首页 > 最新文献

2014 28th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Optimizing Bit Transmission Power for Link Layer Energy Efficiency 优化链路层能量效率的比特传输功率
A. Ghanavati, D. Lee
In this paper, we study the issue of optimizing transmission power (energy per symbol) for minimizing the expected energy required to deliver a frame to the destination node in a point-to-point link employing an automatic repeat request (ARQ) scheme over a fading channel. We derive the expected energy as a function of the transmission power and derive a simple optimization algorithm based on the properties of this function.
在本文中,我们研究了优化传输功率(每符号能量)的问题,以最小化在衰落信道上采用自动重复请求(ARQ)方案的点对点链路中向目标节点发送帧所需的预期能量。我们导出了期望能量作为传输功率的函数,并基于该函数的性质推导了一个简单的优化算法。
{"title":"Optimizing Bit Transmission Power for Link Layer Energy Efficiency","authors":"A. Ghanavati, D. Lee","doi":"10.1109/WAINA.2014.119","DOIUrl":"https://doi.org/10.1109/WAINA.2014.119","url":null,"abstract":"In this paper, we study the issue of optimizing transmission power (energy per symbol) for minimizing the expected energy required to deliver a frame to the destination node in a point-to-point link employing an automatic repeat request (ARQ) scheme over a fading channel. We derive the expected energy as a function of the transmission power and derive a simple optimization algorithm based on the properties of this function.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of the Film Selection Process for a Film Festival 电影节的电影选择过程分析
Masashi Inoue, Sakie Sakuma
This paper presents the results of our analysis of the film selection process for a film festival. The selection of films characterises the festival, which then attracts audiences. Although the criteria for selection are fundamentally decided by members of the selection committee, we investigate if computation can characterise the selection process by utilising available data in this study. Selections are made by watching films and not by checking the associated information. However, considering the difficulties in semantically understanding the video content for computers, we attempted the analysis of the selection process based solely on associated information, including textual, numerical, or categorical data. Results of the analysis revealed factors that may affect the outcome of the selection.
本文介绍了我们对电影节电影选择过程的分析结果。电影的选择是电影节的特色,吸引着观众。尽管选择的标准基本上是由选择委员会的成员决定的,但我们研究了计算是否可以通过利用本研究中的可用数据来表征选择过程。选择是通过观看电影,而不是通过检查相关信息。然而,考虑到计算机在语义上理解视频内容的困难,我们尝试仅基于相关信息(包括文本、数字或分类数据)来分析选择过程。分析结果揭示了可能影响选择结果的因素。
{"title":"Analysis of the Film Selection Process for a Film Festival","authors":"Masashi Inoue, Sakie Sakuma","doi":"10.1109/WAINA.2014.96","DOIUrl":"https://doi.org/10.1109/WAINA.2014.96","url":null,"abstract":"This paper presents the results of our analysis of the film selection process for a film festival. The selection of films characterises the festival, which then attracts audiences. Although the criteria for selection are fundamentally decided by members of the selection committee, we investigate if computation can characterise the selection process by utilising available data in this study. Selections are made by watching films and not by checking the associated information. However, considering the difficulties in semantically understanding the video content for computers, we attempted the analysis of the selection process based solely on associated information, including textual, numerical, or categorical data. Results of the analysis revealed factors that may affect the outcome of the selection.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127758433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Combining Wireless Sensor Networks and Machine Learning for Flash Flood Nowcasting 结合无线传感器网络和机器学习进行山洪临近预报
Gustavo Furquim, Filipe Neto, G. Pessin, J. Ueyama, J. Albuquerque, M. C. Fava, E. Mendiondo, V. C. B. Souza, D. Dimitrova, T. Braun
This paper addresses an investigation with machine learning (ML) classification techniques to assist in the problem of flash flood now casting. We have been attempting to build a Wireless Sensor Network (WSN) to collect measurements from a river located in an urban area. The machine learning classification methods were investigated with the aim of allowing flash flood now casting, which in turn allows the WSN to give alerts to the local population. We have evaluated several types of ML taking account of the different now casting stages (i.e. Number of future time steps to forecast). We have also evaluated different data representation to be used as input of the ML techniques. The results show that different data representation can lead to results significantly better for different stages of now casting.
