首页 > 最新文献

2019 International Conference on Information Networking (ICOIN)最新文献

英文 中文
SDN-Enabled Value-Based Traffic Management Mechanism in Resource-Constrained Sensor Devices 资源受限传感器设备中基于sdn的价值流量管理机制
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718140
Melchizedek I. Alipio, Alex Gyran A. Co, M. Hilario, Christian Miguel C. Pama
Transmission of data among constrained wireless sensor devices is critical due to its limited resources such as power, bandwidth, memory, and processing. These data, generated from sensing different physical events with diverse traffic types, have to reach their destinations with a specific Quality of Service (QoS) requirement. With the increasing usage of sensors in the various Internet of Things applications, there is a need to address the resource allocation for handling these critical data while satisfying their respective QoS requirements. In this work, we implemented a Value-based Utility traffic management mechanism using Software Defined Networking (SDN) to cope with QoS requirement in constrained sensor devices. The SDN-enabled mechanism ensures that the demands of sensor data are satisfied by managing traffic while allocating queue resources among flows through a centralized controller, which utilizes network packet statistics. We evaluated the performance of the proposed mechanism in a simple and low-cost OpenFlow testbed with various sensor devices having different QoS requirements. Results show that each wireless sensor device achieved the level of satisfaction based on their required resource network utility.
受约束的无线传感器设备之间的数据传输至关重要,因为它的资源有限,如功率、带宽、内存和处理。这些数据是通过感知具有不同流量类型的不同物理事件而生成的,必须具有特定的服务质量(QoS)要求才能到达目的地。随着传感器在各种物联网应用中的使用越来越多,需要解决处理这些关键数据的资源分配问题,同时满足其各自的QoS要求。在这项工作中,我们使用软件定义网络(SDN)实现了基于价值的实用流量管理机制,以应对受限传感器设备中的QoS需求。sdn支持的机制通过集中的控制器(利用网络数据包统计)来管理流量,同时在流之间分配队列资源,从而确保传感器数据的需求得到满足。我们在具有不同QoS要求的各种传感器设备的简单低成本OpenFlow测试平台上评估了所提出机制的性能。结果表明,每个无线传感器设备都达到了基于其所需资源网络效用的满意程度。
{"title":"SDN-Enabled Value-Based Traffic Management Mechanism in Resource-Constrained Sensor Devices","authors":"Melchizedek I. Alipio, Alex Gyran A. Co, M. Hilario, Christian Miguel C. Pama","doi":"10.1109/ICOIN.2019.8718140","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718140","url":null,"abstract":"Transmission of data among constrained wireless sensor devices is critical due to its limited resources such as power, bandwidth, memory, and processing. These data, generated from sensing different physical events with diverse traffic types, have to reach their destinations with a specific Quality of Service (QoS) requirement. With the increasing usage of sensors in the various Internet of Things applications, there is a need to address the resource allocation for handling these critical data while satisfying their respective QoS requirements. In this work, we implemented a Value-based Utility traffic management mechanism using Software Defined Networking (SDN) to cope with QoS requirement in constrained sensor devices. The SDN-enabled mechanism ensures that the demands of sensor data are satisfied by managing traffic while allocating queue resources among flows through a centralized controller, which utilizes network packet statistics. We evaluated the performance of the proposed mechanism in a simple and low-cost OpenFlow testbed with various sensor devices having different QoS requirements. Results show that each wireless sensor device achieved the level of satisfaction based on their required resource network utility.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Chance Constrained Based Formulation for Dynamic Multiplexing of eMBB-URLLC Traffics in 5G New Radio 基于机会约束的5G新无线电中eMBB-URLLC业务动态复用公式
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718159
Madyan Alsenwi, Shashi Raj Pandey, Y. Tun, Ki Tae Kim, C. Hong
5G New Radio (NR) is envisioned to provide three major services: enhanced Mobile Broadband (eMBB), Ultra Reliable Low Latency Communications (URLLC), and massive Machine Type Communication (mMTC). URLLC services (i.e., autonomous vehicles, industrial Internet of Things (IoT),…) require strict latency, on-way latency of 1 ms, with 99.999% reliability. eMBB applications aims extreme data rate while mMTC is designed to serve a large number of IoT devices that send a small data sporadically. In this paper, we address the resource scheduling problem of URLLC and eMBB traffics. First, the Resource Blocks (RBs) are allocated to eMBB users at the beginning of each time slot based on the channel state of each eMBB user and his previous average data rate up to current time slot. The RBs allocation problem modeled as as a 2-Dimensions Hopfield Neural Networks (2D-HNN) and the energy function of 2D-HNN is investigated to solve the RBs allocation problem. Then, the resource scheduling problem of URLLC and eMBB is formulated as an optimization problem with chance constraint. The chance constraint based problem aims to maximize the eMBB data rate while satisfying the URLLC critical constraints. The cumulative Distribution Function (CDF) of the stochastic URLLC traffic is investigated to relax the chance constraint into a linear constraint. The simulation results show efficiency of the proposed dynamic scheduling approach.
