首页 > 最新文献

2007 16th International Conference on Computer Communications and Networks最新文献

英文 中文
Optimal Packet Allocation with Airtime Constraint for Multi-Access Links 基于时间约束的多址链路最优分组分配
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317838
Jong-ok Kim, Toshiaki Yamamoto, A. Yamaguchi, S. Obana
In next generation wireless networks, a variety of heterogeneous radio access technologies are expected to be available simultaneously within a single wireless terminal. This paper addresses the challenge of link aggregation in multi-access networks, where a key issue is how to optimally aggregate bandwidth offered by the individual radio link. Effective link throughput model is employed as a common resource measure for heterogeneous links. Based on the model, we present a packet allocation technique to optimize link aggregation. The mapping of packets to radio access links is performed to maximize the overall expected system throughput. Airtime constraint is added for an equal load balance. We have conducted extensive simulations with two scenarios. One is at the co-existence of WiMAX and WiFi, and the other includes only WiFi links. The proposed technique adaptively operates to time-varying link resource, and achieves better the aggregated link performance than WRR with fixed distribution ratio.
在下一代无线网络中,预计在单个无线终端内可同时使用多种异构无线接入技术。本文讨论了多址网络中链路聚合的挑战,其中一个关键问题是如何最优地聚合单个无线电链路提供的带宽。采用有效链路吞吐量模型作为异构链路的通用资源度量。在此基础上,提出了一种优化链路聚合的分组分配技术。数据包到无线接入链路的映射是为了最大限度地提高总体预期的系统吞吐量。增加了通话时间限制以实现相等的负载平衡。我们对两种情况进行了广泛的模拟。一种是WiMAX和WiFi共存,另一种是只包括WiFi链路。该方法对时变的链路资源进行自适应运算,获得了比固定分配比的WRR更好的聚合链路性能。
{"title":"Optimal Packet Allocation with Airtime Constraint for Multi-Access Links","authors":"Jong-ok Kim, Toshiaki Yamamoto, A. Yamaguchi, S. Obana","doi":"10.1109/ICCCN.2007.4317838","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317838","url":null,"abstract":"In next generation wireless networks, a variety of heterogeneous radio access technologies are expected to be available simultaneously within a single wireless terminal. This paper addresses the challenge of link aggregation in multi-access networks, where a key issue is how to optimally aggregate bandwidth offered by the individual radio link. Effective link throughput model is employed as a common resource measure for heterogeneous links. Based on the model, we present a packet allocation technique to optimize link aggregation. The mapping of packets to radio access links is performed to maximize the overall expected system throughput. Airtime constraint is added for an equal load balance. We have conducted extensive simulations with two scenarios. One is at the co-existence of WiMAX and WiFi, and the other includes only WiFi links. The proposed technique adaptively operates to time-varying link resource, and achieves better the aggregated link performance than WRR with fixed distribution ratio.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Delay-aware Auto Sleep Mode Operation for Power Saving WiMAX 节电WiMAX的延迟感知自动睡眠模式操作
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317948
Shengqing Zhu, Xiaoyu Ma, Lujian Wang
To support battery powered mobile broadband wireless access devices efficiently, IEEE 802.16e defines a sleep mode operation for conserving the power of mobile terminals. However, extensive research shows that frequent sleep causes serious delay. In this paper we analyze the relationship between the power consumption and the delay with a Markov chain model. Then, we present a heuristic algorithm to adapt the parameters of sleep mechanism to the network condition and the delay requirement. Extensive simulation results show that the proposed algorithm can efficiently bound the delay in the required range. Meanwhile, the proposed algorithm achieves marked gain in power consumption compared to the traditional sleep mechanism.
