首页 > 最新文献

2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

英文 中文
Cloud model for service selection 用于服务选择的云模型
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928896
Shangguang Wang, Zibin Zheng, Qibo Sun, Hua Zou, Fangchun Yang
Cloud computing is Internet-based computing where computing resources are offered over the Internet as scalable, on-demand services. Web services are widely employed for building distributed cloud applications. Performance of web services may fluctuate due to the dynamic Internet environment, which makes the Quality-of-Service (QoS) inherently uncertain. With the increase of Web services in the Internet, selecting the optimal service from a set of functionally equivalent candidates becomes an important research problem. In this paper, we propose an efficient and effective QoS-aware service selection approach. Our approach first employs cloud model to compute the QoS uncertainty for pruning redundant services while extracting reliable services. Then, mixed integer programming is used to select optimal services. The experimental results show that our approach can provide reliable and efficient optimal service selection for users.
云计算是基于互联网的计算,其中计算资源作为可扩展的按需服务在互联网上提供。Web服务被广泛用于构建分布式云应用程序。由于Internet环境的动态变化,web服务的性能可能会出现波动,这使得服务质量(QoS)具有固有的不确定性。随着Internet中Web服务的增加,从一组功能等效的候选服务中选择最优服务成为一个重要的研究问题。本文提出了一种高效的qos感知服务选择方法。该方法首先利用云模型计算QoS的不确定性,在提取可靠服务的同时剔除冗余服务。然后,采用混合整数规划方法选择最优服务。实验结果表明,该方法可以为用户提供可靠、高效的最优服务选择。
{"title":"Cloud model for service selection","authors":"Shangguang Wang, Zibin Zheng, Qibo Sun, Hua Zou, Fangchun Yang","doi":"10.1109/INFCOMW.2011.5928896","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928896","url":null,"abstract":"Cloud computing is Internet-based computing where computing resources are offered over the Internet as scalable, on-demand services. Web services are widely employed for building distributed cloud applications. Performance of web services may fluctuate due to the dynamic Internet environment, which makes the Quality-of-Service (QoS) inherently uncertain. With the increase of Web services in the Internet, selecting the optimal service from a set of functionally equivalent candidates becomes an important research problem. In this paper, we propose an efficient and effective QoS-aware service selection approach. Our approach first employs cloud model to compute the QoS uncertainty for pruning redundant services while extracting reliable services. Then, mixed integer programming is used to select optimal services. The experimental results show that our approach can provide reliable and efficient optimal service selection for users.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"9 Suppl 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116797599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
Browsing behavior mimicking attacks on popular web sites for large botnets 浏览行为模仿攻击流行网站的大型僵尸网络
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928949
Shui Yu, Guofeng Zhao, Song Guo, Yang Xiang, A. Vasilakos
With the significant growth of botnets, application layer DDoS attacks are much easier to launch using large botnet, and false negative is always a problem for intrusion detection systems in real practice. In this paper, we propose a novel application layer DDoS attack tool, which mimics human browsing behavior following three statistical distributions, the Zipf-like distribution for web page popularity, the Pareto distribution for page request time interval for an individual browser, and the inverse Gaussian distribution for length of browsing path. A Markov model is established for individual bot to generate attack request traffic. Our experiments indicated that the attack traffic that generated by the proposed tool is pretty similar to the real traffic. As a result, the current statistics based detection algorithms will result high false negative rate in general. In order to counter this kind of attacks, we discussed a few preliminary solutions at the end of this paper.