5G新无线电(NR)预计将提供三种主要服务:增强型移动宽带(eMBB)、超可靠低延迟通信(URLLC)和大规模机器类型通信(mMTC)。URLLC服务(即自动驾驶汽车、工业物联网(IoT)等)要求严格的延迟,路上延迟为1毫秒,可靠性为99.999%。eMBB应用的目标是极高的数据速率,而mMTC旨在服务于大量偶尔发送少量数据的物联网设备。本文研究了URLLC和eMBB流量的资源调度问题。首先,根据每个eMBB用户的信道状态及其在当前时隙之前的平均数据速率,在每个时隙开始时将资源块分配给eMBB用户。研究了用二维Hopfield神经网络(2D-HNN)建模的RBs分配问题和2D-HNN的能量函数来解决RBs分配问题。然后,将URLLC和eMBB的资源调度问题表述为一个带有机会约束的优化问题。基于机会约束的问题的目标是在满足URLLC关键约束的情况下最大化eMBB数据速率。研究了随机URLLC流量的累积分布函数(CDF),将随机约束放宽为线性约束。仿真结果表明了所提出的动态调度方法的有效性。
{"title":"A Chance Constrained Based Formulation for Dynamic Multiplexing of eMBB-URLLC Traffics in 5G New Radio","authors":"Madyan Alsenwi, Shashi Raj Pandey, Y. Tun, Ki Tae Kim, C. Hong","doi":"10.1109/ICOIN.2019.8718159","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718159","url":null,"abstract":"5G New Radio (NR) is envisioned to provide three major services: enhanced Mobile Broadband (eMBB), Ultra Reliable Low Latency Communications (URLLC), and massive Machine Type Communication (mMTC). URLLC services (i.e., autonomous vehicles, industrial Internet of Things (IoT),…) require strict latency, on-way latency of 1 ms, with 99.999% reliability. eMBB applications aims extreme data rate while mMTC is designed to serve a large number of IoT devices that send a small data sporadically. In this paper, we address the resource scheduling problem of URLLC and eMBB traffics. First, the Resource Blocks (RBs) are allocated to eMBB users at the beginning of each time slot based on the channel state of each eMBB user and his previous average data rate up to current time slot. The RBs allocation problem modeled as as a 2-Dimensions Hopfield Neural Networks (2D-HNN) and the energy function of 2D-HNN is investigated to solve the RBs allocation problem. Then, the resource scheduling problem of URLLC and eMBB is formulated as an optimization problem with chance constraint. The chance constraint based problem aims to maximize the eMBB data rate while satisfying the URLLC critical constraints. The cumulative Distribution Function (CDF) of the stochastic URLLC traffic is investigated to relax the chance constraint into a linear constraint. The simulation results show efficiency of the proposed dynamic scheduling approach.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124374139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Unified Cloud Access Control Model for Cloud Storage Broker 云存储代理统一云访问控制模型
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8717982
M. Sukmana, K. Torkura, Hendrik Graupner, Feng Cheng, C. Meinel
Cloud Storage Broker (CSB) provides value-added cloud storage service for enterprise usage by leveraging multi-cloud storage architecture. However, it raises several challenges for managing resources and its access control in multiple Cloud Service Providers (CSPs) for authorized CSB stakeholders. In this paper we propose unified cloud access control model that provides the abstraction of CSP's services for centralized and automated cloud resource and access control management in multiple CSPs. Our proposal offers role-based access control for CSB stakeholders to access cloud resources by assigning necessary privileges and access control list for cloud resources and CSB stakeholders, respectively, following privilege separation concept and least privilege principle. We implement our unified model in a CSB system called CloudRAID for Business (CfB) with the evaluation result shows it provides system-and-cloud level security service for cfB and centralized resource and access control management in multiple CSPs.
