worms with Polymorphic Signatures 包含多态签名的基于hitlist的蠕虫
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317891
Theodor Richardson, Chin-Tser Huang
Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms that attempt to propagate by searching for address book files on the host system and using the host's mail program to spread to the addresses found. This threat becomes more severe when the worms are assumed to be polymorphic in nature - able to dynamically change their signature to elude capture. Because the method of propagation for these worms is predictable, it is possible to contain their spread through the use of honeytoken e-mail addresses in the client address book. Any e-mail received by the honeytoken address will be immediately recognized as malicious and can therefore be used to flag client machines as infected. This paper provides a complete description of a method to allow for better containment of this class of worms. The results of the proposed method are examined and compared to a previous method of capturing this type of worm.
蠕虫通过资源消耗和恶意活动对网络系统构成重大威胁。本文研究了一类基于hitlist的蠕虫的传播,这种蠕虫试图通过在主机系统上搜索地址簿文件并使用主机的邮件程序传播到找到的地址来传播。当蠕虫被认为是多态的——能够动态改变它们的特征以逃避捕获时,这种威胁变得更加严重。由于这些蠕虫的传播方法是可预测的,因此可以通过使用客户机地址簿中的蜂蜜令牌电子邮件地址来控制它们的传播。蜂蜜令牌地址收到的任何电子邮件都将立即被识别为恶意邮件,因此可用于将客户端计算机标记为受感染。本文提供了一种方法的完整描述,以允许更好地遏制这类蠕虫。所提出的方法的结果进行了检查,并与以前捕获这种类型的蠕虫的方法进行了比较。
{"title":"Containing Hitlist-Based Worms with Polymorphic Signatures","authors":"Theodor Richardson, Chin-Tser Huang","doi":"10.1109/ICCCN.2007.4317891","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317891","url":null,"abstract":"Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms that attempt to propagate by searching for address book files on the host system and using the host's mail program to spread to the addresses found. This threat becomes more severe when the worms are assumed to be polymorphic in nature - able to dynamically change their signature to elude capture. Because the method of propagation for these worms is predictable, it is possible to contain their spread through the use of honeytoken e-mail addresses in the client address book. Any e-mail received by the honeytoken address will be immediately recognized as malicious and can therefore be used to flag client machines as infected. This paper provides a complete description of a method to allow for better containment of this class of worms. The results of the proposed method are examined and compared to a previous method of capturing this type of worm.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"115 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113945112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SpotMAC: A Pencil-Beam MAC for Wireless Mesh Networks SpotMAC:用于无线网状网络的铅笔束MAC
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317801
Kwan-Wu Chin
Deafness is a key problem. It erodes the performance gains provided by directional antennas, and introduces a new hidden terminal problem. To address deafness, and hence the hidden terminal problem, we propose SpotMAC. By exploiting narrow or pencil beams, SpotMAC achieves high spatial reuse, throughput and fairness. In addition, pencil beams simplify the collision avoidance process and constrain the hidden terminal problem to a linear topology which can be solved using an inverse RTS/CTS exchange. From extensive simulation studies, we confirm nodes using SpotMAC have several orders of magnitude higher throughput than those using the IEEE 802.11 MAC with omni-directional antenna.