为了有效地支持电池供电的移动宽带无线接入设备,IEEE 802.16e定义了一种休眠模式操作,以节省移动终端的电量。然而,广泛的研究表明,频繁的睡眠会导致严重的延迟。本文用马尔可夫链模型分析了系统功耗与时延之间的关系。然后,我们提出了一种启发式算法,使睡眠机制的参数适应网络条件和延迟要求。大量的仿真结果表明,该算法能有效地将时延约束在要求的范围内。同时,与传统的休眠机制相比,该算法在功耗上有明显的提高。
{"title":"A Delay-aware Auto Sleep Mode Operation for Power Saving WiMAX","authors":"Shengqing Zhu, Xiaoyu Ma, Lujian Wang","doi":"10.1109/ICCCN.2007.4317948","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317948","url":null,"abstract":"To support battery powered mobile broadband wireless access devices efficiently, IEEE 802.16e defines a sleep mode operation for conserving the power of mobile terminals. However, extensive research shows that frequent sleep causes serious delay. In this paper we analyze the relationship between the power consumption and the delay with a Markov chain model. Then, we present a heuristic algorithm to adapt the parameters of sleep mechanism to the network condition and the delay requirement. Extensive simulation results show that the proposed algorithm can efficiently bound the delay in the required range. Meanwhile, the proposed algorithm achieves marked gain in power consumption compared to the traditional sleep mechanism.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116126445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
ICA-based Noise Reduction for Mobile Phone Speech Communication 基于ica的手机语音通信降噪
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317863
Zhipeng Zhang, M. Etoh
We propose a frequency-domain independent component analysis (ICA) with robust and computationally-light post processing method for background noise reduction in mobile phone speech communication. In our scenario, multi-source signal separation is not the target, but noise reduction is the primal one. This primal target characterizes our approach that promotes a new physical constraint, in other words, we place a restriction on the amplitude range of the transfer functions rather than assuming that the amplitudes are constant. When there are diffraction, obstacles and reflections in the real-world environment, it is better to assume that transfer function amplitude (derived from the distance to the mouth) varies within a certain range. Our two-microphone experiment shows that the ICA-based noise reduction significantly improves speech recognition performance especially in severe noise conditions.
我们提出了一种具有鲁棒性和计算量轻的频域独立分量分析(ICA)后处理方法,用于手机语音通信中的背景噪声抑制。在我们的场景中,多源信号分离不是目标,降噪是首要目标。这是我们的方法的主要目标,它促进了一种新的物理约束,换句话说,我们对传递函数的振幅范围进行了限制,而不是假设振幅是恒定的。当现实环境中存在衍射、障碍物和反射时,最好假设传递函数振幅(由到口的距离得出)在一定范围内变化。我们的双麦克风实验表明,基于ica的降噪显著提高了语音识别性能,特别是在严重噪声条件下。
{"title":"ICA-based Noise Reduction for Mobile Phone Speech Communication","authors":"Zhipeng Zhang, M. Etoh","doi":"10.1109/ICCCN.2007.4317863","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317863","url":null,"abstract":"We propose a frequency-domain independent component analysis (ICA) with robust and computationally-light post processing method for background noise reduction in mobile phone speech communication. In our scenario, multi-source signal separation is not the target, but noise reduction is the primal one. This primal target characterizes our approach that promotes a new physical constraint, in other words, we place a restriction on the amplitude range of the transfer functions rather than assuming that the amplitudes are constant. When there are diffraction, obstacles and reflections in the real-world environment, it is better to assume that transfer function amplitude (derived from the distance to the mouth) varies within a certain range. Our two-microphone experiment shows that the ICA-based noise reduction significantly improves speech recognition performance especially in severe noise conditions.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Understanding Peer-level Performance in BitTorrent: A Measurement Study 理解BitTorrent中的对等级性能:一项测量研究
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317805
A. Rasti, R. Rejaie
The observed performance by individual peers in BitTorrent can be simply measured by their average download rate. While it is often stated that the observed peer-level performance by BitTorrent clients is high, it is difficult to accurately verify this claim due to the large scale, distributed and dynamic nature of this P2P system. To provide a "representative" characterization of peer-level performance in BitTorrent, the following two important questions should be addressed: (i) What is the distribution of observed performance among participating peers in a torrent? (ii) What are the primary peer-or group-level properties that determine observed performance by individual peers? In this paper, we conduct a measurement study to tackle these two questions. Toward this end, we derive observed performance for nearly all participating peers along with their main peer-and (peer-view of) group-level properties in three different torrents. Our results show that the probability of experiencing certain level of performance has a roughly uniform distribution across the entire range of observed values. Furthermore, while the performance of each peer has the highest correlation with its outgoing bandwidth, there is no dominant peer-and group-level property that primarily determines the observed performance by the majority of peers.
