首页 > 最新文献

2014 28th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
A Design for Performance Improvement of Clock Synchronization in WSNs Using a TDMA-Based MAC Protocol 基于tdma的MAC协议提高WSNs时钟同步性能的设计
Siddharth Watwe, Ashutosh Bhatia, R. Hansdah
Clock synchronization in a wireless sensor network (WSN) is quite essential as it provides a consistent and a coherent time frame for all the nodes across the network. Typically, clock synchronization is achieved by message passing using a contention-based scheme for media access, like carrier sense multiple access (CSMA). The nodes try to synchronize with each other, by sending synchronization request messages. If many nodes try to send messages simultaneously, contention-based schemes cannot efficiently avoid collisions. In such a situation, there are chances of collisions, and hence, message losses, which, in turn, affects the convergence of the synchronization algorithms. However, the number of collisions can be reduced with a frame based approach like time division multiple access (TDMA) for message passing. In this paper, we propose a design to utilize TDMA-based media access and control (MAC) protocol for the performance improvement of clock synchronization protocols. The basic idea is to use TDMA-based transmissions when the degree of synchronization improves among the sensor nodes during the execution of the clock synchronization algorithm. The design significantly reduces the collisions among the synchronization protocol messages. We have simulated the proposed protocol in Castalia network simulator. The simulation results show that the proposed protocol significantly reduces the time required for synchronization and also improves the accuracy of the synchronization algorithm.
时钟同步在无线传感器网络(WSN)中是非常重要的,因为它为网络上的所有节点提供了一致和一致的时间框架。通常,时钟同步是通过使用基于争用的媒体访问方案(如载波感测多址(CSMA))的消息传递来实现的。节点通过发送同步请求消息来尝试彼此同步。如果许多节点试图同时发送消息,基于争用的方案不能有效地避免冲突。在这种情况下,有可能发生冲突,从而导致消息丢失,这反过来又影响同步算法的收敛性。但是,可以使用基于帧的方法减少冲突的数量,例如用于消息传递的时分多址(TDMA)。在本文中,我们提出了一种利用基于tdma的媒体访问和控制(MAC)协议来提高时钟同步协议性能的设计。基本思想是在时钟同步算法执行期间,当传感器节点之间的同步程度提高时,使用基于tdma的传输。该设计显著减少了同步协议消息之间的冲突。我们在Castalia网络模拟器上对所提出的协议进行了仿真。仿真结果表明,该协议显著减少了同步所需的时间,提高了同步算法的精度。
{"title":"A Design for Performance Improvement of Clock Synchronization in WSNs Using a TDMA-Based MAC Protocol","authors":"Siddharth Watwe, Ashutosh Bhatia, R. Hansdah","doi":"10.1109/WAINA.2014.64","DOIUrl":"https://doi.org/10.1109/WAINA.2014.64","url":null,"abstract":"Clock synchronization in a wireless sensor network (WSN) is quite essential as it provides a consistent and a coherent time frame for all the nodes across the network. Typically, clock synchronization is achieved by message passing using a contention-based scheme for media access, like carrier sense multiple access (CSMA). The nodes try to synchronize with each other, by sending synchronization request messages. If many nodes try to send messages simultaneously, contention-based schemes cannot efficiently avoid collisions. In such a situation, there are chances of collisions, and hence, message losses, which, in turn, affects the convergence of the synchronization algorithms. However, the number of collisions can be reduced with a frame based approach like time division multiple access (TDMA) for message passing. In this paper, we propose a design to utilize TDMA-based media access and control (MAC) protocol for the performance improvement of clock synchronization protocols. The basic idea is to use TDMA-based transmissions when the degree of synchronization improves among the sensor nodes during the execution of the clock synchronization algorithm. The design significantly reduces the collisions among the synchronization protocol messages. We have simulated the proposed protocol in Castalia network simulator. The simulation results show that the proposed protocol significantly reduces the time required for synchronization and also improves the accuracy of the synchronization algorithm.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123044053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Monitoring for Power-Line Change and Outage Detection in Smart Grid via the Alternating Direction Method of Multipliers 基于乘法器交变方向法的智能电网变线监测与停电检测
Liang Zhao, Wenzhan Song, L. Tong, Yuan Wu
A novel distributed line outage detection algorithm was developed in this paper through convex relaxation and alternating direction method of multipliers (ADMM) method for smart grid system. The devised approach allows identification of multiple line outages using limited number of PMU measurements. The diagnosis procedure is performed close to the place where PMU measurements are collected and only partial variable estimates are exchanged among the neighbours of processors. It is shown that the proposed method outperforms the existing methods, which are either suffering from computational complexity or security and privacy issues. Numerical tests demonstrated the merits of the proposed schemes in co-ordinately figuring out multiple line outages in the system.
