首页 > 最新文献

2016 19th International Conference on Network-Based Information Systems (NBiS)最新文献

英文 中文
Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering as a New Parameter Actor Congestion Situation 考虑新参数Actor拥塞情况的无线传感器和Actor网络中Actor节点的选择
Donald Elmazi, Evjola Spaho, Elis Kulla, Tetsuya Oda, Makoto Ikeda, L. Barolli
In Wireless Sensor and Actor Networks (WSANs), sensors and actors collaborate together to get the information about the physical environment and perform appropriate actions. In order to provide effective sensing and acting, a distributed local coordination mechanism is necessary among sensors and actors. In this work, we consider the actor node selection problem and we propose a fuzzy-based system that based on data provided by sensors and actors selects an appropriate actor node. We use 4 input parameters. Different from our previous work, we consider also the Congestion Situation (CS) parameter. The output parameter is Actor Selection Decision (ASD). The simulation results show that the proposed system makes a proper selection of actor nodes.
在无线传感器和行动者网络(wsan)中,传感器和行动者相互协作以获取有关物理环境的信息并执行适当的操作。为了提供有效的感知和行为,需要在传感器和行为体之间建立分布式的局部协调机制。在这项工作中,我们考虑了行动者节点的选择问题,我们提出了一个基于模糊的系统,该系统基于传感器和行动者提供的数据选择合适的行动者节点。我们使用4个输入参数。与以往的工作不同,我们还考虑了拥塞情况(CS)参数。输出参数是Actor Selection Decision (ASD)。仿真结果表明,该系统正确选择了活动节点。
{"title":"Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering as a New Parameter Actor Congestion Situation","authors":"Donald Elmazi, Evjola Spaho, Elis Kulla, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1109/NBiS.2016.32","DOIUrl":"https://doi.org/10.1109/NBiS.2016.32","url":null,"abstract":"In Wireless Sensor and Actor Networks (WSANs), sensors and actors collaborate together to get the information about the physical environment and perform appropriate actions. In order to provide effective sensing and acting, a distributed local coordination mechanism is necessary among sensors and actors. In this work, we consider the actor node selection problem and we propose a fuzzy-based system that based on data provided by sensors and actors selects an appropriate actor node. We use 4 input parameters. Different from our previous work, we consider also the Congestion Situation (CS) parameter. The output parameter is Actor Selection Decision (ASD). The simulation results show that the proposed system makes a proper selection of actor nodes.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134422348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Performance Analysis in the One-Way Full Duplex Relaying Network 单向全双工中继网络的性能分析
Tam Nguyen Kieu, Khanh Nhan Nguyen Huu, L. N. Ngoc, H. H. Duy, T. D. Dinh, M. Voznák
Nowadays, the using of redundant energy in the environment and protecting the earth opposing the global climate change is emerged as a urgent measure drawing the majority of people in the world. Among of them, the energy harvesting protocol is a highlight attracting the concerning of many projects as well as the study of many scientists specially in wireless communication field. This paper mentions the energy harvesting structure of the full duplex relaying systems. By employing the time switching based relaying (TSR) protocol and Amplify-and-Forward (AF) model, we advance the closed-form expression of the outage probability and then calculate the optimal throughput. An essential result can be found observably that the noise factor, the time fraction, the target ratio as well as the position of relay in TSR affect on the optimal throughput. After at all, the numerical results imply an effective relaying plan in full duplex cooperation systems.