随着僵尸网络数量的显著增长,利用大型僵尸网络发动应用层DDoS攻击变得更加容易,在实际应用中,误报一直是入侵检测系统面临的难题。在本文中,我们提出了一种新的应用层DDoS攻击工具,它模仿人类浏览行为遵循三种统计分布,网页流行度的zipf分布,单个浏览器页面请求时间间隔的Pareto分布,以及浏览路径长度的逆高斯分布。建立了单个机器人生成攻击请求流量的马尔可夫模型。实验表明,该工具生成的攻击流量与真实流量非常接近。因此,目前基于统计的检测算法通常会导致较高的假阴性率。为了对抗这种攻击,我们在文章的最后讨论了一些初步的解决方案。
{"title":"Browsing behavior mimicking attacks on popular web sites for large botnets","authors":"Shui Yu, Guofeng Zhao, Song Guo, Yang Xiang, A. Vasilakos","doi":"10.1109/INFCOMW.2011.5928949","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928949","url":null,"abstract":"With the significant growth of botnets, application layer DDoS attacks are much easier to launch using large botnet, and false negative is always a problem for intrusion detection systems in real practice. In this paper, we propose a novel application layer DDoS attack tool, which mimics human browsing behavior following three statistical distributions, the Zipf-like distribution for web page popularity, the Pareto distribution for page request time interval for an individual browser, and the inverse Gaussian distribution for length of browsing path. A Markov model is established for individual bot to generate attack request traffic. Our experiments indicated that the attack traffic that generated by the proposed tool is pretty similar to the real traffic. As a result, the current statistics based detection algorithms will result high false negative rate in general. In order to counter this kind of attacks, we discussed a few preliminary solutions at the end of this paper.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114832020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Statistical traffic control for cognitive radio empowered LTE-Advanced with network MIMO 认知无线电的统计流量控制使LTE-Advanced具有网络MIMO功能
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928923
Shao-Yu Lien, Kwang-Cheng Chen
Deploying 3GPP LTE-Advanced to the ISM band resolves the deployment issue of obtaining feasible bandwidth from crowded spectrum. However, considering that wireless local area networks (WLANs) have been deployed to the ISM band, recent researches show that LTE-Advanced needs to provide communication opportunities for WLANs. Such a coexistence relies on applying the cognitive radio technology to LTE-Advanced. However, the cognitive channel access leading to severe channel availability variation obstructs quality-of-service (QoS) guarantees in LTE-Advanced. To alleviate channel availability variation, we adopt a powerful technology known as the network multiple-input-multiple-output (MIMO) and propose the statistical traffic control scheme comprising the packet transmission scheduling and the admission control for LTE-Advanced to tackle critical challenges of the packet transmission coordination and the radio resources allocation in the network MIMO. Simulations results demonstrate an effective support of voice and video transmissions, thus enabling a successful coexistence with WLANs.
将3GPP LTE-Advanced部署到ISM频段,解决了在拥挤频谱中获取可行带宽的部署问题。然而,考虑到无线局域网(wlan)已经部署到ISM频段,最近的研究表明,LTE-Advanced需要为wlan提供通信机会。这种共存依赖于将认知无线电技术应用于LTE-Advanced。然而,认知信道接入导致严重的信道可用性变化,阻碍了LTE-Advanced的服务质量(QoS)保证。为了缓解信道可用性的变化,我们采用了一种强大的网络多输入多输出(MIMO)技术,提出了包含分组传输调度和LTE-Advanced接纳控制的统计流量控制方案,以解决网络多输入多输出中分组传输协调和无线电资源分配的关键挑战。仿真结果表明,该系统能够有效地支持语音和视频传输,从而实现与无线局域网的成功共存。
{"title":"Statistical traffic control for cognitive radio empowered LTE-Advanced with network MIMO","authors":"Shao-Yu Lien, Kwang-Cheng Chen","doi":"10.1109/INFCOMW.2011.5928923","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928923","url":null,"abstract":"Deploying 3GPP LTE-Advanced to the ISM band resolves the deployment issue of obtaining feasible bandwidth from crowded spectrum. However, considering that wireless local area networks (WLANs) have been deployed to the ISM band, recent researches show that LTE-Advanced needs to provide communication opportunities for WLANs. Such a coexistence relies on applying the cognitive radio technology to LTE-Advanced. However, the cognitive channel access leading to severe channel availability variation obstructs quality-of-service (QoS) guarantees in LTE-Advanced. To alleviate channel availability variation, we adopt a powerful technology known as the network multiple-input-multiple-output (MIMO) and propose the statistical traffic control scheme comprising the packet transmission scheduling and the admission control for LTE-Advanced to tackle critical challenges of the packet transmission coordination and the radio resources allocation in the network MIMO. Simulations results demonstrate an effective support of voice and video transmissions, thus enabling a successful coexistence with WLANs.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127589074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
ENERsip: M2M-based platform to enable energy efficiency within energy-positive neighbourhoods ENERsip:基于2m的平台,在能源积极的社区内提高能源效率
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928812
G. López, Pedro S. Moura, J. I. Moreno, A. D. de Almeida
This paper presents the main features of the EU R&D project ENERsip. The main objective of this FP7 ICT project is to design, develop, and test an adaptive service-oriented M2M-based platform that enables optimizing, in near real-time, and saving energy by remotely monitoring, controlling and coordinating power generation and consumption within neighborhoods with energy-positive buildings. The paper describes the system architecture designed to meet such requirements, putting special emphasis on the M2M communication infrastructure. The novel services that will be delivered on top of such M2M communication infrastructure and the potential users who will enjoy them are also presented. Finally, the ENERsip platform validation plan is outlined.