基于凸松弛法和乘法器交替方向法,提出了一种适用于智能电网系统的分布式线路中断检测算法。所设计的方法允许使用有限数量的PMU测量来识别多个线路中断。诊断过程在收集PMU测量值的地方附近执行,并且在处理器的邻居之间仅交换部分变量估计。结果表明,本文提出的方法优于现有的方法,这些方法要么存在计算复杂性,要么存在安全性和隐私性问题。数值试验结果表明,所提方案在协调计算系统中多线路故障方面具有一定的优越性。
{"title":"Monitoring for Power-Line Change and Outage Detection in Smart Grid via the Alternating Direction Method of Multipliers","authors":"Liang Zhao, Wenzhan Song, L. Tong, Yuan Wu","doi":"10.1109/WAINA.2014.60","DOIUrl":"https://doi.org/10.1109/WAINA.2014.60","url":null,"abstract":"A novel distributed line outage detection algorithm was developed in this paper through convex relaxation and alternating direction method of multipliers (ADMM) method for smart grid system. The devised approach allows identification of multiple line outages using limited number of PMU measurements. The diagnosis procedure is performed close to the place where PMU measurements are collected and only partial variable estimates are exchanged among the neighbours of processors. It is shown that the proposed method outperforms the existing methods, which are either suffering from computational complexity or security and privacy issues. Numerical tests demonstrated the merits of the proposed schemes in co-ordinately figuring out multiple line outages in the system.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131626752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Light-Weight Safety Confirmation System for Large-Scale Disasters 大型灾害轻型安全确认系统
Hiroaki Yuze, S. Nabeta, M. Izumi
We have been developing and operating safety confirmation systems for universities since 1999. The Great East Japan Earthquake in 2011 clarified some issues related to the safety confirmation systems. Thereby, we reviewed the safety confirmation systems, the result of which revealed that more carefully selected functionality, restriction on the volume of communication, and enhanced anti-disaster feature of the systems would be required. We have then developed the light-weight safety confirmation system that does not have the function to simultaneously transmit mass emails and is designed for easier system migration. Evaluation was conducted by performing demonstration experiments of the newly developed safety confirmation at a disaster prevention drill of a university.
我们从1999年开始开发并运营大学安全确认系统。2011年的东日本大地震澄清了与安全确认系统相关的一些问题。因此,我们对安全确认系统进行了审查,结果表明,需要更仔细地选择功能,限制通信量,增强系统的抗灾功能。然后,我们开发了轻量级的安全确认系统,该系统不具有同时传输大量电子邮件的功能,并且旨在方便系统迁移。通过在某高校防灾演练中对新研制的安全确认进行示范试验,进行了评价。
{"title":"Light-Weight Safety Confirmation System for Large-Scale Disasters","authors":"Hiroaki Yuze, S. Nabeta, M. Izumi","doi":"10.1109/WAINA.2014.97","DOIUrl":"https://doi.org/10.1109/WAINA.2014.97","url":null,"abstract":"We have been developing and operating safety confirmation systems for universities since 1999. The Great East Japan Earthquake in 2011 clarified some issues related to the safety confirmation systems. Thereby, we reviewed the safety confirmation systems, the result of which revealed that more carefully selected functionality, restriction on the volume of communication, and enhanced anti-disaster feature of the systems would be required. We have then developed the light-weight safety confirmation system that does not have the function to simultaneously transmit mass emails and is designed for easier system migration. Evaluation was conducted by performing demonstration experiments of the newly developed safety confirmation at a disaster prevention drill of a university.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"45 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132318443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Virtual Campus Tour Service Using Mobile Robots 使用移动机器人的虚拟校园旅游服务
M. Fujita, Y. Tokiwa, Osamu Ohashi, Y. Kato
When we discuss operability and convenience of remote control robot systems, it was usual to focus on user interfaces to operate robots. In this paper, we propose to improve methods of service providing based on the different operation types, e.g. Operation which requires real time response, operation which allows delay between user operation and robot movement via networks.