云存储代理(CSB)通过利用多云存储架构为企业提供增值的云存储服务。然而,它为授权的CSB利益相关者在多个云服务提供商(csp)中管理资源及其访问控制提出了一些挑战。本文提出了统一的云访问控制模型,该模型对云服务提供商的服务进行了抽象,实现了云资源和访问控制在多个云服务提供商中的集中化和自动化管理。我们的方案遵循权限分离概念和最小权限原则,通过为云资源和CSB利益相关者分别分配必要的权限和访问控制列表,为CSB利益相关者访问云资源提供基于角色的访问控制。我们将该统一模型应用于一个名为CloudRAID for Business (CfB)的CSB系统中,评估结果表明它为CfB提供了系统级和云级的安全服务,并在多个csp中进行了集中的资源和访问控制管理。
{"title":"Unified Cloud Access Control Model for Cloud Storage Broker","authors":"M. Sukmana, K. Torkura, Hendrik Graupner, Feng Cheng, C. Meinel","doi":"10.1109/ICOIN.2019.8717982","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8717982","url":null,"abstract":"Cloud Storage Broker (CSB) provides value-added cloud storage service for enterprise usage by leveraging multi-cloud storage architecture. However, it raises several challenges for managing resources and its access control in multiple Cloud Service Providers (CSPs) for authorized CSB stakeholders. In this paper we propose unified cloud access control model that provides the abstraction of CSP's services for centralized and automated cloud resource and access control management in multiple CSPs. Our proposal offers role-based access control for CSB stakeholders to access cloud resources by assigning necessary privileges and access control list for cloud resources and CSB stakeholders, respectively, following privilege separation concept and least privilege principle. We implement our unified model in a CSB system called CloudRAID for Business (CfB) with the evaluation result shows it provides system-and-cloud level security service for cfB and centralized resource and access control management in multiple CSPs.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Dynamic Cache Size Assignment Method with Bandwidth Reservation for CCN 带带宽预留的CCN动态缓存大小分配方法
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718174
Atsuko Yokotani, S. Ohzahata, R. Yamamoto, Toshihiko Kato
Currently, the Internet has been widely deployed for communication services and communication is provided a connection between hosts. Therefore, a location of host has to be specified even when an aim of communication is to deliver content, and then a content is not always efficiently delivered under architecture of the Internet. In order to solve this problem, Content Centric Network (CCN) has been proposed as new network architecture. CCN delivers content with a content identifier and does not require a location identification of each host in the communication. The content identifier enables to provide content cache as a router function, and the content caches in CCN routers enable to reduce redundant traffic in case that many uses request the same content via the same route. In our previous works, we have proposed a bandwidth reservation method of CCN for stable content delivery. However, the previous work does not consider cache assignment control for contents with bandwidth reservation. In this paper, we propose a dynamic cache space control method for contents with bandwidth reservation in order to cache them in the CCN router nearby the users. The proposed method enables to prepare cache spaces for content with bandwidth reservation effectively. In evaluations, we implement the proposed method in CCNx and evaluate communication quality with effect of dynamic cache size assignment for content with bandwidth reservation.