本文介绍了欧盟研发项目ENERsip的主要特点。该FP7 ICT项目的主要目标是设计、开发和测试一个自适应的面向服务的m2m平台,通过远程监测、控制和协调具有节能建筑的社区内的发电和消费,实现近乎实时的优化和节能。本文介绍了为满足这一需求而设计的系统架构,重点介绍了M2M通信基础设施。将在M2M通信基础设施之上提供的新服务以及将享受这些服务的潜在用户也将被介绍。最后,概述了ENERsip平台验证计划。
{"title":"ENERsip: M2M-based platform to enable energy efficiency within energy-positive neighbourhoods","authors":"G. López, Pedro S. Moura, J. I. Moreno, A. D. de Almeida","doi":"10.1109/INFCOMW.2011.5928812","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928812","url":null,"abstract":"This paper presents the main features of the EU R&D project ENERsip. The main objective of this FP7 ICT project is to design, develop, and test an adaptive service-oriented M2M-based platform that enables optimizing, in near real-time, and saving energy by remotely monitoring, controlling and coordinating power generation and consumption within neighborhoods with energy-positive buildings. The paper describes the system architecture designed to meet such requirements, putting special emphasis on the M2M communication infrastructure. The novel services that will be delivered on top of such M2M communication infrastructure and the potential users who will enjoy them are also presented. Finally, the ENERsip platform validation plan is outlined.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125600806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Ethernet burst transport for next generation optical metro networks 下一代光城域网络的以太网突发传输
Pub Date : 2011-04-10 DOI: 10.1109/infcomw.2011.5928798
A. Germoni, P. Testa, R. Sabella, M. Listanti
The main requirement for the Next Generation Transport Network infrastructure is a flexible and efficient support of different services, demanding for several levels of Quality of Service (QoS) and resilience. In order to have an effective utilization of network resources, and the ability to react to traffic demand changes with time, such multi-service next generation transport networks, should be, to some extend, self-adapting. This requirement are pushing the migration from the traditional legacy circuit based transport networks towards integrated packet optical solutions. The need to introduce packet flexibility into the optics world relying on huge and reliable static pipes, without impacting the scalability of the nodes has lead to multilayer solutions such as current MSPP and POTP platforms based on multiple switching layers (i.e. packet, OTN and optical). This however requires complex control plane functionalities that limit their effectiveness and flexibility. This paper presents a new approach for next generation optical packet transport, based on a pure Layer 2 switching, that is Ethernet compliant since it does not require changes in Ethernet frame format and main Ethernet switch functionalities. It relies on a burst transmission structure that allows to reduce packet processing without introducing underlaid switching layers and consequently to scale switch forwarding functionalities. It could be regarded as a concrete step towards the realization of self-adapting networks. Some relevant simulation results are reported to discuss the main characteristics of such a new transport solution and assess the feasibility of the concept.