当我们讨论远程控制机器人系统的可操作性和便利性时,通常关注的是操作机器人的用户界面。在本文中,我们提出了基于不同的操作类型改进服务提供的方法,例如需要实时响应的操作,允许用户操作与机器人通过网络移动之间延迟的操作。
{"title":"A Virtual Campus Tour Service Using Mobile Robots","authors":"M. Fujita, Y. Tokiwa, Osamu Ohashi, Y. Kato","doi":"10.1109/WAINA.2014.55","DOIUrl":"https://doi.org/10.1109/WAINA.2014.55","url":null,"abstract":"When we discuss operability and convenience of remote control robot systems, it was usual to focus on user interfaces to operate robots. In this paper, we propose to improve methods of service providing based on the different operation types, e.g. Operation which requires real time response, operation which allows delay between user operation and robot movement via networks.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122891618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Semantic Valence Modeling: Emotion Recognition and Affective States in Context-Aware Systems 语义效价建模:情境感知系统中的情绪识别和情感状态
P. Moore, F. Xhafa, L. Barolli
Defining and describing a context requires knowledge (contextual information), while research is addressing a wider range of potential contextual information in a diverse range of domains the diversity of potential contextual information has not been effectively addressed. This paper considers the implementation of context and identifies emotion (more accurately emotional response) as a factor in the personalization of services as under-represented in the literature. We propose semantic valence modeling implemented in fuzzy rule-based systems as a potential solution to the implementation of emotional responses in context-aware systems. It is concluded that the effective implementation of emotional responses based on the posited approach will improve the accuracy of personalized service provision and additionally offers the potential to improve the levels of computational intelligence in context-aware domains and systems.
定义和描述上下文需要知识(上下文信息),虽然研究正在解决不同领域中更广泛的潜在上下文信息,但潜在上下文信息的多样性尚未得到有效解决。本文考虑了情境的实施,并将情感(更准确地说是情绪反应)确定为文献中代表性不足的个性化服务的一个因素。我们提出在基于模糊规则的系统中实现语义价模型,作为在上下文感知系统中实现情绪反应的潜在解决方案。结论是,基于假设方法的情绪反应的有效实施将提高个性化服务提供的准确性,并且还提供了提高上下文感知领域和系统中计算智能水平的潜力。
{"title":"Semantic Valence Modeling: Emotion Recognition and Affective States in Context-Aware Systems","authors":"P. Moore, F. Xhafa, L. Barolli","doi":"10.1109/WAINA.2014.88","DOIUrl":"https://doi.org/10.1109/WAINA.2014.88","url":null,"abstract":"Defining and describing a context requires knowledge (contextual information), while research is addressing a wider range of potential contextual information in a diverse range of domains the diversity of potential contextual information has not been effectively addressed. This paper considers the implementation of context and identifies emotion (more accurately emotional response) as a factor in the personalization of services as under-represented in the literature. We propose semantic valence modeling implemented in fuzzy rule-based systems as a potential solution to the implementation of emotional responses in context-aware systems. It is concluded that the effective implementation of emotional responses based on the posited approach will improve the accuracy of personalized service provision and additionally offers the potential to improve the levels of computational intelligence in context-aware domains and systems.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121608107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Performance Analysis of Artificial Neural Network-Based Learning Schemes for Cognitive Radio Systems in LTE-UL 基于人工神经网络的LTE-UL认知无线电系统学习方案性能分析
Ahsan Adeel, H. Larijani, A. Ahmadinia
Cognitive radio is widely accepted as a promising technology to intelligently manage the scarce radio resources and correspondingly select the optimal radio configurations. The process of cognition is challenging because of the trade-offs among response time, accuracy, available training samples, and NN structure complexity, which is a limiting factor for cognitive radio (CR) to achieve optimal configuration settings in real time. In this paper, a complex model of LTE uplink is analysed and a cognitive engine(CE) is introduced with ANN as an artificial intelligence technique. The CE is characterizing the achievable communication performance of all available secondary and primary users configurations. Furthermore, Suggesting the optimal radio configurations, taking into account the user requirements as well as the electromagnetic environment. Performance evaluation of the proposed ANN has revealed 60% improvement in accuracy and efficiency as compared to existing ANN models for the same parameters configurations.