如今,在环境中利用多余的能源,保护地球,反对全球气候变化,已成为一项紧迫的措施,吸引了世界上大多数人。其中,能量收集协议是众多项目关注的焦点,也是无线通信领域众多科学家研究的热点。本文介绍了全双工继电系统的能量收集结构。采用基于时间交换的中继(TSR)协议和放大转发(AF)模型,提出了中断概率的封闭表达式,并计算出最优吞吐量。结果表明,噪声因子、时间分数、目标比以及继电器在TSR中的位置对最优吞吐量都有影响。结果表明,在全双工协作系统中存在一种有效的中继方案。
{"title":"A Performance Analysis in the One-Way Full Duplex Relaying Network","authors":"Tam Nguyen Kieu, Khanh Nhan Nguyen Huu, L. N. Ngoc, H. H. Duy, T. D. Dinh, M. Voznák","doi":"10.1109/NBIS.2016.62","DOIUrl":"https://doi.org/10.1109/NBIS.2016.62","url":null,"abstract":"Nowadays, the using of redundant energy in the environment and protecting the earth opposing the global climate change is emerged as a urgent measure drawing the majority of people in the world. Among of them, the energy harvesting protocol is a highlight attracting the concerning of many projects as well as the study of many scientists specially in wireless communication field. This paper mentions the energy harvesting structure of the full duplex relaying systems. By employing the time switching based relaying (TSR) protocol and Amplify-and-Forward (AF) model, we advance the closed-form expression of the outage probability and then calculate the optimal throughput. An essential result can be found observably that the noise factor, the time fraction, the target ratio as well as the position of relay in TSR affect on the optimal throughput. After at all, the numerical results imply an effective relaying plan in full duplex cooperation systems.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134004245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Node Security in MANET Clusters: A Comparison Study of Two Fuzzy-Based Systems 提高MANET集群中节点安全性:两种模糊系统的比较研究
Mirjeta Alinci, Takaaki Inaba, Donald Elmazi, Evjola Spaho, Vladi Koliçi, L. Barolli
A Mobile Ad hoc Network (MANET) is a multi-hop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped into clusters to achieve better stability and scalability. Grouping the mobile nodes is called clustering, in which a leader node is elected to manage the entire network. In this paper, first we introduce various approaches for clustering focus on different performance metrics. Then, we show some clustering schemes such as Mobility-based clustering, Energy-efficient clustering, Connectivity-based clustering, Weighted-based clustering. Finally, we present and compare two Fuzzy based systems (called F2SMC1 and F2SMC2) for improving the security of cluster nodes in MANETs. We compare the performance of F2SMC1 and F2SMC2 and show that the F2SMC2 is more complex than F2SMC1, but is more reliable and secure.
移动自组网(MANET)是一种多跳无线网络,其移动节点本质上是动态的,具有有限的带宽和最小的电池电量。由于这种具有挑战性的环境,可以将移动节点分组到集群中,以获得更好的稳定性和可伸缩性。将移动节点分组称为集群,在集群中选出一个领导节点来管理整个网络。在本文中,我们首先介绍针对不同性能指标的各种聚类方法。然后给出了基于移动性的聚类、基于能效的聚类、基于连通性的聚类和基于加权的聚类。最后,我们提出并比较了两种基于模糊的系统(称为F2SMC1和F2SMC2),以提高manet中集群节点的安全性。我们比较了F2SMC1和F2SMC2的性能,结果表明F2SMC2比F2SMC1更复杂,但更可靠和安全。
{"title":"Improving Node Security in MANET Clusters: A Comparison Study of Two Fuzzy-Based Systems","authors":"Mirjeta Alinci, Takaaki Inaba, Donald Elmazi, Evjola Spaho, Vladi Koliçi, L. Barolli","doi":"10.1109/NBiS.2016.40","DOIUrl":"https://doi.org/10.1109/NBiS.2016.40","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a multi-hop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped into clusters to achieve better stability and scalability. Grouping the mobile nodes is called clustering, in which a leader node is elected to manage the entire network. In this paper, first we introduce various approaches for clustering focus on different performance metrics. Then, we show some clustering schemes such as Mobility-based clustering, Energy-efficient clustering, Connectivity-based clustering, Weighted-based clustering. Finally, we present and compare two Fuzzy based systems (called F2SMC1 and F2SMC2) for improving the security of cluster nodes in MANETs. We compare the performance of F2SMC1 and F2SMC2 and show that the F2SMC2 is more complex than F2SMC1, but is more reliable and secure.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129404128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Intrusion Tolerance Scheme for a Cloud of Databases Environment 数据库云环境下的入侵容忍方案
S. Chatti, Habib Ounelli
The serializability of transactions is the most important property that ensure correct processing to transactions. In case of concurrent access to the same data by several transactions, or in case of dependency relationships between running sub transactions. But some transactions has been marked as malicious and they compromise the serialization of running system. For that purpose, we propose an intrusion tolerant scheme to ensure the continuity of the running transactions. A transaction dependency graph is also used by the CDC to make decisions concerning the set of data and transactions that are threatened by a malicious activity. We will give explanations about how to use the proposed scheme to illustrate its behavior and efficiency against a compromised transaction-based in a cloud of databases environment. Several issues should be considered when dealing with the processing of a set of interleaved transactions in a transaction based environment. In most cases, these issues are due to the concurrent access to the same data by several transactions or the dependency relationship between running transactions. The serializability may be affected if a transaction that belongs to the processing node is compromised.