耳聋是一个关键问题。它侵蚀了定向天线提供的性能增益,并引入了一个新的隐藏终端问题。为了解决耳聋和潜在的终端问题,我们提出SpotMAC。通过利用窄梁或铅笔梁,SpotMAC实现了高空间重用、吞吐量和公平性。此外,铅笔束简化了避碰过程,并将隐藏终端问题约束为线性拓扑,可以使用反向RTS/CTS交换来解决。从广泛的仿真研究中,我们确认使用SpotMAC的节点比使用带全向天线的IEEE 802.11 MAC的节点具有几个数量级的吞吐量。
{"title":"SpotMAC: A Pencil-Beam MAC for Wireless Mesh Networks","authors":"Kwan-Wu Chin","doi":"10.1109/ICCCN.2007.4317801","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317801","url":null,"abstract":"Deafness is a key problem. It erodes the performance gains provided by directional antennas, and introduces a new hidden terminal problem. To address deafness, and hence the hidden terminal problem, we propose SpotMAC. By exploiting narrow or pencil beams, SpotMAC achieves high spatial reuse, throughput and fairness. In addition, pencil beams simplify the collision avoidance process and constrain the hidden terminal problem to a linear topology which can be solved using an inverse RTS/CTS exchange. From extensive simulation studies, we confirm nodes using SpotMAC have several orders of magnitude higher throughput than those using the IEEE 802.11 MAC with omni-directional antenna.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128955774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Blocking Analysis of Limited-Reconfigurable Optical Networks 有限可重构光网络的阻塞分析
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317822
O. Turkcu, S. Subramaniam
The blocking performance of limited-reconflgurable all-optical networks is investigated in this paper. Reconfigurability is achieved by reconflgurable optical add-drop multiplexers (ROADMs) and tunable transponders. An analytical model is developed adopting a share-per-node model for the sharing of transponders within a reconfigurable node. The set of wavelengths that can be added/dropped at a reconfigurable node depends on the constraints of ROADMs as well as the (possibly limited or narrowly) tunable transponders. The size of the wavelength set to which a transponder is tunable (tuning range), and the number of transponders are the key parameters that affect the blocking. A lightpath request can be established depending on the transponders' ability to tune to the available wavelengths along the route. We call this constraint as wavelength termination constraint. Both analytical and simulation results show that narrowly tunable transponders achieve a similar performance as widely tunable transponders. The effect of the number of transponders or the number of ports of a ROADM on blocking is also investigated.
研究了有限可重构全光网络的阻塞性能。可重构性是通过可重构的光加丢多路复用器(roadm)和可调谐转发器实现的。采用每节点共享模型,建立了可重构节点内转发器共享的解析模型。可在可重构节点上添加/删除的波长集取决于roadm以及(可能有限或狭窄)可调谐转发器的约束。转发器可调谐的波长设置的大小(调谐范围)和转发器的数量是影响阻塞的关键参数。光路请求可以根据应答器调谐到路径上可用波长的能力来建立。我们称这个约束为波长终止约束。分析和仿真结果表明,窄可调谐转发器与宽可调谐转发器具有相似的性能。还研究了应答器数量或ROADM端口数量对阻塞的影响。
{"title":"Blocking Analysis of Limited-Reconfigurable Optical Networks","authors":"O. Turkcu, S. Subramaniam","doi":"10.1109/ICCCN.2007.4317822","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317822","url":null,"abstract":"The blocking performance of limited-reconflgurable all-optical networks is investigated in this paper. Reconfigurability is achieved by reconflgurable optical add-drop multiplexers (ROADMs) and tunable transponders. An analytical model is developed adopting a share-per-node model for the sharing of transponders within a reconfigurable node. The set of wavelengths that can be added/dropped at a reconfigurable node depends on the constraints of ROADMs as well as the (possibly limited or narrowly) tunable transponders. The size of the wavelength set to which a transponder is tunable (tuning range), and the number of transponders are the key parameters that affect the blocking. A lightpath request can be established depending on the transponders' ability to tune to the available wavelengths along the route. We call this constraint as wavelength termination constraint. Both analytical and simulation results show that narrowly tunable transponders achieve a similar performance as widely tunable transponders. The effect of the number of transponders or the number of ports of a ROADM on blocking is also investigated.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128496726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing Digital Objects on the Internet 管理互联网上的数字对象
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317779
R. Kahn
All types of information may be structured as digital objects. These may be subject to rights, require privacy or demand security. Some may be inaccessible without permission (eg. Behind firewalls) may move from place to place, or exist at multiple locations. Some may need to be accessible for very long period of time. An overall framework in which to address these issues will be presented and their revelence to network operations and management will be discussed.
所有类型的信息都可以结构化为数字对象。这些可能受制于权利、要求隐私或要求安全。有些未经允许不得进入(例如:在防火墙后面)可能从一个地方移动到另一个地方,或者存在于多个位置。有些可能需要很长一段时间才能访问。将提出一个解决这些问题的总体框架,并讨论它们与网络业务和管理的相关性。
{"title":"Managing Digital Objects on the Internet","authors":"R. Kahn","doi":"10.1109/ICCCN.2007.4317779","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317779","url":null,"abstract":"All types of information may be structured as digital objects. These may be subject to rights, require privacy or demand security. Some may be inaccessible without permission (eg. Behind firewalls) may move from place to place, or exist at multiple locations. Some may need to be accessible for very long period of time. An overall framework in which to address these issues will be presented and their revelence to network operations and management will be discussed.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115334506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2007 16th International Conference on Computer Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1