认知无线电作为一种智能管理稀缺无线电资源并选择最佳无线电配置的技术,被广泛接受。认知过程具有挑战性,因为在响应时间,准确性,可用训练样本和神经网络结构复杂性之间进行权衡,这是限制认知无线电(CR)实时实现最佳配置设置的因素。本文分析了LTE上行链路的复杂模型,引入了一种基于人工智能技术的认知引擎(CE)。CE描述了所有可用的辅助和主要用户配置的可实现通信性能。在考虑用户需求和电磁环境的基础上,提出最优的无线电配置方案。对所提出的人工神经网络的性能评估显示,在相同参数配置下,与现有的人工神经网络模型相比,准确率和效率提高了60%。
{"title":"Performance Analysis of Artificial Neural Network-Based Learning Schemes for Cognitive Radio Systems in LTE-UL","authors":"Ahsan Adeel, H. Larijani, A. Ahmadinia","doi":"10.1109/WAINA.2014.116","DOIUrl":"https://doi.org/10.1109/WAINA.2014.116","url":null,"abstract":"Cognitive radio is widely accepted as a promising technology to intelligently manage the scarce radio resources and correspondingly select the optimal radio configurations. The process of cognition is challenging because of the trade-offs among response time, accuracy, available training samples, and NN structure complexity, which is a limiting factor for cognitive radio (CR) to achieve optimal configuration settings in real time. In this paper, a complex model of LTE uplink is analysed and a cognitive engine(CE) is introduced with ANN as an artificial intelligence technique. The CE is characterizing the achievable communication performance of all available secondary and primary users configurations. Furthermore, Suggesting the optimal radio configurations, taking into account the user requirements as well as the electromagnetic environment. Performance evaluation of the proposed ANN has revealed 60% improvement in accuracy and efficiency as compared to existing ANN models for the same parameters configurations.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123850611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power-Latency Trade-offs in Virtualized Environments 虚拟化环境中的功率-延迟权衡
W. Dargie, Jianjun Wen
The adoption of server virtualization and cloud computing has enabled high flexibility of service execution in the Internet. It also promises the efficient use of resources including power. At present, the cloud infrastructure (physical machines and cloud platforms) and the services employing the infrastructure are managed by independent entities. As a result, it is difficult to jointly configure hardware and software resources, which may introduce significant inefficiency of resource utilization. Often infrastructure providers over provision resources to accommodate a growing demand, but the cost of such inefficiency is gradually being felt by both parties. This paper experimentally examines the effect of system configuration (concurrency) on the power consumption and latency of a video hosting server. We find that the usefulness of concurrency is greatly influenced by the interplay of underlying leased resources and by the interaction of virtual machines with these resources. However, the exact nature of this interplay is difficult to quantitatively establish and, therefore, it is not presented to service providers. Our study encourages the scientific community to pay attention to this aspect and to undertake a more rigorous investigation based on practical observations.