事务的可序列化性是确保正确处理事务的最重要属性。在多个事务并发访问相同数据的情况下,或者在运行的子事务之间存在依赖关系的情况下。但有些事务已被标记为恶意的,它们危及正在运行的系统的序列化。为此,我们提出了一种入侵容忍方案来保证事务运行的连续性。CDC还使用事务依赖关系图来对受到恶意活动威胁的数据集和事务做出决策。我们将解释如何使用提议的方案来说明它的行为和在数据库云环境中基于折衷的事务的效率。在基于事务的环境中处理一组交错的事务时,应该考虑几个问题。在大多数情况下,这些问题是由于多个事务并发访问相同的数据或运行事务之间的依赖关系造成的。如果属于处理节点的事务受到损害,则可序列化性可能受到影响。
{"title":"An Intrusion Tolerance Scheme for a Cloud of Databases Environment","authors":"S. Chatti, Habib Ounelli","doi":"10.1109/NBiS.2016.4","DOIUrl":"https://doi.org/10.1109/NBiS.2016.4","url":null,"abstract":"The serializability of transactions is the most important property that ensure correct processing to transactions. In case of concurrent access to the same data by several transactions, or in case of dependency relationships between running sub transactions. But some transactions has been marked as malicious and they compromise the serialization of running system. For that purpose, we propose an intrusion tolerant scheme to ensure the continuity of the running transactions. A transaction dependency graph is also used by the CDC to make decisions concerning the set of data and transactions that are threatened by a malicious activity. We will give explanations about how to use the proposed scheme to illustrate its behavior and efficiency against a compromised transaction-based in a cloud of databases environment. Several issues should be considered when dealing with the processing of a set of interleaved transactions in a transaction based environment. In most cases, these issues are due to the concurrent access to the same data by several transactions or the dependency relationship between running transactions. The serializability may be affected if a transaction that belongs to the processing node is compromised.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127580578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Three Dimensional Reconstruction from Single Uniform Texture Image with Unknown Lighting Conditions 未知光照条件下单幅均匀纹理图像的三维重建
Yujuan Sun, Qiuming Ma
An effective method has been proposed in this paper to reconstruct the 3D shape from single texture image with similar appearances and reflectance properties. Two main steps are required: the first is the estimation of lighting parameters, which has been estimated by detecting the largest direction of the brightness change, the second is the 3D reconstruction from single input image, which has been reconstructed by combining the patch matching and optimization methods. Experiment results have verified the effectiveness of the proposed method according to realistic perception.
本文提出了一种从具有相似外观和反射特性的单幅纹理图像重构三维形状的有效方法。主要需要两个步骤:首先是照明参数的估计,通过检测亮度变化的最大方向来估计,其次是单输入图像的三维重建,通过结合补丁匹配和优化方法进行重建。实验结果从真实感角度验证了该方法的有效性。
{"title":"Three Dimensional Reconstruction from Single Uniform Texture Image with Unknown Lighting Conditions","authors":"Yujuan Sun, Qiuming Ma","doi":"10.1109/NBiS.2016.29","DOIUrl":"https://doi.org/10.1109/NBiS.2016.29","url":null,"abstract":"An effective method has been proposed in this paper to reconstruct the 3D shape from single texture image with similar appearances and reflectance properties. Two main steps are required: the first is the estimation of lighting parameters, which has been estimated by detecting the largest direction of the brightness change, the second is the 3D reconstruction from single input image, which has been reconstructed by combining the patch matching and optimization methods. Experiment results have verified the effectiveness of the proposed method according to realistic perception.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128595493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Collection and Delivery Method of Contents in Tourism with Location Information 一种基于位置信息的旅游内容采集与传递方法
Go Hirakawa, Ryoichi Nagatsuji, Y. Shibata
Tourism resources are one of the most significant resources in Japan. It is necessary for the continuation of continuous sightseeing industry to utilize the attractive point in an area in which I have such diversity. However, maintenance and management are not accomplished to utilize such contents as a tourist spot. It is hard to the cost and hand's point by a conventional way by a local resource to dig contents with diversity up, manage and report it to a significant person. So we have developed LodeStar Platform, which registers time-spatial information and contents easily for everyone using ICT. LodeStarPlatform makes it possible that a highly motivated resident sends "charm in an area" freely. It is possible to offer collected "charm in" an area according to the visitor's interest including an inbound. In this paper, we introduce the concept, outline, design and implementation of LodeStar Platform, and report the result of a case study using a sample system with LodeStar Platform.