下一代传输网络基础设施的主要需求是灵活有效地支持不同的业务,需要多个级别的服务质量(QoS)和弹性。为了有效地利用网络资源,并对随时间变化的流量需求作出反应,这种多业务下一代传输网络应该在一定程度上具有自适应能力。这种需求正在推动从传统的基于电路的传输网络向集成分组光解决方案的迁移。由于需要在不影响节点可扩展性的情况下,依靠庞大而可靠的静态管道将数据包灵活性引入光学世界,因此导致了多层解决方案,例如当前基于多个交换层(即分组、OTN和光学)的MSPP和POTP平台。然而,这需要复杂的控制平面功能,限制了它们的有效性和灵活性。本文提出了一种基于纯第2层交换的下一代光分组传输新方法,该方法与以太网兼容,因为它不需要改变以太网帧格式和主要以太网交换机功能。它依赖于突发传输结构,该结构允许在不引入底层交换层的情况下减少数据包处理,从而扩展交换机转发功能。这可以看作是实现自适应网络的一个具体步骤。本文报道了一些相关的仿真结果,讨论了这种新型运输方案的主要特点,并评估了该概念的可行性。
{"title":"Ethernet burst transport for next generation optical metro networks","authors":"A. Germoni, P. Testa, R. Sabella, M. Listanti","doi":"10.1109/infcomw.2011.5928798","DOIUrl":"https://doi.org/10.1109/infcomw.2011.5928798","url":null,"abstract":"The main requirement for the Next Generation Transport Network infrastructure is a flexible and efficient support of different services, demanding for several levels of Quality of Service (QoS) and resilience. In order to have an effective utilization of network resources, and the ability to react to traffic demand changes with time, such multi-service next generation transport networks, should be, to some extend, self-adapting. This requirement are pushing the migration from the traditional legacy circuit based transport networks towards integrated packet optical solutions. The need to introduce packet flexibility into the optics world relying on huge and reliable static pipes, without impacting the scalability of the nodes has lead to multilayer solutions such as current MSPP and POTP platforms based on multiple switching layers (i.e. packet, OTN and optical). This however requires complex control plane functionalities that limit their effectiveness and flexibility. This paper presents a new approach for next generation optical packet transport, based on a pure Layer 2 switching, that is Ethernet compliant since it does not require changes in Ethernet frame format and main Ethernet switch functionalities. It relies on a burst transmission structure that allows to reduce packet processing without introducing underlaid switching layers and consequently to scale switch forwarding functionalities. It could be regarded as a concrete step towards the realization of self-adapting networks. Some relevant simulation results are reported to discuss the main characteristics of such a new transport solution and assess the feasibility of the concept.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast and scalable method for resolving anomalies in firewall policies 快速、可扩展的解决防火墙策略异常的方法
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928927
Hassan Gobjuka, Kamal A. Ahmat
In this paper, we investigate the problem of improving the performance and scalability of large firewall policies that comprise thousands of rules by detecting and resolving any potential conflicts among them. We present a novel, highly scalable data structure that requires O(n) space where n is the number of rules in the policy to represent the dependency among rules. After that, we describe a practical heuristic that utilizes our data structure to find conflicting rules, and consequently find an optimal ordering of consistent ones. Our algorithm has time complexity O(n2 log n), making it the fastest to-date known algorithm for firewall rule anomaly dis- covery and resolution. We validate the practicality of our algorithm through real-life firewall policies and synthetic firewall policies of large data. Performance results show that our heuristic algorithm achieves from 40% to 87% improvement in the number of comparisons overhead, comparatively with the original policies.