服务器虚拟化和云计算的采用使Internet上的服务执行具有很高的灵活性。它还承诺有效利用包括电力在内的资源。目前,云基础设施(物理机和云平台)和使用该基础设施的服务由独立实体管理。因此,硬件和软件资源难以共同配置,这可能会导致资源利用效率低下。基础设施提供商通常会过度提供资源以满足不断增长的需求,但这种低效率的成本正逐渐被双方感受到。本文通过实验研究了系统配置(并发)对视频主机服务器功耗和延迟的影响。我们发现并发的有用性很大程度上受到底层租用资源的相互作用以及虚拟机与这些资源的相互作用的影响。然而,这种相互作用的确切性质难以定量确定,因此没有向服务提供者提出。我们的研究鼓励科学界关注这方面,并在实际观察的基础上进行更严格的调查。
{"title":"Power-Latency Trade-offs in Virtualized Environments","authors":"W. Dargie, Jianjun Wen","doi":"10.1109/WAINA.2014.67","DOIUrl":"https://doi.org/10.1109/WAINA.2014.67","url":null,"abstract":"The adoption of server virtualization and cloud computing has enabled high flexibility of service execution in the Internet. It also promises the efficient use of resources including power. At present, the cloud infrastructure (physical machines and cloud platforms) and the services employing the infrastructure are managed by independent entities. As a result, it is difficult to jointly configure hardware and software resources, which may introduce significant inefficiency of resource utilization. Often infrastructure providers over provision resources to accommodate a growing demand, but the cost of such inefficiency is gradually being felt by both parties. This paper experimentally examines the effect of system configuration (concurrency) on the power consumption and latency of a video hosting server. We find that the usefulness of concurrency is greatly influenced by the interplay of underlying leased resources and by the interaction of virtual machines with these resources. However, the exact nature of this interplay is difficult to quantitatively establish and, therefore, it is not presented to service providers. Our study encourages the scientific community to pay attention to this aspect and to undertake a more rigorous investigation based on practical observations.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124087334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LEDBAT-MP -- On the Application of "Lower-than-Best-Effort" for Concurrent Multipath Transfer LEDBAT-MP——“低于最佳努力”在并发多路径传输中的应用
Hakim Adhari, Sebastian Werner, T. Dreibholz, E. Rathgeb
The Internet is based on best effort communication, i.e. It tries to deliver packets but does not provide any guarantees. A transport protocol can make use of this best effort service to provide a suitable service to its applications. Also, its congestion control is responsible for a fair distribution of the resources within the Internet. However, background data transfer applications (like file sharing or update fetching) do not require "best effort", they in fact could use a "lower-than-best-effort" service to leave resources to more important applications if needed. For this purpose, the Low Extra Delay Background Transport (LEDBAT) algorithm has been standardized by the IETF. Nowadays, multi-homing is becoming increasingly common in modern networks and several approaches to exploit this feature (e.g. CMT-SCTP, MPTCP) have evolved that are able to combine resources of multiple paths. For background traffic oriented algorithms like LEDBAT, this feature could be of great use, too, i.e. By increasing the overall bandwidth while shifting the transmission away from paths which are used by other flows. This could be particularly useful for non-critical bulk transfers in data centres. In this paper, we introduce our approach LEDBAT for Multi-Path - denoted as LEDBAT-MP - and analyze its performance by simulations. With this paper, we want to highlight some generic design questions and start a discussion on how a solid universal background multi-path congestion control strategy should behave.