旅游资源是日本最重要的资源之一。在我拥有如此多样性的地区,有必要利用吸引人的点来继续观光产业。但是,作为旅游景点利用这些内容,还没有完成维护和管理。通过传统的方式,由本地资源挖掘出具有多样性的内容,进行管理并报告给一个重要的人,很难达到成本和人手的目的。因此,我们开发了LodeStar平台,利用信息通信技术方便地为每个人登记时空信息和内容。LodeStarPlatform让积极主动的居民可以自由地发送“某个地区的魅力”。有可能根据游客的兴趣提供收集的“魅力”区域,包括入境。在本文中,我们介绍了LodeStar平台的概念、概述、设计和实现,并报告了一个使用LodeStar平台的示例系统的案例研究结果。
{"title":"A Collection and Delivery Method of Contents in Tourism with Location Information","authors":"Go Hirakawa, Ryoichi Nagatsuji, Y. Shibata","doi":"10.1109/NBiS.2016.91","DOIUrl":"https://doi.org/10.1109/NBiS.2016.91","url":null,"abstract":"Tourism resources are one of the most significant resources in Japan. It is necessary for the continuation of continuous sightseeing industry to utilize the attractive point in an area in which I have such diversity. However, maintenance and management are not accomplished to utilize such contents as a tourist spot. It is hard to the cost and hand's point by a conventional way by a local resource to dig contents with diversity up, manage and report it to a significant person. So we have developed LodeStar Platform, which registers time-spatial information and contents easily for everyone using ICT. LodeStarPlatform makes it possible that a highly motivated resident sends \"charm in an area\" freely. It is possible to offer collected \"charm in\" an area according to the visitor's interest including an inbound. In this paper, we introduce the concept, outline, design and implementation of LodeStar Platform, and report the result of a case study using a sample system with LodeStar Platform.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Comparison of Sender-Based and Receiver-Based Scheduling MAC Protocols for Underwater Sensor Networks 水下传感器网络中基于发送端和基于接收端的调度MAC协议性能比较
Faisal Alfouzan, A. Shahrabi, S. Ghoreyshi, T. Boutaleb
Underwater Sensor Network (UWSN) is significantly different from terrestrial network in that acoustic signal is mainly used as the communication medium. The acoustic signal imposes high bit error rate, limited bandwidth and long propagation delay which, to some extent, influences the design of various services in UWSNs. MAC protocol, however, is one of the protocols which has been completely affected by the unique features of underwater environment. For UWSNs, energy-efficiency is now a major concern due to difficulties of replacing or recharging batteries. In order to save energy, most of the proposed MAC protocols follow a pattern of sleeping and listening mode, since the sleep mode energy consumption is much less than that of the idle listening mode. Hence, the energy efficiency is directly dependent upon how the sleeping and listening modes are scheduled at each node. In some protocols, sender-based scheduling, the schedule is specified by the sending nodes, whereas in receiver-based scheduling the receiving nodes decide to schedule data transmission. In this paper, we evaluate the UWAN-MAC, as a sender-based, and R-MAC, as a receiver-based scheduling. Our simulation results show that the receiver-based always performs well in terms of energy consumption for small size networks and under light traffic. However, by increasing the number of nodes or traffic load, the sender-based highly outperforms the receiver-based scheduling protocols in terms of end-to-end delay and throughput.