在本文中,我们研究了通过检测和解决包含数千条规则的大型防火墙策略之间的任何潜在冲突来提高其性能和可扩展性的问题。我们提出了一种新颖的、高度可扩展的数据结构,它需要O(n)空间,其中n是策略中表示规则之间依赖关系的规则的数量。之后,我们描述了一个实用的启发式,它利用我们的数据结构来发现冲突的规则,从而找到一致规则的最佳排序。该算法的时间复杂度为O(n2 log n),是目前已知的最快的防火墙规则异常发现和解决算法。通过实际防火墙策略和大数据综合防火墙策略验证了算法的实用性。性能结果表明,与原始策略相比,我们的启发式算法在比较开销数量上实现了40%到87%的改进。
{"title":"Fast and scalable method for resolving anomalies in firewall policies","authors":"Hassan Gobjuka, Kamal A. Ahmat","doi":"10.1109/INFCOMW.2011.5928927","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928927","url":null,"abstract":"In this paper, we investigate the problem of improving the performance and scalability of large firewall policies that comprise thousands of rules by detecting and resolving any potential conflicts among them. We present a novel, highly scalable data structure that requires O(n) space where n is the number of rules in the policy to represent the dependency among rules. After that, we describe a practical heuristic that utilizes our data structure to find conflicting rules, and consequently find an optimal ordering of consistent ones. Our algorithm has time complexity O(n2 log n), making it the fastest to-date known algorithm for firewall rule anomaly dis- covery and resolution. We validate the practicality of our algorithm through real-life firewall policies and synthetic firewall policies of large data. Performance results show that our heuristic algorithm achieves from 40% to 87% improvement in the number of comparisons overhead, comparatively with the original policies.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"16 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Optimal node hardware module planning for layer-one Optical Transport Networks 一层光传输网络节点硬件模块优化规划
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928799
G. Shen, Limei Peng, Yunfeng Shen, H. Sardesai
Most of the studies on traffic grooming focus on minimizing network link capacity and providing serving-relationship between client services and link capacity. Subsequent to this step, it is important to plan for adding/dropping client services over client service ports and setting up end-to-end lightpaths over network ports, which is however seldom investigated. We call such effort node hardware module planning. This is an industrially practical problem aiming to minimize node hardware cost since hardware modules are the most expensive components in a network. Based on a link-based traffic grooming result that provides information on end-to-end capacity units incident to nodes and aggregation relationship between client services and capacity units, we develop an Integer Linear Programming (ILP) model to optimally plan hardware modules. To overcome the computation difficulty of the ILP model under large-sized planning scenarios, we also develop a fast sub-optimal heuristic for hardware module planning. Simulation studies indicate that the heuristic is efficient to achieve a design close to an optimal solution obtained by the ILP model. Also, the evaluation of the impact of switch backplane size shows that given a certain set of network modules, an optimal switch backplane size exists, which achieves the lowest hardware cost.
流量疏导的研究大多集中在最小化网络链路容量和提供客户服务与链路容量之间的服务关系。在此步骤之后,重要的是计划在客户端服务端口上添加/删除客户端服务,并在网络端口上设置端到端光路,然而很少调查。我们称这种努力为节点硬件模块规划。由于硬件模块是网络中最昂贵的组件,因此这是一个工业上的实际问题,其目的是最小化节点硬件成本。基于基于链路的流量梳理结果,提供了节点事件的端到端容量单元以及客户端服务和容量单元之间的聚合关系的信息,我们开发了一个整数线性规划(ILP)模型来优化规划硬件模块。为了克服ILP模型在大规模规划场景下的计算困难,我们还开发了一种快速的次优启发式硬件模块规划方法。仿真研究表明,启发式算法可以有效地实现接近于由ILP模型得到的最优解的设计。同时,对交换背板尺寸影响的评估表明,给定一组网络模块,存在一个最优交换背板尺寸,使硬件成本最低。
{"title":"Optimal node hardware module planning for layer-one Optical Transport Networks","authors":"G. Shen, Limei Peng, Yunfeng Shen, H. Sardesai","doi":"10.1109/INFCOMW.2011.5928799","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928799","url":null,"abstract":"Most of the studies on traffic grooming focus on minimizing network link capacity and providing serving-relationship between client services and link capacity. Subsequent to this step, it is important to plan for adding/dropping client services over client service ports and setting up end-to-end lightpaths over network ports, which is however seldom investigated. We call such effort node hardware module planning. This is an industrially practical problem aiming to minimize node hardware cost since hardware modules are the most expensive components in a network. Based on a link-based traffic grooming result that provides information on end-to-end capacity units incident to nodes and aggregation relationship between client services and capacity units, we develop an Integer Linear Programming (ILP) model to optimally plan hardware modules. To overcome the computation difficulty of the ILP model under large-sized planning scenarios, we also develop a fast sub-optimal heuristic for hardware module planning. Simulation studies indicate that the heuristic is efficient to achieve a design close to an optimal solution obtained by the ILP model. Also, the evaluation of the impact of switch backplane size shows that given a certain set of network modules, an optimal switch backplane size exists, which achieves the lowest hardware cost.