本文利用机器学习(ML)分类技术进行了一项调查,以帮助解决山洪浇铸问题。我们一直在尝试建立一个无线传感器网络(WSN)来收集位于城市地区的河流的测量数据。研究了机器学习分类方法,目的是允许山洪暴发,这反过来又允许WSN向当地居民发出警报。我们已经评估了几种类型的机器学习,考虑到不同的现在铸造阶段(即需要预测的未来时间步数)。我们还评估了用作ML技术输入的不同数据表示。结果表明,不同的数据表示方式可以显著改善现浇不同阶段的结果。
{"title":"Combining Wireless Sensor Networks and Machine Learning for Flash Flood Nowcasting","authors":"Gustavo Furquim, Filipe Neto, G. Pessin, J. Ueyama, J. Albuquerque, M. C. Fava, E. Mendiondo, V. C. B. Souza, D. Dimitrova, T. Braun","doi":"10.1109/WAINA.2014.21","DOIUrl":"https://doi.org/10.1109/WAINA.2014.21","url":null,"abstract":"This paper addresses an investigation with machine learning (ML) classification techniques to assist in the problem of flash flood now casting. We have been attempting to build a Wireless Sensor Network (WSN) to collect measurements from a river located in an urban area. The machine learning classification methods were investigated with the aim of allowing flash flood now casting, which in turn allows the WSN to give alerts to the local population. We have evaluated several types of ML taking account of the different now casting stages (i.e. Number of future time steps to forecast). We have also evaluated different data representation to be used as input of the ML techniques. The results show that different data representation can lead to results significantly better for different stages of now casting.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems 意图生物识别:多模式生物识别系统的一种增强形式
Erez Gilady, Dale Lindskog, S. Aghili
Biometrics is a field in which very little progress has been made since it was first established. One of the major milestones in the field was the introduction of the multi-modal biometrics concept which uses a multi-factor authentication method. In this method, multiple factors are being authenticated as opposed to a single factor in the 'classic' unimodal biometric systems. This paper proposes an extension to the multi-modal biometrics concept to check for individuals' consent or intent to authenticate. It does that by checking certain physiological characteristics during authentication together with the classic biometric traits of fingerprints, iris etc. This additional physiological measurement will indicate whether the user authenticating is doing so without consent or whether the authentication is done with mal intentions.
生物识别技术是一个自创立以来进展甚微的领域。该领域的一个重要里程碑是引入了使用多因素认证方法的多模态生物识别概念。在这种方法中,多个因素正在被验证,而不是“经典”单峰生物识别系统中的单个因素。本文提出了对多模态生物识别概念的扩展,以检查个人是否同意或意图进行身份验证。它通过在认证过程中检查某些生理特征以及指纹、虹膜等经典生物特征来实现这一目标。这种额外的生理测量将表明用户身份验证是否未经同意,或者身份验证是否有恶意。
{"title":"Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems","authors":"Erez Gilady, Dale Lindskog, S. Aghili","doi":"10.1109/WAINA.2014.133","DOIUrl":"https://doi.org/10.1109/WAINA.2014.133","url":null,"abstract":"Biometrics is a field in which very little progress has been made since it was first established. One of the major milestones in the field was the introduction of the multi-modal biometrics concept which uses a multi-factor authentication method. In this method, multiple factors are being authenticated as opposed to a single factor in the 'classic' unimodal biometric systems. This paper proposes an extension to the multi-modal biometrics concept to check for individuals' consent or intent to authenticate. It does that by checking certain physiological characteristics during authentication together with the classic biometric traits of fingerprints, iris etc. This additional physiological measurement will indicate whether the user authenticating is doing so without consent or whether the authentication is done with mal intentions.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133299170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deployment Challenges and Developments in Wireless Sensor Networks Clustering 无线传感器网络集群的部署挑战与发展
Krishna Doddapaneni, Fredrick A. Omondi, E. Ever, P. Shah, O. Gemikonakli, R. Gagliardi
Clustering techniques for wireless sensor networks (WSNs) have been extensively studied and proven to improve the network lifetime, a primary metric, used for performance evaluation of sensor networks. Although introduction of clustering techniques has the potential to reduce energy consumption and extend the lifetime of the network by decreasing the contention through either power control or node scheduling, scalability remains an issue. Therefore, the optimality of the cluster size still needs to be thoroughly investigated. In this paper, a single cluster head (CH) queuing model is presented. Using an event based simulation tool (Castalia), key issues that affect the practical deployment of clustering techniques in wireless sensor networks are analysed. These include identifying the bottlenecks in terms of cluster scalability and predicting the nature of data packets arrival distribution at the CH. Results presented show that this analysis can be used to specify the size of a cluster, when a specific flow of data is expected from the sensing nodes based on a particular application and also the distribution of the inter-arrival times of data packets at the CH follows exponential distribution.