在BitTorrent中观察到的单个同伴的性能可以简单地用他们的平均下载率来衡量。虽然人们经常说,BitTorrent客户端观察到的对等级性能很高,但由于这种P2P系统的大规模、分布式和动态性,很难准确地验证这种说法。为了提供一个“代表性”的BitTorrent对等层性能特征,应该解决以下两个重要问题:(i)在torrent中参与的对等层之间观察到的性能分布是什么?(ii)决定个体同伴观察到的表现的主要的同伴或群体层面的属性是什么?在本文中,我们进行测量研究来解决这两个问题。为此,我们在三个不同的流中得出了几乎所有参与的对等体的观察性能,以及它们的主要对等和(对等观点)组级属性。我们的结果表明,在整个观测值范围内,体验某种性能水平的概率大致均匀分布。此外,虽然每个对等体的性能与其传出带宽具有最高的相关性,但不存在主要决定大多数对等体观察到的性能的主要对等体和组级属性。
{"title":"Understanding Peer-level Performance in BitTorrent: A Measurement Study","authors":"A. Rasti, R. Rejaie","doi":"10.1109/ICCCN.2007.4317805","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317805","url":null,"abstract":"The observed performance by individual peers in BitTorrent can be simply measured by their average download rate. While it is often stated that the observed peer-level performance by BitTorrent clients is high, it is difficult to accurately verify this claim due to the large scale, distributed and dynamic nature of this P2P system. To provide a \"representative\" characterization of peer-level performance in BitTorrent, the following two important questions should be addressed: (i) What is the distribution of observed performance among participating peers in a torrent? (ii) What are the primary peer-or group-level properties that determine observed performance by individual peers? In this paper, we conduct a measurement study to tackle these two questions. Toward this end, we derive observed performance for nearly all participating peers along with their main peer-and (peer-view of) group-level properties in three different torrents. Our results show that the probability of experiencing certain level of performance has a roughly uniform distribution across the entire range of observed values. Furthermore, while the performance of each peer has the highest correlation with its outgoing bandwidth, there is no dominant peer-and group-level property that primarily determines the observed performance by the majority of peers.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114708173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Codesign Prototyping Framework for Wireless LAN Transceivers with Smart Antennas 带智能天线的无线局域网收发器协同设计原型框架
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317950
S. Roy, Jean-François Boudreault, L. Dupont
OFDM Wireless LANs based on the IEEE 802.11 standard are complex systems in themselves. When smart antennas are used in such systems, both the MAC and the PHY layers must be redefined in order to achieve application-specific goals. As a result, the development of such systems can become impressively heavy. A complete development framework is presented here. It makes use of hardware/software codesign in order to implement all required layers to develop a wireless access point. The entire framework is targeted at an FPGA platform, providing full flexibility and processing power for the development of PHY layers.
基于IEEE 802.11标准的OFDM无线局域网本身就是一个复杂的系统。在这样的系统中使用智能天线时,MAC层和物理层都必须重新定义,以实现特定应用的目标。因此,这种系统的开发可能会变得非常繁重。这里给出了一个完整的开发框架。它利用硬件/软件协同设计来实现开发无线接入点所需的所有层。整个框架针对FPGA平台,为物理层的开发提供了充分的灵活性和处理能力。
{"title":"A Codesign Prototyping Framework for Wireless LAN Transceivers with Smart Antennas","authors":"S. Roy, Jean-François Boudreault, L. Dupont","doi":"10.1109/ICCCN.2007.4317950","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317950","url":null,"abstract":"OFDM Wireless LANs based on the IEEE 802.11 standard are complex systems in themselves. When smart antennas are used in such systems, both the MAC and the PHY layers must be redefined in order to achieve application-specific goals. As a result, the development of such systems can become impressively heavy. A complete development framework is presented here. It makes use of hardware/software codesign in order to implement all required layers to develop a wireless access point. The entire framework is targeted at an FPGA platform, providing full flexibility and processing power for the development of PHY layers.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127368532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MAC-ASA: A New MAC Protocol for WMNs MAC- asa:一种新的wmn MAC协议
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317944
R. Santamaria, Olivier Bourdeau, T. Anjali
This paper presents a novel medium access control (MAC) protocol intended to provide multi-hop wireless mesh networks with a higher throughput. The proposed MAC-ASA (medium access control with anticipated scheduling and agreement) protocol uses a modified version of the 802.11 CSMA/CA contention handling procedure integrated with a dynamic (time division multiple access) TDMA-like protocol structure. It combines distributed link scheduling algorithm with power control support for router -router communications with a self agreement protocol for the client -router communications. In addition, the proposed algorithm solves the "exposed node" problem by applying multiple frequencies and time saving policies. These features result in a significant improvement of the throughput in many scenarios. Performance results from an OPNET model are presented in this paper.