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123476524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A three-dimensional approach towards measuring sender anonymity 测量发送者匿名性的三维方法
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928958
Neeraj Jaggi, Umesh MarappaReddy, R. Bagai
We first illustrate using examples that existing measures in literature are not sufficient to fully characterize the anonymity provided by an anonymous system. We then propose a new isolation measure, based upon presence of outliers in a distribution, and show that this measure is critical towards quantifying the overall anonymity provided by the system. We provide justification for three distinct aspects of anonymity, important from the perspectives of a user, a system designer, and an attacker, leading to a three-dimensional approach towards measuring sender anonymity. We further show how two anonymous systems can be compared in terms of the degree of anonymity provided, using the proposed 3-tuple metric and appropriate weights reflecting the attributes desired in the system. Finally, we apply the proposed metric to an existing anonymous system and discuss the insights gained.
我们首先用实例说明,文献中的现有措施不足以完全表征匿名系统提供的匿名性。然后,我们提出了一种新的隔离措施,基于分布中异常值的存在,并表明该措施对量化系统提供的总体匿名性至关重要。我们为匿名的三个不同方面提供了理由,从用户、系统设计者和攻击者的角度来看,这三个方面很重要,从而导致了测量发送者匿名性的三维方法。我们进一步展示了如何根据所提供的匿名程度来比较两个匿名系统,使用建议的3元组度量和反映系统所需属性的适当权重。最后,我们将提出的度量应用于现有的匿名系统,并讨论了所获得的见解。
{"title":"A three-dimensional approach towards measuring sender anonymity","authors":"Neeraj Jaggi, Umesh MarappaReddy, R. Bagai","doi":"10.1109/INFCOMW.2011.5928958","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928958","url":null,"abstract":"We first illustrate using examples that existing measures in literature are not sufficient to fully characterize the anonymity provided by an anonymous system. We then propose a new isolation measure, based upon presence of outliers in a distribution, and show that this measure is critical towards quantifying the overall anonymity provided by the system. We provide justification for three distinct aspects of anonymity, important from the perspectives of a user, a system designer, and an attacker, leading to a three-dimensional approach towards measuring sender anonymity. We further show how two anonymous systems can be compared in terms of the degree of anonymity provided, using the proposed 3-tuple metric and appropriate weights reflecting the attributes desired in the system. Finally, we apply the proposed metric to an existing anonymous system and discuss the insights gained.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121827070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Addressing by beacon coordinates using molecular communication 利用分子通信通过信标坐标寻址
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928856
M. Moore, T. Nakano
A transmitter nanomachine performs molecular communication to transmit information to a receiver nanomachine using molecules (e.g. calcium ions, DNA) as the transmission medium. Existing approaches use the type of molecule to address receivers within a local broadcast area. In the proposed system, molecular beacons provide distance measurements using molecular communication to establish a coordinate system (e.g. molecular beacons form a concentration gradient using a few types of beacon molecules). Transmitters then address a receiver at a location by the distance from the receiver to each beacon. A transmitter communicates by encapsulating information into a molecular device capable of active transport and distance measurement (e.g. a bacterium performs chemotaxis to a location with the corresponding concentrations of each type of beacon molecule). This paper describes a model of the proposed system, simulation model for the example of bacterial chemotaxis, and measurement of success rate and delay.