目前,互联网已被广泛用于通信业务,通信是提供主机之间的连接。因此,即使通信的目的是传递内容,也必须指定主机的位置,而在Internet的体系结构下,内容并不总是有效地传递。为了解决这一问题,内容中心网络(Content Centric Network, CCN)作为一种新的网络架构被提出。CCN提供带有内容标识符的内容,不需要通信中每个主机的位置标识。内容标识符能够提供内容缓存作为路由器功能,并且CCN路由器中的内容缓存能够在许多用户通过同一路由请求相同内容的情况下减少冗余流量。在我们之前的工作中,我们提出了一种CCN的带宽预留方法,用于稳定的内容分发。但是,以前的工作没有考虑对带宽预留内容的缓存分配控制。本文提出了一种对有带宽预留的内容进行动态缓存空间控制的方法,以便将其缓存到用户附近的CCN路由器中。该方法能够有效地为具有带宽保留的内容准备缓存空间。在评估中,我们在CCNx中实现了该方法,并对具有带宽保留的内容进行了动态缓存大小分配影响的通信质量评估。
{"title":"A Dynamic Cache Size Assignment Method with Bandwidth Reservation for CCN","authors":"Atsuko Yokotani, S. Ohzahata, R. Yamamoto, Toshihiko Kato","doi":"10.1109/ICOIN.2019.8718174","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718174","url":null,"abstract":"Currently, the Internet has been widely deployed for communication services and communication is provided a connection between hosts. Therefore, a location of host has to be specified even when an aim of communication is to deliver content, and then a content is not always efficiently delivered under architecture of the Internet. In order to solve this problem, Content Centric Network (CCN) has been proposed as new network architecture. CCN delivers content with a content identifier and does not require a location identification of each host in the communication. The content identifier enables to provide content cache as a router function, and the content caches in CCN routers enable to reduce redundant traffic in case that many uses request the same content via the same route. In our previous works, we have proposed a bandwidth reservation method of CCN for stable content delivery. However, the previous work does not consider cache assignment control for contents with bandwidth reservation. In this paper, we propose a dynamic cache space control method for contents with bandwidth reservation in order to cache them in the CCN router nearby the users. The proposed method enables to prepare cache spaces for content with bandwidth reservation effectively. In evaluations, we implement the proposed method in CCNx and evaluate communication quality with effect of dynamic cache size assignment for content with bandwidth reservation.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Chance-Constrained Spectrum Allocation for Fair LTE-U/Wi-Fi Coexistence LTE-U/Wi-Fi公平共存的机会约束频谱分配
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718132
Aunas Manzoor, S. Kang, C. Hong
In order to meet the ever-increasing data rate demands of future mobile networks, LTE in the unlicensed band (LTE-U) has been proposed in which LTE is operated on the unlicensed spectrum along with the incumbent unlicensed spectrum technologies e.g. Wi-Fi However, enabling LTE-U with the Wi-Fi network in the same unlicensed spectrum results in severe Wi-Fi performance degradations. This paper addressed such coexistence problem of Wi-Fi and LTE-U, by formulating a chance-constrained optimization problem such as to maintain certain Wi-Fi performance. In the first step, unlicensed spectrum is shared among Wi-Fi and LTE-U by adjusting the so-called duty-cycle according to the random Wi-Fi performance. Secondly, the LTE-U user association is performed through knapsack problem to efficiently utilize the available LTE-U duty-cycle. Simulations results show that the proposed algorithm provides fairness to the Wi-Fi system by adjusting the LTE-U duty-cycle.