本文提出了一种新的介质访问控制(MAC)协议,旨在为多跳无线网状网络提供更高的吞吐量。提议的MAC-ASA(具有预期调度和协议的介质访问控制)协议使用802.11 CSMA/CA争用处理过程的修改版本,并集成了动态(时分多址)tdma类协议结构。它结合了分布式链路调度算法和电源控制支持的路由器-路由器通信和自协议协议的客户端-路由器通信。此外,该算法通过应用多频率和节省时间的策略来解决“暴露节点”问题。在许多场景中,这些特性显著提高了吞吐量。本文给出了一个OPNET模型的性能结果。
{"title":"MAC-ASA: A New MAC Protocol for WMNs","authors":"R. Santamaria, Olivier Bourdeau, T. Anjali","doi":"10.1109/ICCCN.2007.4317944","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317944","url":null,"abstract":"This paper presents a novel medium access control (MAC) protocol intended to provide multi-hop wireless mesh networks with a higher throughput. The proposed MAC-ASA (medium access control with anticipated scheduling and agreement) protocol uses a modified version of the 802.11 CSMA/CA contention handling procedure integrated with a dynamic (time division multiple access) TDMA-like protocol structure. It combines distributed link scheduling algorithm with power control support for router -router communications with a self agreement protocol for the client -router communications. In addition, the proposed algorithm solves the \"exposed node\" problem by applying multiple frequencies and time saving policies. These features result in a significant improvement of the throughput in many scenarios. Performance results from an OPNET model are presented in this paper.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125571336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Bounded-Delay Minimum-Cost Path Problem of Quality-of-Service Routing 服务质量路由的有界延迟最小代价路径问题
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317849
H. K. Dai, Y. Du
A wide range of communication-intensive real-time multimedia applications over networks require guaranteed end- to-end quality of service (QoS). QoS-routing in networks aims to find feasible routes that have sufficient resources to satisfy imposed QoS-constraints. The bounded-delay minimum-cost path problem of QoS-routing is provably difficult; several efficient heuristic algorithms exist for computing feasible solutions to the problem. We design and implement an improved heuristic algorithm for solving the problem, which employs bounded-size buffers for properly maintaining competitive cost-delay combinations for feasible-path extension and offers a better chance to find optimal/quality solutions than the known heuristics. We also prove its correctness of computing feasible solutions in worst-case polynomial-time and -space complexities. Two sets of experimental results via simulations are presented: a tradeoff between the cost/time-performance of the algorithm and buffer size, and a delay/cost/time-performance comparison study.
网络上大量的通信密集型实时多媒体应用需要保证端到端服务质量(QoS)。网络中的qos路由旨在寻找具有足够资源的可行路由,以满足施加的qos约束。证明了qos路由的有界延迟最小代价路径问题是困难的;存在几种有效的启发式算法来计算该问题的可行解。我们设计并实现了一种改进的启发式算法来解决这一问题,该算法采用有限大小的缓冲区来适当地维持可行路径扩展的竞争性成本-延迟组合,并且比已知的启发式算法提供了更好的机会来找到最优/质量的解。并证明了其在最坏情况下计算多项式时间和空间复杂度可行解的正确性。通过仿真给出了两组实验结果:算法的成本/时间性能与缓冲区大小之间的权衡,以及延迟/成本/时间性能的比较研究。
{"title":"On the Bounded-Delay Minimum-Cost Path Problem of Quality-of-Service Routing","authors":"H. K. Dai, Y. Du","doi":"10.1109/ICCCN.2007.4317849","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317849","url":null,"abstract":"A wide range of communication-intensive real-time multimedia applications over networks require guaranteed end- to-end quality of service (QoS). QoS-routing in networks aims to find feasible routes that have sufficient resources to satisfy imposed QoS-constraints. The bounded-delay minimum-cost path problem of QoS-routing is provably difficult; several efficient heuristic algorithms exist for computing feasible solutions to the problem. We design and implement an improved heuristic algorithm for solving the problem, which employs bounded-size buffers for properly maintaining competitive cost-delay combinations for feasible-path extension and offers a better chance to find optimal/quality solutions than the known heuristics. We also prove its correctness of computing feasible solutions in worst-case polynomial-time and -space complexities. Two sets of experimental results via simulations are presented: a tradeoff between the cost/time-performance of the algorithm and buffer size, and a delay/cost/time-performance comparison study.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128130295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MPEG Video Bit-Rate Shaping Technique Using Smooth-Transcoding Algorithm 基于平滑转码算法的MPEG视频比特率整形技术
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317919
I. Nugraha, H. Morita
In this paper we propose an algorithm to adjust the transmission bit-rate of variable-bit-rate (VBR) MPEG video data by using a combination of transcoding and bit-rate smoothing algorithm. The algorithm works by smoothing out the bit-rate of high variance MPEG video data and when necessary transcodes some video frames in order to keep the video transmission bit-rate below a determined threshold value. This technique is useful for a live video streaming application in which an originally high-quality VBR video data for broadband users must also be delivered to other type of users where their allowed bit-rate and its variation is tightly constrained, such as mobile phone users, without sacrificing the quality of video images too much. Quality degradation caused by transcoding can be reduced by the smoothing process, which will make the number of frames required to be transcoded can be much lower than doing transcoding solely. Depending on the threshold value, our experiment results show that the number frames needed to be transcoded can be reduced significantly.