无线传感器网络(wsn)的聚类技术已经得到了广泛的研究,并被证明可以提高网络寿命,这是用于传感器网络性能评估的主要指标。虽然引入集群技术有可能通过电源控制或节点调度来减少争用,从而降低能耗并延长网络的生命周期,但可伸缩性仍然是一个问题。因此,集群大小的最优性仍然需要深入研究。本文提出了一种单簇头(CH)排队模型。使用基于事件的仿真工具(Castalia),分析了影响无线传感器网络中聚类技术实际部署的关键问题。其中包括识别集群可扩展性方面的瓶颈,并预测数据包到达CH的分布性质。所提出的结果表明,当基于特定应用的特定数据流期望来自传感节点时,该分析可用于指定集群的大小,并且数据包在CH的间隔到达时间分布遵循指数分布。
{"title":"Deployment Challenges and Developments in Wireless Sensor Networks Clustering","authors":"Krishna Doddapaneni, Fredrick A. Omondi, E. Ever, P. Shah, O. Gemikonakli, R. Gagliardi","doi":"10.1109/WAINA.2014.46","DOIUrl":"https://doi.org/10.1109/WAINA.2014.46","url":null,"abstract":"Clustering techniques for wireless sensor networks (WSNs) have been extensively studied and proven to improve the network lifetime, a primary metric, used for performance evaluation of sensor networks. Although introduction of clustering techniques has the potential to reduce energy consumption and extend the lifetime of the network by decreasing the contention through either power control or node scheduling, scalability remains an issue. Therefore, the optimality of the cluster size still needs to be thoroughly investigated. In this paper, a single cluster head (CH) queuing model is presented. Using an event based simulation tool (Castalia), key issues that affect the practical deployment of clustering techniques in wireless sensor networks are analysed. These include identifying the bottlenecks in terms of cluster scalability and predicting the nature of data packets arrival distribution at the CH. Results presented show that this analysis can be used to specify the size of a cluster, when a specific flow of data is expected from the sensing nodes based on a particular application and also the distribution of the inter-arrival times of data packets at the CH follows exponential distribution.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114867530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Effectiveness of DNS-Based Security Approaches in Large-Scale Networks 大规模网络中基于dns的安全方法的有效性
M. Janbeglou, H. Naderi, N. Brownlee
The Domain Name System (DNS) is widely seen as a vital protocol of the modern Internet. For example, popular services like load balancers and Content Delivery Networks heavily rely on DNS. Because of its important role, DNS is also a desirable target for malicious activities such as spamming, phishing, and botnets. To protect networks against these attacks, a number of DNS-based security approaches have been proposed. The key insight of our study is to measure the effectiveness of security approaches that rely on DNS in large-scale networks. For this purpose, we answer the following questions, How often is DNS used? Are most of the Internet flows established after contacting DNS? In this study, we collected data from the University of Auckland campus network with more than 33,000 Internet users and processed it to find out how DNS is being used. Moreover, we studied the flows that were established with and without contacting DNS. Our results show that less than 5 percent of the observed flows use DNS. Therefore, we argue that those security approaches that solely depend on DNS are not sufficient to protect large-scale networks.