为了满足未来移动网络不断增长的数据速率需求,LTE在非授权频段(LTE- u)被提出,其中LTE与现有的非授权频谱技术(如Wi-Fi)一起在非授权频谱上运行。然而,在相同的非授权频谱上启用LTE- u与Wi-Fi网络会导致Wi-Fi性能严重下降。本文针对Wi-Fi和LTE-U共存问题,提出了保持一定Wi-Fi性能的机会约束优化问题。第一步,根据Wi-Fi的随机性能调整所谓的占空比,在Wi-Fi和LTE-U之间共享未经许可的频谱。其次,通过背包问题实现LTE-U用户关联,有效利用可用的LTE-U占空比;仿真结果表明,该算法通过调整LTE-U占空比,提高了Wi-Fi系统的公平性。
{"title":"Chance-Constrained Spectrum Allocation for Fair LTE-U/Wi-Fi Coexistence","authors":"Aunas Manzoor, S. Kang, C. Hong","doi":"10.1109/ICOIN.2019.8718132","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718132","url":null,"abstract":"In order to meet the ever-increasing data rate demands of future mobile networks, LTE in the unlicensed band (LTE-U) has been proposed in which LTE is operated on the unlicensed spectrum along with the incumbent unlicensed spectrum technologies e.g. Wi-Fi However, enabling LTE-U with the Wi-Fi network in the same unlicensed spectrum results in severe Wi-Fi performance degradations. This paper addressed such coexistence problem of Wi-Fi and LTE-U, by formulating a chance-constrained optimization problem such as to maintain certain Wi-Fi performance. In the first step, unlicensed spectrum is shared among Wi-Fi and LTE-U by adjusting the so-called duty-cycle according to the random Wi-Fi performance. Secondly, the LTE-U user association is performed through knapsack problem to efficiently utilize the available LTE-U duty-cycle. Simulations results show that the proposed algorithm provides fairness to the Wi-Fi system by adjusting the LTE-U duty-cycle.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Weighted Proportional Allocation Based Power Allocation in Wireless Network Virtualization for Future Wireless Networks 未来无线网络虚拟化中基于加权比例分配的功率分配
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718185
Y. Tun, Shashi Raj Pandey, Madyan Alsenwi, Chit Wutyee Zaw, C. Hong
Wireless network virtualization has been considered as a promising technique that will avail the network operators to address the tremendous demand of mobile data services for 5G cellular networks by improving overall network utilization. With this approach, the cellular networks can be logically decoupled into infrastructure providers (InPs) and mobile virtual network operators (MVNOs). In such scenario, an InP owns wireless resources of base stations (e.g., bandwidth, transmit power, antenna, storage capacity, computation capacity) which is shared with multiple MVNOs. Then, each MVNO will allocate the obtained network slices to their mobile users. So, the resource allocation to the users of MVNOs is really challenging. In this paper, we address the power allocation problem in the network virtualization with the objective of maintaining the beneficiary network utilization in an efficient manner, and intra-slice, inter-slice isolation. To address the proposed power allocation problem we adopt the weighted proportional allocation mechanism. Under this mechanism, MVNOs are modeled as bidders who will bid for power for their mobile users and InP is modeled as an auctioneer (i.e., a seller). Finally, numerical results present our proposed algorithm outperforms equal resource sharing in virtualized wireless networks.