本文提出了一种将转码和比特率平滑算法相结合的方法来调整可变比特率(VBR) MPEG视频数据的传输比特率。该算法通过平滑高方差MPEG视频数据的比特率,并在必要时对一些视频帧进行转码,以保持视频传输比特率低于确定的阈值。该技术对于实时视频流应用程序非常有用,在这种应用程序中,宽带用户的原始高质量VBR视频数据也必须传递给其他类型的用户,这些用户的允许比特率及其变化受到严格限制,例如移动电话用户,而不会过多地牺牲视频图像的质量。平滑处理可以减少由转码引起的质量下降,这将使转码所需的帧数比单独进行转码要少得多。根据阈值,我们的实验结果表明,需要转码的帧数可以显着减少。
{"title":"MPEG Video Bit-Rate Shaping Technique Using Smooth-Transcoding Algorithm","authors":"I. Nugraha, H. Morita","doi":"10.1109/ICCCN.2007.4317919","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317919","url":null,"abstract":"In this paper we propose an algorithm to adjust the transmission bit-rate of variable-bit-rate (VBR) MPEG video data by using a combination of transcoding and bit-rate smoothing algorithm. The algorithm works by smoothing out the bit-rate of high variance MPEG video data and when necessary transcodes some video frames in order to keep the video transmission bit-rate below a determined threshold value. This technique is useful for a live video streaming application in which an originally high-quality VBR video data for broadband users must also be delivered to other type of users where their allowed bit-rate and its variation is tightly constrained, such as mobile phone users, without sacrificing the quality of video images too much. Quality degradation caused by transcoding can be reduced by the smoothing process, which will make the number of frames required to be transcoded can be much lower than doing transcoding solely. Depending on the threshold value, our experiment results show that the number frames needed to be transcoded can be reduced significantly.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121532459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resource Planning and Packet Forwarding for Next-generation Multi-hop Wireless Mesh Networks 下一代多跳无线网状网络的资源规划和分组转发
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317939
Ting-Yu Lin, K. Fan
Most earlier works in the area of wireless mesh network assume a single interface being equipped in each node. In this paper, we consider the next-generation wireless mesh networks in which each node may be equipped with multiple radio interfaces, each capable of running in one of several modes, one of several channels, and each capable of supporting multiple modulations. For example, from off-the-shelf components, one can easily construct a mesh node with multiple IEEE 802.11a/b/g radio interfaces. Our goal is to address the resource planning and packet forwarding issues in such an environment. The proposed methodology is based on linear programming with network flow principles and radio channel access/interference models. Given a network topology, traffic requirements, and gateway capacities, we show how to allocate network interface cards and their channels to fully utilize channel bandwidths. The results can be used by a wireless Internet service provider to plan their networks under a hardware constraint so as to maximize their profits. To the best of our knowledge, this is the first work addressing resource planning in a wireless mesh network. Our numerical results show significant improvement in terms of aggregate network throughput with moderate network-layer fairness.