水下传感器网络(UWSN)主要以声信号作为通信介质,这与地面网络有很大的不同。声信号误码率高、带宽有限、传播延迟长,在一定程度上影响了无线传感器网络中各种业务的设计。而MAC协议是完全受水下环境特殊性影响的协议之一。对于UWSNs来说,由于更换或充电电池的困难,能源效率现在是一个主要问题。为了节省能源,大多数提出的MAC协议都遵循睡眠和侦听模式,因为睡眠模式的能耗远远小于空闲侦听模式的能耗。因此,能源效率直接取决于如何在每个节点调度睡眠和收听模式。在一些协议中,基于发送方的调度由发送方节点指定,而基于接收方的调度由接收方节点决定数据传输的调度。在本文中,我们评估了基于发送端的UWAN-MAC和基于接收端的R-MAC调度。仿真结果表明,在网络规模小、流量小的情况下,基于接收机的网络在能耗方面表现良好。但是,通过增加节点数量或流量负载,基于发送方的调度协议在端到端延迟和吞吐量方面要优于基于接收方的调度协议。
{"title":"Performance Comparison of Sender-Based and Receiver-Based Scheduling MAC Protocols for Underwater Sensor Networks","authors":"Faisal Alfouzan, A. Shahrabi, S. Ghoreyshi, T. Boutaleb","doi":"10.1109/NBiS.2016.3","DOIUrl":"https://doi.org/10.1109/NBiS.2016.3","url":null,"abstract":"Underwater Sensor Network (UWSN) is significantly different from terrestrial network in that acoustic signal is mainly used as the communication medium. The acoustic signal imposes high bit error rate, limited bandwidth and long propagation delay which, to some extent, influences the design of various services in UWSNs. MAC protocol, however, is one of the protocols which has been completely affected by the unique features of underwater environment. For UWSNs, energy-efficiency is now a major concern due to difficulties of replacing or recharging batteries. In order to save energy, most of the proposed MAC protocols follow a pattern of sleeping and listening mode, since the sleep mode energy consumption is much less than that of the idle listening mode. Hence, the energy efficiency is directly dependent upon how the sleeping and listening modes are scheduled at each node. In some protocols, sender-based scheduling, the schedule is specified by the sending nodes, whereas in receiver-based scheduling the receiving nodes decide to schedule data transmission. In this paper, we evaluate the UWAN-MAC, as a sender-based, and R-MAC, as a receiver-based scheduling. Our simulation results show that the receiver-based always performs well in terms of energy consumption for small size networks and under light traffic. However, by increasing the number of nodes or traffic load, the sender-based highly outperforms the receiver-based scheduling protocols in terms of end-to-end delay and throughput.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125322946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance Analysis of WMNs by WMN-GA Simulation System for Different WMN Architectures and TCP Congestion-Avoidance Algorithms Considering Uniform Distribution 基于WMN- ga仿真系统的不同WMN结构和考虑均匀分布的TCP拥塞避免算法的WMN性能分析
Admir Barolli, Tetsuya Oda, I. Shinko, L. Barolli, F. Xhafa, M. Takizawa
In this paper, we evaluate the performance of two Wireless Mesh Networks (WMNs) architectures considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3, Distributed Coordination Function (DCF) and Optimized Link State Routing (OLSR). We compare the performance for Transmission Control Protocol (TCP) Tahoe, Reno and NewReno for uniform distribution of mesh clients by sending multiple Constant Bit Rate (CBR) flows in the network. The simulation results show that for both WMN architectures, the PDR values of TCP congestion-avoidance algorithms are almost the same. For Hybrid WMN architecture, the throughput of TCP Reno is better than other algorithms. However, for I/B WMN, the throughput of TCP Tahoe is higher than other algorithms. The delay and jitter of TCP NewReno are a little bit lower compared with other algorithms. The I/B WMN architecture, the fairness index of TCP congestion-avoidance algorithms is almost the same.