无线网络虚拟化被认为是一种很有前途的技术,它将通过提高整体网络利用率,使网络运营商能够满足5G蜂窝网络对移动数据服务的巨大需求。通过这种方法,蜂窝网络可以在逻辑上解耦为基础设施提供商(inp)和移动虚拟网络运营商(mvno)。在这种情况下,一个InP拥有多个mvno共享的基站无线资源(如带宽、发射功率、天线、存储容量、计算能力等)。然后,每个MVNO将获得的网络片分配给其移动用户。因此,对mvno用户的资源分配确实具有挑战性。在本文中,我们解决了网络虚拟化中的功率分配问题,以保持有效的受益网络利用率,以及片内和片间的隔离。为了解决所提出的权力分配问题,我们采用加权比例分配机制。在这种机制下,mvno被建模为将为其移动用户竞标电力的投标人,而InP被建模为拍卖商(即卖方)。最后,数值结果表明,该算法优于虚拟无线网络中的资源均等共享。
{"title":"Weighted Proportional Allocation Based Power Allocation in Wireless Network Virtualization for Future Wireless Networks","authors":"Y. Tun, Shashi Raj Pandey, Madyan Alsenwi, Chit Wutyee Zaw, C. Hong","doi":"10.1109/ICOIN.2019.8718185","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718185","url":null,"abstract":"Wireless network virtualization has been considered as a promising technique that will avail the network operators to address the tremendous demand of mobile data services for 5G cellular networks by improving overall network utilization. With this approach, the cellular networks can be logically decoupled into infrastructure providers (InPs) and mobile virtual network operators (MVNOs). In such scenario, an InP owns wireless resources of base stations (e.g., bandwidth, transmit power, antenna, storage capacity, computation capacity) which is shared with multiple MVNOs. Then, each MVNO will allocate the obtained network slices to their mobile users. So, the resource allocation to the users of MVNOs is really challenging. In this paper, we address the power allocation problem in the network virtualization with the objective of maintaining the beneficiary network utilization in an efficient manner, and intra-slice, inter-slice isolation. To address the proposed power allocation problem we adopt the weighted proportional allocation mechanism. Under this mechanism, MVNOs are modeled as bidders who will bid for power for their mobile users and InP is modeled as an auctioneer (i.e., a seller). Finally, numerical results present our proposed algorithm outperforms equal resource sharing in virtualized wireless networks.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133120826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Evaluation of Multiplexing on the Characteristics of Surveillance Camera Data Traffic 多路复用对监控摄像机数据流量特性的评价
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718154
Yoshiki Kuwabara, Y. Matsuno, Kan Akutsu, H. Mukai, T. Yokotani
Recently, the Internet of Things (IoT) has become so widespread that the requirements for networking must be re-evaluated. It is expected that the number of devices connected to the network will increase significantly; therefore, characteristics of conventional data traffic flow must be reconsidered. In this paper, we focus on the data traffic flow characteristics of surveillance cameras, which are a type of IoT device. We have investigated the characteristics of data traffic flow multiplexed on wired and wireless networks. We have analyzed statistical data based on the IPFIX protocol at a gateway, which is an aggregation point for this data traffic. We have also clarified the relationship between real multiplexed data traffic and statistical data. Finally, we have shown that our results are useful for IoT network design.
最近,物联网(IoT)变得如此广泛,以至于必须重新评估网络的需求。预计连接到网络的设备数量将显著增加;因此,必须重新考虑传统数据流量的特点。监控摄像头是一种物联网设备,本文主要研究监控摄像头的数据流量特性。我们研究了有线和无线网络上数据流量复用的特性。我们分析了基于网关的IPFIX协议的统计数据,网关是该数据流量的聚合点。我们还澄清了实际复用数据流量与统计数据之间的关系。最后,我们证明了我们的结果对物联网网络设计是有用的。
{"title":"Evaluation of Multiplexing on the Characteristics of Surveillance Camera Data Traffic","authors":"Yoshiki Kuwabara, Y. Matsuno, Kan Akutsu, H. Mukai, T. Yokotani","doi":"10.1109/ICOIN.2019.8718154","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718154","url":null,"abstract":"Recently, the Internet of Things (IoT) has become so widespread that the requirements for networking must be re-evaluated. It is expected that the number of devices connected to the network will increase significantly; therefore, characteristics of conventional data traffic flow must be reconsidered. In this paper, we focus on the data traffic flow characteristics of surveillance cameras, which are a type of IoT device. We have investigated the characteristics of data traffic flow multiplexed on wired and wireless networks. We have analyzed statistical data based on the IPFIX protocol at a gateway, which is an aggregation point for this data traffic. We have also clarified the relationship between real multiplexed data traffic and statistical data. Finally, we have shown that our results are useful for IoT network design.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"546 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116389466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Heuristic Mixed Model for Viral Marketing Cost Minimization in Social Networks 社交网络中病毒式营销成本最小化的启发式混合模型
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718136
A. Talukder, DoHyeon Kim, C. Hong
The Influence maximization (IM) aims at estimating a small number of influential users that maximize the viral marketing profit whereas, the Reverse Influence Maximization (RIM) deals with the minimization of Viral Marketing (VM) cost in social networks. Here, the VM cost is measured by the minimum number of nodes that are required to activate seed nodes and the profit is defined by the maximum number of nodes influenced by seed users when they are initially activated. However, most of the existing works focus on the profit maximization without considering the VM cost. Thus, in this research, we introduce a Viral Marketing Cost (VMC) Minimization problem and propose a Heuristic Mixed (HM) approach under mixed Reverse Independent Cascade (RIC) and Reverse Linear Threshold (RLT) diffusion models. The proposed HM model employs the greedy technique along with a heuristic approach to optimize the VM cost. Moreover, our model resolves the challenging issues of the RIM problem more efficiently. Finally, we simulate our model using data-sets of two real social networks, and the result shows that our model outperforms the baseline and existing models.