因特网是基于尽力通信的,也就是说,它尽力传送数据包,但不提供任何保证。传输协议可以利用这种“尽力而为”服务为其应用程序提供合适的服务。此外,它的拥塞控制负责公平分配互联网内的资源。然而,后台数据传输应用程序(如文件共享或更新获取)不需要“尽最大努力”,事实上,它们可以使用“低于最大努力”的服务,在需要时将资源留给更重要的应用程序。为此,IETF对低额外延迟背景传输(LEDBAT)算法进行了标准化。如今,多归巢在现代网络中变得越来越普遍,并且已经发展了几种利用这一特性的方法(例如CMT-SCTP、MPTCP),这些方法能够组合多个路径的资源。对于像LEDBAT这样的面向后台流量的算法,这个特性也会有很大的用处,即在增加总带宽的同时,将传输从其他流使用的路径上转移开。这对于数据中心的非关键批量传输尤其有用。本文介绍了一种基于多路径的LEDBAT- mp方法,并通过仿真分析了其性能。在本文中,我们想强调一些通用的设计问题,并开始讨论一个坚实的通用背景多路径拥塞控制策略应该如何表现。
{"title":"LEDBAT-MP -- On the Application of \"Lower-than-Best-Effort\" for Concurrent Multipath Transfer","authors":"Hakim Adhari, Sebastian Werner, T. Dreibholz, E. Rathgeb","doi":"10.1109/WAINA.2014.125","DOIUrl":"https://doi.org/10.1109/WAINA.2014.125","url":null,"abstract":"The Internet is based on best effort communication, i.e. It tries to deliver packets but does not provide any guarantees. A transport protocol can make use of this best effort service to provide a suitable service to its applications. Also, its congestion control is responsible for a fair distribution of the resources within the Internet. However, background data transfer applications (like file sharing or update fetching) do not require \"best effort\", they in fact could use a \"lower-than-best-effort\" service to leave resources to more important applications if needed. For this purpose, the Low Extra Delay Background Transport (LEDBAT) algorithm has been standardized by the IETF. Nowadays, multi-homing is becoming increasingly common in modern networks and several approaches to exploit this feature (e.g. CMT-SCTP, MPTCP) have evolved that are able to combine resources of multiple paths. For background traffic oriented algorithms like LEDBAT, this feature could be of great use, too, i.e. By increasing the overall bandwidth while shifting the transmission away from paths which are used by other flows. This could be particularly useful for non-critical bulk transfers in data centres. In this paper, we introduce our approach LEDBAT for Multi-Path - denoted as LEDBAT-MP - and analyze its performance by simulations. With this paper, we want to highlight some generic design questions and start a discussion on how a solid universal background multi-path congestion control strategy should behave.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124272399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Need of a Hybrid Storage Approach for IoT in PaaS Cloud Federation PaaS云联盟中物联网混合存储方法的需求
M. Fazio, A. Celesti, M. Villari, A. Puliafito
Monitoring activities over many different types of sensors are very challenging to support advanced services for Internet of Things (IoT) and its future. However, one of the major issues is the explosion of the amount of heterogeneous information that has to be stored and processed, thus causing the well known Big Data problem. Some Cloud strategies have been investigated to offer IoT-oriented services, but they do not specifically address solutions for Big Data management. In this paper, we present a two-layer architecture based on a hybrid storage system able to support a Platform as a Service (PaaS) federated Cloud scenario. The proposed architecture combines the benefits of both storage approaches. In particular, it allows us on one hand to extend SQL-like legacy systems, and on the other hand to manage Big Data through an XML-like, non-SQL distributed storage system according to a Cloud federation approach.