在本文中,我们评估了两种无线网状网络(WMNs)体系结构的性能考虑吞吐量,延迟,抖动和公平性指标指标。为了进行仿真,我们使用了ns-3、分布式协调函数(DCF)和优化链路状态路由(OLSR)。通过在网络中发送多个恒定比特率(CBR)流,比较了传输控制协议(TCP) Tahoe、Reno和NewReno在网格客户端均匀分布方面的性能。仿真结果表明,在两种WMN体系结构下,TCP拥塞避免算法的PDR值基本相同。在混合WMN架构下,TCP Reno算法的吞吐量优于其他算法。但是,对于I/B WMN, TCP Tahoe的吞吐量高于其他算法。与其他算法相比,TCP NewReno的延迟和抖动都稍低。在I/B WMN架构下,TCP拥塞避免算法的公平性指数基本相同。
{"title":"Performance Analysis of WMNs by WMN-GA Simulation System for Different WMN Architectures and TCP Congestion-Avoidance Algorithms Considering Uniform Distribution","authors":"Admir Barolli, Tetsuya Oda, I. Shinko, L. Barolli, F. Xhafa, M. Takizawa","doi":"10.1109/NBiS.2016.18","DOIUrl":"https://doi.org/10.1109/NBiS.2016.18","url":null,"abstract":"In this paper, we evaluate the performance of two Wireless Mesh Networks (WMNs) architectures considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3, Distributed Coordination Function (DCF) and Optimized Link State Routing (OLSR). We compare the performance for Transmission Control Protocol (TCP) Tahoe, Reno and NewReno for uniform distribution of mesh clients by sending multiple Constant Bit Rate (CBR) flows in the network. The simulation results show that for both WMN architectures, the PDR values of TCP congestion-avoidance algorithms are almost the same. For Hybrid WMN architecture, the throughput of TCP Reno is better than other algorithms. However, for I/B WMN, the throughput of TCP Tahoe is higher than other algorithms. The delay and jitter of TCP NewReno are a little bit lower compared with other algorithms. The I/B WMN architecture, the fairness index of TCP congestion-avoidance algorithms is almost the same.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Peer-to-Peer Network System and Application Design on Multiple Virtual Networks 多虚拟网络中的点对点网络系统及应用设计
Nanami Imada, Kazunori Ueda
The increase in network traffic has recently become a problem. Therefore, we attempt to solve it using peer-to-peer (P2P) technology. This research proposes a system design to reduce the traffic of P2P applications by switching between multiple overlay networks according to content ratings. The multiple overlay networks are constructed as virtual networks on physical networks using Software-Defined Networking (SDN) techniques. The overlay networks are mapped into slices of SDN, and the proposed system switches between multiple slices according to the content rating. Two slices are used in the prototype of the proposed system. One of the slices is an overlay network based on the network distance, and the other is an overlay network based on content trends. The network distance-based slice is constructed by clustering based on Round Trip Time (RTT). When a peer searches for content, a region of the content search is expanded little by little. The peer can then receive the content from a peer close to it in terms of network distance. The content trend-based slice is constructed according to contents of each node. Specifically, nodes that have similar content are close to each other. As a result, peers can obtain content by minimizing the number of hops when any node obtains that content. The prototype of the proposed system will be demonstrated and experiments will be performed in a testbed specialized for P2P agent platforms. In the demonstration and experiments, the slices will be implemented as conventional overlay networks.