发射纳米机器使用分子(如钙离子、DNA)作为传输介质进行分子通信,将信息传递给接收纳米机器。现有的方法使用这种分子类型来定位本地广播区域内的接收器。在提出的系统中,分子信标利用分子通信提供距离测量,以建立坐标系(例如,分子信标使用几种类型的信标分子形成浓度梯度)。然后发射机根据接收器到每个信标的距离在一个位置给接收器寻址。发射器通过将信息封装到能够主动传输和距离测量的分子装置中进行通信(例如,细菌对具有相应浓度的每种信标分子的位置进行趋化)。本文描述了该系统的一个模型,细菌趋化性的模拟模型,以及成功率和延迟的测量。
{"title":"Addressing by beacon coordinates using molecular communication","authors":"M. Moore, T. Nakano","doi":"10.1109/INFCOMW.2011.5928856","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928856","url":null,"abstract":"A transmitter nanomachine performs molecular communication to transmit information to a receiver nanomachine using molecules (e.g. calcium ions, DNA) as the transmission medium. Existing approaches use the type of molecule to address receivers within a local broadcast area. In the proposed system, molecular beacons provide distance measurements using molecular communication to establish a coordinate system (e.g. molecular beacons form a concentration gradient using a few types of beacon molecules). Transmitters then address a receiver at a location by the distance from the receiver to each beacon. A transmitter communicates by encapsulating information into a molecular device capable of active transport and distance measurement (e.g. a bacterium performs chemotaxis to a location with the corresponding concentrations of each type of beacon molecule). This paper describes a model of the proposed system, simulation model for the example of bacterial chemotaxis, and measurement of success rate and delay.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123552687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reducing data collection latency in Wireless sensor networks with mobile elements 减少具有移动元素的无线传感器网络中的数据收集延迟
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928878
Liang He, Jianping Pan, Jingdong Xu
The introduction of mobile elements has created a new dimension to reduce and balance energy consumption in wireless sensor networks, however, data collection latency may become higher. Thus the scheduling of mobile elements, i.e., how they traverse through the sensing field and when they collect data from which sensor, is of ultimate importance and has attracted increasing attention from the research community. Formulated as the Traveling Salesman Problem with Neighborhoods (TSPN) and due to its NP-hardness, so far only approximation and heuristic algorithms have appeared in the literature, but the former only have theoretical value now due to their large approximation factors. In this paper, following a progressive optimization approach, we propose a combine-skip-substitute (css) scheme, which is shown to outperform the best known heuristic algorithm. Besides the correctness and complexity analysis of the proposed scheme, we also show its performance and potentials for further extension through extensive simulation results.
移动元素的引入为减少和平衡无线传感器网络中的能量消耗创造了一个新的维度,然而,数据收集延迟可能会变得更高。因此,移动元件的调度,即它们如何穿过传感场以及何时从哪个传感器收集数据,是至关重要的,并越来越受到研究界的关注。将其表述为带邻域的旅行商问题(TSPN),由于其np -硬度,迄今为止文献中只出现了近似算法和启发式算法,但前者由于其近似因子较大,目前仅具有理论价值。在本文中,遵循渐进优化方法,我们提出了一种组合跳过替代(css)方案,该方案被证明优于最著名的启发式算法。除了对该方案的正确性和复杂度进行分析外,还通过大量的仿真结果展示了该方案的性能和进一步推广的潜力。
{"title":"Reducing data collection latency in Wireless sensor networks with mobile elements","authors":"Liang He, Jianping Pan, Jingdong Xu","doi":"10.1109/INFCOMW.2011.5928878","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928878","url":null,"abstract":"The introduction of mobile elements has created a new dimension to reduce and balance energy consumption in wireless sensor networks, however, data collection latency may become higher. Thus the scheduling of mobile elements, i.e., how they traverse through the sensing field and when they collect data from which sensor, is of ultimate importance and has attracted increasing attention from the research community. Formulated as the Traveling Salesman Problem with Neighborhoods (TSPN) and due to its NP-hardness, so far only approximation and heuristic algorithms have appeared in the literature, but the former only have theoretical value now due to their large approximation factors. In this paper, following a progressive optimization approach, we propose a combine-skip-substitute (css) scheme, which is shown to outperform the best known heuristic algorithm. Besides the correctness and complexity analysis of the proposed scheme, we also show its performance and potentials for further extension through extensive simulation results.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115091218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
期刊
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1