影响力最大化(IM)旨在估计少数有影响力的用户,使病毒式营销利润最大化,而反向影响力最大化(RIM)则涉及社交网络中病毒式营销(VM)成本的最小化。在这里,VM成本是由激活种子节点所需的最小节点数来衡量的,而利润是由最初激活种子用户时受其影响的最大节点数来定义的。然而,现有的研究大多着眼于利润最大化,而没有考虑虚拟机成本。因此,在本研究中,我们引入了病毒营销成本(VMC)最小化问题,并在混合反向独立级联(RIC)和反向线性阈值(RLT)扩散模型下提出了一种启发式混合(HM)方法。提出的HM模型采用了贪心技术和启发式方法来优化虚拟机成本。此外,我们的模型更有效地解决了RIM问题的挑战性问题。最后,我们使用两个真实社交网络的数据集对我们的模型进行了仿真,结果表明我们的模型优于基线模型和现有模型。
{"title":"A Heuristic Mixed Model for Viral Marketing Cost Minimization in Social Networks","authors":"A. Talukder, DoHyeon Kim, C. Hong","doi":"10.1109/ICOIN.2019.8718136","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718136","url":null,"abstract":"The Influence maximization (IM) aims at estimating a small number of influential users that maximize the viral marketing profit whereas, the Reverse Influence Maximization (RIM) deals with the minimization of Viral Marketing (VM) cost in social networks. Here, the VM cost is measured by the minimum number of nodes that are required to activate seed nodes and the profit is defined by the maximum number of nodes influenced by seed users when they are initially activated. However, most of the existing works focus on the profit maximization without considering the VM cost. Thus, in this research, we introduce a Viral Marketing Cost (VMC) Minimization problem and propose a Heuristic Mixed (HM) approach under mixed Reverse Independent Cascade (RIC) and Reverse Linear Threshold (RLT) diffusion models. The proposed HM model employs the greedy technique along with a heuristic approach to optimize the VM cost. Moreover, our model resolves the challenging issues of the RIM problem more efficiently. Finally, we simulate our model using data-sets of two real social networks, and the result shows that our model outperforms the baseline and existing models.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal Trajectory Learning for UAV-BS Video Provisioning System: A Deep Reinforcement Learning Approach 无人机- bs视频供应系统的最优轨迹学习:一种深度强化学习方法
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718194
Dohyun Kwon, Joongheon Kim
The unmanned aerial vehicle (UAV) based data transmission is highlighted for next-generation communication system by both academia and industry. The UAV, which is dynamically associated with mobile users, can take a role of base station (BS) as service provider (SP), for various types of scenarios. For this sake, it is important that the UAV-BS should be hovered in the air with obeying optimal trajectory for minimizing delay, which is caused by enormous computation of data transmission, and the trajectory can be controlled by centralized macro base station (MBS). In this paper, we propose deep reinforcement learning approach for computing optimal trajectories of distributed UAV-BS with low-latency overhead to enable efficient UAV communication in next generation wireless system.