网络流量的增加最近已经成为一个问题。因此,我们尝试使用点对点(P2P)技术来解决这个问题。本研究提出一种根据内容分级在多个覆盖网络间切换以减少P2P应用流量的系统设计。采用软件定义网络(SDN)技术将多个覆盖网络构建为物理网络上的虚拟网络。将覆盖网络映射成SDN的切片,并根据内容等级在多个切片之间切换。在提出的系统原型中使用了两个切片。其中一个切片是基于网络距离的覆盖网络,另一个是基于内容趋势的覆盖网络。基于网络距离的切片是通过基于往返时间(RTT)的聚类构造的。当对等体搜索内容时,内容搜索的区域会逐渐扩大。然后,对等体可以从网络距离较近的对等体接收内容。根据每个节点的内容构造基于内容趋势的切片。具体来说,具有相似内容的节点彼此接近。因此,当任何节点获得内容时,对等体可以通过最小化跳数来获取内容。提出的系统的原型将被展示,实验将在一个专门用于P2P代理平台的测试平台上进行。在演示和实验中,切片将作为传统的覆盖网络实现。
{"title":"Peer-to-Peer Network System and Application Design on Multiple Virtual Networks","authors":"Nanami Imada, Kazunori Ueda","doi":"10.1109/NBiS.2016.66","DOIUrl":"https://doi.org/10.1109/NBiS.2016.66","url":null,"abstract":"The increase in network traffic has recently become a problem. Therefore, we attempt to solve it using peer-to-peer (P2P) technology. This research proposes a system design to reduce the traffic of P2P applications by switching between multiple overlay networks according to content ratings. The multiple overlay networks are constructed as virtual networks on physical networks using Software-Defined Networking (SDN) techniques. The overlay networks are mapped into slices of SDN, and the proposed system switches between multiple slices according to the content rating. Two slices are used in the prototype of the proposed system. One of the slices is an overlay network based on the network distance, and the other is an overlay network based on content trends. The network distance-based slice is constructed by clustering based on Round Trip Time (RTT). When a peer searches for content, a region of the content search is expanded little by little. The peer can then receive the content from a peer close to it in terms of network distance. The content trend-based slice is constructed according to contents of each node. Specifically, nodes that have similar content are close to each other. As a result, peers can obtain content by minimizing the number of hops when any node obtains that content. The prototype of the proposed system will be demonstrated and experiments will be performed in a testbed specialized for P2P agent platforms. In the demonstration and experiments, the slices will be implemented as conventional overlay networks.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126296729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-Time Web-Cast System for Classes in the BYOD Style BYOD风格的实时网络直播系统
Daiki Ito, Michitoshi Niibori, M. Kamada
A real-time web-cast system for classes in the BYOD (Bring Your Own Device) style is presented. The teacher starts up our server application software to keep capturing the screens and the voices. The student PCs will be organized in the shape of a binary tree in the following steps. Each student lets his browser connect to the teacher's PC with its FQDN or IP address. The first comer becomes the root that receives screen images and voices directly from the teacher's PC by the WebSocket protocol. Two browsers newly coming in become child nodes of the root or an existing leaf node from which they receive screens and voices by the WebRTC protocol. It is advantageous especially for the classes in the BYOD style because no students are required to install anything other than a browser into the PCs in advance. It is even possible to host students outside the classroom since the teacher's voices are delivered to their PCs.
提出了一个BYOD (Bring Your Own Device)风格的实时网络直播系统。老师启动了我们的服务器应用软件,不断捕捉屏幕和声音。在接下来的步骤中,学生pc将被组织成二叉树的形状。每个学生让他的浏览器用FQDN或IP地址连接到老师的电脑上。第一个角成为根,通过WebSocket协议直接从教师的PC接收屏幕图像和声音。新进入的两个浏览器成为根节点或现有叶节点的子节点,它们通过WebRTC协议从中接收屏幕和声音。这对BYOD风格的课程尤其有利,因为学生不需要事先在电脑上安装除浏览器以外的任何东西。由于教师的声音被传送到学生的电脑上,因此甚至可以在教室外接待学生。
{"title":"A Real-Time Web-Cast System for Classes in the BYOD Style","authors":"Daiki Ito, Michitoshi Niibori, M. Kamada","doi":"10.1109/NBiS.2016.33","DOIUrl":"https://doi.org/10.1109/NBiS.2016.33","url":null,"abstract":"A real-time web-cast system for classes in the BYOD (Bring Your Own Device) style is presented. The teacher starts up our server application software to keep capturing the screens and the voices. The student PCs will be organized in the shape of a binary tree in the following steps. Each student lets his browser connect to the teacher's PC with its FQDN or IP address. The first comer becomes the root that receives screen images and voices directly from the teacher's PC by the WebSocket protocol. Two browsers newly coming in become child nodes of the root or an existing leaf node from which they receive screens and voices by the WebRTC protocol. It is advantageous especially for the classes in the BYOD style because no students are required to install anything other than a browser into the PCs in advance. It is even possible to host students outside the classroom since the teacher's voices are delivered to their PCs.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126809865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2016 19th International Conference on Network-Based Information Systems (NBiS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1