在无线网状网络领域的早期工作大多假设在每个节点上配置一个单一接口。在本文中,我们考虑下一代无线网状网络,其中每个节点可能配备多个无线电接口,每个接口能够在几种模式中的一种、几种信道中的一种中运行,并且每个接口都能够支持多种调制。例如,从现成的组件中,可以很容易地构建具有多个IEEE 802.11a/b/g无线电接口的网格节点。我们的目标是在这样的环境中解决资源规划和数据包转发问题。所提出的方法是基于线性规划的网络流原理和无线电信道接入/干扰模型。给定网络拓扑结构、流量需求和网关容量,我们将展示如何分配网络接口卡及其通道以充分利用通道带宽。该结果可用于无线互联网服务提供商在硬件约束下规划其网络,从而使其利润最大化。据我们所知,这是第一个在无线网状网络中解决资源规划的工作。我们的数值结果表明,在适度的网络层公平性下,聚合网络吞吐量有了显著的改善。
{"title":"Resource Planning and Packet Forwarding for Next-generation Multi-hop Wireless Mesh Networks","authors":"Ting-Yu Lin, K. Fan","doi":"10.1109/ICCCN.2007.4317939","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317939","url":null,"abstract":"Most earlier works in the area of wireless mesh network assume a single interface being equipped in each node. In this paper, we consider the next-generation wireless mesh networks in which each node may be equipped with multiple radio interfaces, each capable of running in one of several modes, one of several channels, and each capable of supporting multiple modulations. For example, from off-the-shelf components, one can easily construct a mesh node with multiple IEEE 802.11a/b/g radio interfaces. Our goal is to address the resource planning and packet forwarding issues in such an environment. The proposed methodology is based on linear programming with network flow principles and radio channel access/interference models. Given a network topology, traffic requirements, and gateway capacities, we show how to allocate network interface cards and their channels to fully utilize channel bandwidths. The results can be used by a wireless Internet service provider to plan their networks under a hardware constraint so as to maximize their profits. To the best of our knowledge, this is the first work addressing resource planning in a wireless mesh network. Our numerical results show significant improvement in terms of aggregate network throughput with moderate network-layer fairness.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123160455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Heuristic DDoS Flooding Attack Detection Mechanism Analyses based on the Relationship between Input and Output Traffic Volumes 一种基于输入输出流量关系的启发式DDoS flood攻击检测机制分析
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317915
Fengxiang Zhang, S. Abe
Nowadays various kinds of anomalies are prohibiting the widely used Internet from offering normal services. Within them a novel anomaly is caused by bandwidth attacks. To defense these threats many detecting schemes are essentially based on unidirectional checking of traffic changes. When legitimately abrupt changes appear, they might result in false alarms. In this paper we consider the problem from the bidirectional-traffic view and analyze the traffic characteristics by checking the input/output traffic characteristics of the protected network node. We have analyzed the relationship between input and output traffic volume pairs in the simulation traffic and studied them both under normal and abnormal cases. Based on these analyses, we've proposed a heuristic DDoS flooding attack detection method and showed a verifying simulation as well.
如今,各种各样的异常现象使广泛使用的互联网无法提供正常的服务。其中一个新的异常是由带宽攻击引起的。为了防御这些威胁,许多检测方案本质上是基于流量变化的单向检测。当合理的突然变化出现时,它们可能会导致错误警报。本文从双向流量的角度考虑该问题,通过检测受保护网络节点的输入/输出流量特征来分析流量特征。分析了仿真交通中输入和输出流量对之间的关系,并对正常和异常情况下的输入和输出流量对进行了研究。在此基础上,提出了一种启发式DDoS泛洪攻击检测方法,并进行了验证仿真。
{"title":"A Heuristic DDoS Flooding Attack Detection Mechanism Analyses based on the Relationship between Input and Output Traffic Volumes","authors":"Fengxiang Zhang, S. Abe","doi":"10.1109/ICCCN.2007.4317915","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317915","url":null,"abstract":"Nowadays various kinds of anomalies are prohibiting the widely used Internet from offering normal services. Within them a novel anomaly is caused by bandwidth attacks. To defense these threats many detecting schemes are essentially based on unidirectional checking of traffic changes. When legitimately abrupt changes appear, they might result in false alarms. In this paper we consider the problem from the bidirectional-traffic view and analyze the traffic characteristics by checking the input/output traffic characteristics of the protected network node. We have analyzed the relationship between input and output traffic volume pairs in the simulation traffic and studied them both under normal and abnormal cases. Based on these analyses, we've proposed a heuristic DDoS flooding attack detection method and showed a verifying simulation as well.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126466967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2007 16th International Conference on Computer Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1