在许多不同类型的传感器上监测活动对于支持物联网(IoT)及其未来的高级服务非常具有挑战性。然而,其中一个主要问题是必须存储和处理的异构信息数量的爆炸式增长,从而导致了众所周知的大数据问题。一些云策略已经被研究过,以提供面向物联网的服务,但它们并没有专门针对大数据管理的解决方案。在本文中,我们提出了一个基于混合存储系统的两层架构,该系统能够支持平台即服务(PaaS)联邦云场景。所建议的体系结构结合了这两种存储方法的优点。特别是,它一方面允许我们扩展类似sql的遗留系统,另一方面允许我们根据云联合方法通过类似xml的非sql分布式存储系统管理大数据。
{"title":"The Need of a Hybrid Storage Approach for IoT in PaaS Cloud Federation","authors":"M. Fazio, A. Celesti, M. Villari, A. Puliafito","doi":"10.1109/WAINA.2014.162","DOIUrl":"https://doi.org/10.1109/WAINA.2014.162","url":null,"abstract":"Monitoring activities over many different types of sensors are very challenging to support advanced services for Internet of Things (IoT) and its future. However, one of the major issues is the explosion of the amount of heterogeneous information that has to be stored and processed, thus causing the well known Big Data problem. Some Cloud strategies have been investigated to offer IoT-oriented services, but they do not specifically address solutions for Big Data management. In this paper, we present a two-layer architecture based on a hybrid storage system able to support a Platform as a Service (PaaS) federated Cloud scenario. The proposed architecture combines the benefits of both storage approaches. In particular, it allows us on one hand to extend SQL-like legacy systems, and on the other hand to manage Big Data through an XML-like, non-SQL distributed storage system according to a Cloud federation approach.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Targeted Attack Prevention at Early Stage 早期针对性攻击防范
Chia-Mei Chen, Peng-Yu Yang, Ya-Hui Ou, H. Hsiao
Targeted cyber attacks play a critical role in disrupting network infrastructure and information privacy. Based on the incident investigation, Intelligence gathering is the first phase of such attacks. To evade detection, hacker may make use of botnet, a set of zombie machines, to gain the access of a target and the zombies send the collected results back to the hacker. Even though the zombies would be blocked by detection system, the hacker, using the access information obtained from the botnet, would login the target from another machine without being noticed by the detection system. Such information gathering tactic can evade detection and the hacker grants the initial access to the target. The proposed defense system analyzes multiple logs from the network and extracts the reconnaissance attack sequences related to targeted attacks. State-based model is adopted to model the steps of the above early phase attack performed by multiple scouts and an intruder and such attack events in a long time frame becomes significant in the state-aware model. The results show that the proposed system can identify the attacks at the early stage efficiently to prevent further damage in the networks.
有针对性的网络攻击在破坏网络基础设施和信息隐私方面发挥着关键作用。根据事件调查,情报收集是此类攻击的第一阶段。为了逃避检测,黑客可能会利用僵尸网络(botnet),即一组僵尸机器,获得目标的访问权限,僵尸将收集到的结果发送给黑客。即使僵尸被检测系统阻止,黑客也可以利用从僵尸网络获得的访问信息,在不被检测系统发现的情况下,从另一台机器登录目标。这种信息收集策略可以逃避检测,黑客授予对目标的初始访问权。该防御系统对来自网络的多个日志进行分析,提取与目标攻击相关的侦察攻击序列。采用基于状态的模型对多个侦察兵和一个入侵者进行上述早期攻击的步骤进行建模,这种攻击事件在较长的时间框架内在状态感知模型中变得重要。结果表明,该系统能够有效地在早期识别攻击,防止对网络造成进一步破坏。
{"title":"Targeted Attack Prevention at Early Stage","authors":"Chia-Mei Chen, Peng-Yu Yang, Ya-Hui Ou, H. Hsiao","doi":"10.1109/WAINA.2014.134","DOIUrl":"https://doi.org/10.1109/WAINA.2014.134","url":null,"abstract":"Targeted cyber attacks play a critical role in disrupting network infrastructure and information privacy. Based on the incident investigation, Intelligence gathering is the first phase of such attacks. To evade detection, hacker may make use of botnet, a set of zombie machines, to gain the access of a target and the zombies send the collected results back to the hacker. Even though the zombies would be blocked by detection system, the hacker, using the access information obtained from the botnet, would login the target from another machine without being noticed by the detection system. Such information gathering tactic can evade detection and the hacker grants the initial access to the target. The proposed defense system analyzes multiple logs from the network and extracts the reconnaissance attack sequences related to targeted attacks. State-based model is adopted to model the steps of the above early phase attack performed by multiple scouts and an intruder and such attack events in a long time frame becomes significant in the state-aware model. The results show that the proposed system can identify the attacks at the early stage efficiently to prevent further damage in the networks.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115003671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 28th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1