域名系统(DNS)被广泛认为是现代互联网的重要协议。例如,像负载平衡器和内容交付网络这样的流行服务严重依赖于DNS。由于其重要作用,DNS也是恶意活动(如垃圾邮件、网络钓鱼和僵尸网络)的理想目标。为了保护网络免受这些攻击,已经提出了许多基于dns的安全方法。我们研究的关键观点是衡量在大规模网络中依赖DNS的安全方法的有效性。为此,我们回答以下问题:DNS的使用频率如何?大多数互联网流量是在联系DNS后建立的吗?在这项研究中,我们从奥克兰大学校园网中收集了超过33,000名互联网用户的数据,并对其进行了处理,以了解DNS的使用情况。此外,我们还研究了使用和不使用DNS建立的流。我们的结果表明,在观察到的流中,使用DNS的不到5%。因此,我们认为那些仅仅依赖于DNS的安全方法不足以保护大规模网络。
{"title":"Effectiveness of DNS-Based Security Approaches in Large-Scale Networks","authors":"M. Janbeglou, H. Naderi, N. Brownlee","doi":"10.1109/WAINA.2014.87","DOIUrl":"https://doi.org/10.1109/WAINA.2014.87","url":null,"abstract":"The Domain Name System (DNS) is widely seen as a vital protocol of the modern Internet. For example, popular services like load balancers and Content Delivery Networks heavily rely on DNS. Because of its important role, DNS is also a desirable target for malicious activities such as spamming, phishing, and botnets. To protect networks against these attacks, a number of DNS-based security approaches have been proposed. The key insight of our study is to measure the effectiveness of security approaches that rely on DNS in large-scale networks. For this purpose, we answer the following questions, How often is DNS used? Are most of the Internet flows established after contacting DNS? In this study, we collected data from the University of Auckland campus network with more than 33,000 Internet users and processed it to find out how DNS is being used. Moreover, we studied the flows that were established with and without contacting DNS. Our results show that less than 5 percent of the observed flows use DNS. Therefore, we argue that those security approaches that solely depend on DNS are not sufficient to protect large-scale networks.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121719049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Investigating the Impact of Live Migration on the Network Infrastructure in Enterprise Environments 调查企业环境中实时迁移对网络基础设施的影响
Jose Sinti, F. Jiffry, Mahdi Aiash
Live migration of virtual machines (VMs) enables the transfer of a running VM to a new hardware component with minimal and hardly noticeable interruption. It is an important feature of virtualization technology for maintenance, load-balancing and energy reduction, especially for data centers operators and cluster service providers. Recently, virtualization started to find its way into enterprise environments such as large and medium-sized IT companies. However, no feasibility study to highlight the pros and cons of such a trend has been conducted yet. In particular, a seamless live migration requires a reliable network connection and will have an impact on the network infrastructure. Therefore, this paper describes the design and set-up of our test bed to simulate a realistic implementation of virtualization in an enterprise environment. We tested three different scenarios of live migration and checked the impact of each scenario on the network infrastructure. Based on the implementation results, the paper introduces a list of recommendations for IT companies which might be interested in implementing virtualization and live migration.
虚拟机的实时迁移支持将正在运行的虚拟机迁移到新的硬件组件,并且几乎不会出现明显的中断。对于数据中心运营商和集群服务提供商来说,这是虚拟化技术在维护、负载均衡和节能方面的重要特性。最近,虚拟化开始进入大型和中型IT公司等企业环境。然而,目前还没有可行性研究来突出这一趋势的利弊。特别是,无缝的实时迁移需要可靠的网络连接,并且会对网络基础设施产生影响。因此,本文描述了我们的测试平台的设计和设置,以模拟企业环境中虚拟化的实际实现。我们测试了三种不同的实时迁移场景,并检查了每种场景对网络基础设施的影响。根据实现结果,本文为可能对实现虚拟化和实时迁移感兴趣的IT公司提供了一系列建议。
{"title":"Investigating the Impact of Live Migration on the Network Infrastructure in Enterprise Environments","authors":"Jose Sinti, F. Jiffry, Mahdi Aiash","doi":"10.1109/WAINA.2014.34","DOIUrl":"https://doi.org/10.1109/WAINA.2014.34","url":null,"abstract":"Live migration of virtual machines (VMs) enables the transfer of a running VM to a new hardware component with minimal and hardly noticeable interruption. It is an important feature of virtualization technology for maintenance, load-balancing and energy reduction, especially for data centers operators and cluster service providers. Recently, virtualization started to find its way into enterprise environments such as large and medium-sized IT companies. However, no feasibility study to highlight the pros and cons of such a trend has been conducted yet. In particular, a seamless live migration requires a reliable network connection and will have an impact on the network infrastructure. Therefore, this paper describes the design and set-up of our test bed to simulate a realistic implementation of virtualization in an enterprise environment. We tested three different scenarios of live migration and checked the impact of each scenario on the network infrastructure. Based on the implementation results, the paper introduces a list of recommendations for IT companies which might be interested in implementing virtualization and live migration.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121366898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
QoS-Aware Packet Chunking Schemes for M2M Cloud Services 面向M2M云服务的qos感知分组方案
Anan Sawabe, K. Tsukamoto, Y. Oie
With the emergence of machine-to-machine (M2M) communications, huge numbers of devices have been connected and massive amounts of traffic are exchanged. However, since M2M applications typically generate packets of very small size, the number of incoming packets is becoming larger than the maximum number of packets that a router can handle per second, and network throughput is decreased. That is, network resources cannot be used efficiently. Therefore, the M2M cloud network operator makes chunks of these small packets, but a waiting time for chunking is inevitable, and thus application requirements may not be satisfied. This paper proposes new packet chunking schemes to both meet the QoS application requirement and improve the router's achievable throughput. The proposed schemes need multiple buffers and then classify the arrival packets to one buffer based on their acceptable waiting time. After that, the chunk packet is made based on an attribute of each packet to meet the application requirements. Through simulation experiments, we showed that the proposed scheme attains excellent performance even in cases of overloaded and imbalanced traffic.