基于无人机的数据传输是下一代通信系统的研究热点。无人机与移动用户动态关联,可以在各种场景中扮演基站(BS)和服务提供商(SP)的角色。为此,UAV-BS应遵循最优轨迹在空中悬停,以最大限度地减少数据传输带来的巨大计算量,并可通过集中式宏基站(MBS)控制轨迹。在本文中,我们提出了一种深度强化学习方法来计算具有低延迟开销的分布式无人机- bs的最佳轨迹,以实现下一代无线系统中高效的无人机通信。
{"title":"Optimal Trajectory Learning for UAV-BS Video Provisioning System: A Deep Reinforcement Learning Approach","authors":"Dohyun Kwon, Joongheon Kim","doi":"10.1109/ICOIN.2019.8718194","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718194","url":null,"abstract":"The unmanned aerial vehicle (UAV) based data transmission is highlighted for next-generation communication system by both academia and industry. The UAV, which is dynamically associated with mobile users, can take a role of base station (BS) as service provider (SP), for various types of scenarios. For this sake, it is important that the UAV-BS should be hovered in the air with obeying optimal trajectory for minimizing delay, which is caused by enormous computation of data transmission, and the trajectory can be controlled by centralized macro base station (MBS). In this paper, we propose deep reinforcement learning approach for computing optimal trajectories of distributed UAV-BS with low-latency overhead to enable efficient UAV communication in next generation wireless system.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134205623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure and Fast Multiple Nodes Join Mechanism for IPv6-Based Industrial Wireless Network 基于ipv6的工业无线网络安全快速多节点连接机制
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718157
Yuan Zhuang, Qiaoyue Pang, Min Wei
More and more industrial devices are expected to connect to the internet seamlessly. IPv6-based industrial wireless network can solve the address resources limitation problem. It is a challenge about how to ensure the wireless node join security after introducing the IPv6. In this paper, we propose a multiple nodes join mechanism, which includes a timeslot allocation method and secure join process for the IPv6 over IEEE 802.15.4e network. The timeslot allocation method is designed in order to configure communication resources in the join process for the new nodes. The test platform is implemented to verify the feasibility of the mechanism. The result shows that the proposed mechanism can reduce the communication cost for multiple nodes join process and improve the efficiency.
越来越多的工业设备有望无缝连接到互联网。基于ipv6的工业无线网络可以解决地址资源有限的问题。引入IPv6后,如何保证无线节点连接的安全性是一个挑战。本文提出了一种基于IEEE 802.15.4e网络的IPv6多节点连接机制,该机制包括时隙分配方法和安全连接过程。设计了时隙分配方法,为新节点在连接过程中配置通信资源。搭建了实验平台,验证了该机构的可行性。结果表明,该机制可以降低多节点连接过程中的通信成本,提高效率。
{"title":"Secure and Fast Multiple Nodes Join Mechanism for IPv6-Based Industrial Wireless Network","authors":"Yuan Zhuang, Qiaoyue Pang, Min Wei","doi":"10.1109/ICOIN.2019.8718157","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718157","url":null,"abstract":"More and more industrial devices are expected to connect to the internet seamlessly. IPv6-based industrial wireless network can solve the address resources limitation problem. It is a challenge about how to ensure the wireless node join security after introducing the IPv6. In this paper, we propose a multiple nodes join mechanism, which includes a timeslot allocation method and secure join process for the IPv6 over IEEE 802.15.4e network. The timeslot allocation method is designed in order to configure communication resources in the join process for the new nodes. The test platform is implemented to verify the feasibility of the mechanism. The result shows that the proposed mechanism can reduce the communication cost for multiple nodes join process and improve the efficiency.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117034737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on Information Networking (ICOIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1