随着机器对机器(M2M)通信的出现,大量的设备被连接起来,大量的流量被交换。但是,由于M2M应用程序通常生成非常小的数据包,因此传入数据包的数量将超过路由器每秒可以处理的最大数据包数量,从而降低了网络吞吐量。即网络资源不能得到有效利用。因此,M2M云网络运营商将这些小数据包进行分组,但分组的等待时间不可避免,因此可能无法满足应用需求。为了满足QoS应用需求和提高路由器的可实现吞吐量,本文提出了新的分组方案。提出的方案需要多个缓冲区,然后根据可接受的等待时间将到达的数据包分类到一个缓冲区。然后,根据每个数据包的属性生成块数据包,以满足应用程序的需求。通过仿真实验,我们证明了该方案即使在过载和不均衡的情况下也能取得优异的性能。
{"title":"QoS-Aware Packet Chunking Schemes for M2M Cloud Services","authors":"Anan Sawabe, K. Tsukamoto, Y. Oie","doi":"10.1109/WAINA.2014.36","DOIUrl":"https://doi.org/10.1109/WAINA.2014.36","url":null,"abstract":"With the emergence of machine-to-machine (M2M) communications, huge numbers of devices have been connected and massive amounts of traffic are exchanged. However, since M2M applications typically generate packets of very small size, the number of incoming packets is becoming larger than the maximum number of packets that a router can handle per second, and network throughput is decreased. That is, network resources cannot be used efficiently. Therefore, the M2M cloud network operator makes chunks of these small packets, but a waiting time for chunking is inevitable, and thus application requirements may not be satisfied. This paper proposes new packet chunking schemes to both meet the QoS application requirement and improve the router's achievable throughput. The proposed schemes need multiple buffers and then classify the arrival packets to one buffer based on their acceptable waiting time. After that, the chunk packet is made based on an attribute of each packet to meet the application requirements. Through simulation experiments, we showed that the proposed scheme attains excellent performance even in cases of overloaded and imbalanced traffic.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125432635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Controlling Network Processors by Using Packet-Processing Cores 使用分组处理核心控制网络处理器
Y. Kanada
A network processor (NP) usually contains multiple packet processing cores (PPCs) and a control processing core (CPC), and the synchronization and communication between CPC and PPCs, which is required for controlling an NP, is very complex. To reduce the complexity, a method for controlling packet processing in NPs by using PPCs is proposed. By means of this method, complex control messages are partially processed and divided into simplified control packets by a CPU outside the NP chip, and these packets are sent to a control-processing PPC. The control-processing PPC controls data-processing PPCs by using data-exchange mechanisms, such as a shared memory or an on-chip network, which are more uniform and simpler than those between a CPC and PPCs. This control method is applied to a virtual-link control-processing task and packet-processing tasks in a network node with a virtualization function. Both tasks are described by a hardware-independent high-level language called "Phonepl," and communication between the PPCs is programmed following normal and uniform shared-memory semantics. As a result, programming the control-processing task and porting the program become much easier.
一个网络处理器通常包含多个分组处理核心(ppc)和一个控制处理核心(CPC), CPC和ppc之间的同步和通信是控制NP所必需的,是非常复杂的。为了降低复杂度,提出了一种利用PPCs控制NPs中数据包处理的方法。通过这种方法,复杂的控制消息由NP芯片外的CPU部分处理,并分成简化的控制报文,发送给处理控制的PPC。控制处理PPC通过数据交换机制(如共享内存或片上网络)控制数据处理PPC,这些机制比CPC和PPC之间的机制更加统一和简单。该控制方法适用于具有虚拟化功能的网络节点中的虚拟链路控制处理任务和报文处理任务。这两个任务都由一种称为“Phonepl”的独立于硬件的高级语言描述,并且ppc之间的通信是按照正常和统一的共享内存语义编程的。因此,编程控制处理任务和移植程序变得容易得多。
{"title":"Controlling Network Processors by Using Packet-Processing Cores","authors":"Y. Kanada","doi":"10.1109/WAINA.2014.112","DOIUrl":"https://doi.org/10.1109/WAINA.2014.112","url":null,"abstract":"A network processor (NP) usually contains multiple packet processing cores (PPCs) and a control processing core (CPC), and the synchronization and communication between CPC and PPCs, which is required for controlling an NP, is very complex. To reduce the complexity, a method for controlling packet processing in NPs by using PPCs is proposed. By means of this method, complex control messages are partially processed and divided into simplified control packets by a CPU outside the NP chip, and these packets are sent to a control-processing PPC. The control-processing PPC controls data-processing PPCs by using data-exchange mechanisms, such as a shared memory or an on-chip network, which are more uniform and simpler than those between a CPC and PPCs. This control method is applied to a virtual-link control-processing task and packet-processing tasks in a network node with a virtualization function. Both tasks are described by a hardware-independent high-level language called \"Phonepl,\" and communication between the PPCs is programmed following normal and uniform shared-memory semantics. As a result, programming the control-processing task and porting the program become much easier.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128138422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Simulating the Internet of Things 走向模拟物联网
Stelios Sotiriadis, N. Bessis, E. Asimakopoulou, N. Mustafee
There is an increasing interest in Internet of Things (IoT) and healthcare is considered to be one of the most common applications of it. Using the IoT paradigm, various devices including smart-phones and sensor-embedded healthcare applications can be used for monitoring health. In this study, we model an IoT use case scenario with regard to monitoring the activities associated with health. In particular, we present our use case using the SimIoT extended simulation toolkit to demonstrate the various functions and the interactions occurring within the IoT-enabled healthcare context. Specifically, we extend the functionalities of the SimIC simulation toolkit by adding the IoT layer that incorporates IoT devices which generated data for the private clouds. We focus our experimental analysis from the perspective of cloud performance to illustrate the turnaround and make span of the system.
人们对物联网(IoT)的兴趣越来越大,医疗保健被认为是物联网最常见的应用之一。使用物联网范例,包括智能手机和嵌入传感器的医疗保健应用程序在内的各种设备可用于监测健康状况。在本研究中,我们模拟了一个物联网用例场景,用于监控与健康相关的活动。特别是,我们使用SimIoT扩展模拟工具包来展示我们的用例,以演示在支持物联网的医疗保健上下文中发生的各种功能和交互。具体来说,我们通过添加物联网层来扩展SimIC模拟工具包的功能,该层包含为私有云生成数据的物联网设备。我们重点从云性能的角度进行实验分析,以说明系统的周转和制造跨度。
{"title":"Towards Simulating the Internet of Things","authors":"Stelios Sotiriadis, N. Bessis, E. Asimakopoulou, N. Mustafee","doi":"10.1109/WAINA.2014.74","DOIUrl":"https://doi.org/10.1109/WAINA.2014.74","url":null,"abstract":"There is an increasing interest in Internet of Things (IoT) and healthcare is considered to be one of the most common applications of it. Using the IoT paradigm, various devices including smart-phones and sensor-embedded healthcare applications can be used for monitoring health. In this study, we model an IoT use case scenario with regard to monitoring the activities associated with health. In particular, we present our use case using the SimIoT extended simulation toolkit to demonstrate the various functions and the interactions occurring within the IoT-enabled healthcare context. Specifically, we extend the functionalities of the SimIC simulation toolkit by adding the IoT layer that incorporates IoT devices which generated data for the private clouds. We focus our experimental analysis from the perspective of cloud performance to illustrate the turnaround and make span of the system.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
期刊
2014 28th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1