首页 > 最新文献

2014 International Conference and Workshop on the Network of the Future (NOF)最新文献

英文 中文
Hybrid Distributed Mobility Management for next-generation wireless networks 下一代无线网络的混合分布式移动管理
Pub Date : 2014-12-20 DOI: 10.1109/NOF.2014.7119764
Giorgos Chochlidakis, V. Friderikos
One of key challenges for emerging and future wireless networks will be the support of seamless distributed IP mobility management to support a plethora of different applications. In this paper, an optimization problem for provisioning efficient centralized Mobility Agents (MAs) deployment is formulated, as well as a realistic model is developed for the Distributed Mobility Management (DMM) scheme. These are subsequently compared in terms of various key characteristics, such as routing cost, delay and topology dependence. Then, an innovative Hybrid Distributed Mobility Management (HDMM) scheme is presented that provides improved network performance in terms of handover support for delay sensitive flows, compared to fully DMM schemes, which their performance can be strongly topology-dependent. The proposed scheme combines the centralized and distributed mobility support, depending on the network's topology characteristics. A wide set of numerical investigations reveal the advantages of the DMM scheme over the centralized scheme for different network cases and detail the reasons why future networks tend to decentralize mobility management functionalities. Simulation results, also, show that the proposed HDMM scheme can significantly improve the network's performance and the achieved QoS of the end-users, allowing seamless mobility support for delay intolerant over-the-top services (e.g. VoIP).
新兴和未来无线网络面临的关键挑战之一将是支持无缝分布式IP移动管理,以支持大量不同的应用程序。本文提出了提供高效的集中移动代理(MAs)部署的优化问题,并为分布式移动管理(DMM)方案建立了一个现实模型。随后,根据各种关键特性对它们进行比较,例如路由成本、延迟和拓扑依赖性。然后,提出了一种创新的混合分布式移动管理(HDMM)方案,与完全DMM方案相比,该方案在支持延迟敏感流的切换方面提供了改进的网络性能,而完全DMM方案的性能可能强烈依赖拓扑。该方案根据网络的拓扑特点,将集中式和分布式移动支持相结合。大量的数值研究揭示了DMM方案在不同网络情况下相对于集中式方案的优势,并详细说明了未来网络倾向于分散移动管理功能的原因。仿真结果还表明,所提出的HDMM方案可以显著提高网络性能和最终用户的QoS,为延迟不容忍的over- top业务(如VoIP)提供无缝移动支持。
{"title":"Hybrid Distributed Mobility Management for next-generation wireless networks","authors":"Giorgos Chochlidakis, V. Friderikos","doi":"10.1109/NOF.2014.7119764","DOIUrl":"https://doi.org/10.1109/NOF.2014.7119764","url":null,"abstract":"One of key challenges for emerging and future wireless networks will be the support of seamless distributed IP mobility management to support a plethora of different applications. In this paper, an optimization problem for provisioning efficient centralized Mobility Agents (MAs) deployment is formulated, as well as a realistic model is developed for the Distributed Mobility Management (DMM) scheme. These are subsequently compared in terms of various key characteristics, such as routing cost, delay and topology dependence. Then, an innovative Hybrid Distributed Mobility Management (HDMM) scheme is presented that provides improved network performance in terms of handover support for delay sensitive flows, compared to fully DMM schemes, which their performance can be strongly topology-dependent. The proposed scheme combines the centralized and distributed mobility support, depending on the network's topology characteristics. A wide set of numerical investigations reveal the advantages of the DMM scheme over the centralized scheme for different network cases and detail the reasons why future networks tend to decentralize mobility management functionalities. Simulation results, also, show that the proposed HDMM scheme can significantly improve the network's performance and the achieved QoS of the end-users, allowing seamless mobility support for delay intolerant over-the-top services (e.g. VoIP).","PeriodicalId":435905,"journal":{"name":"2014 International Conference and Workshop on the Network of the Future (NOF)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132367007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Personalized and seamless Wi-Fi access to Venue-Based Services 个性化和无缝Wi-Fi接入到基于场地的服务
Pub Date : 2014-12-03 DOI: 10.1109/NOF.2014.7119770
F. Jemaa, Michel Pariente
Due to the proliferation of Wi-Fi hotspots in public indoor areas (such as restaurants, airport, and shopping malls) and the ubiquity of Wi-Fi in mobile devices, Venue-Based Services are increasingly deployed by venue owners and Wi-Fi operators in their networks to improve their users' experience and generate new revenue streams. These services are locally offered by the venue and client mobile devices should typically authenticate and associate to Wi-Fi networks to be able to discover these services. However, end-users often prefer to associate to a Wi-Fi network only if it offers the specific service they need. Moreover, they no longer want to intervene frequently to manually search for and choose a network which offers the desired service. Therefore, providing more personalization and transparency for access to Wi-Fi networks and services becomes a crucial concern and requirement to give customers the user experience they desire and expect. This paper proposes a solution to enable venue service discovery prior to Wi-Fi association while avoiding channel overhead and defines a set of service labels to uniquely and globally identify the most known venue-based services. We show then how these two contributions could be efficient and useful and help to have a personalized, transparent and automated access to venue-based services through Wi-Fi networks.
由于公共室内区域(如餐馆、机场和购物中心)Wi-Fi热点的激增以及移动设备中Wi-Fi的无处不在,场地所有者和Wi-Fi运营商越来越多地在其网络中部署基于场地的服务,以改善用户体验并产生新的收入来源。这些服务由场地在本地提供,客户端移动设备通常应该验证并关联到Wi-Fi网络,以便能够发现这些服务。然而,终端用户通常只在Wi-Fi网络提供他们需要的特定服务时才会选择它。此外,他们不再希望频繁地干预手动搜索和选择提供所需服务的网络。因此,为Wi-Fi网络和服务的接入提供更多的个性化和透明度,成为为客户提供他们渴望和期望的用户体验的关键问题和要求。本文提出了一种解决方案,可以在Wi-Fi关联之前实现场地服务发现,同时避免了信道开销,并定义了一组服务标签,以唯一地、全局地识别最知名的基于场地的服务。然后,我们将展示这两个贡献如何有效和有用,并帮助通过Wi-Fi网络实现对基于场所的服务的个性化、透明和自动化访问。
{"title":"Personalized and seamless Wi-Fi access to Venue-Based Services","authors":"F. Jemaa, Michel Pariente","doi":"10.1109/NOF.2014.7119770","DOIUrl":"https://doi.org/10.1109/NOF.2014.7119770","url":null,"abstract":"Due to the proliferation of Wi-Fi hotspots in public indoor areas (such as restaurants, airport, and shopping malls) and the ubiquity of Wi-Fi in mobile devices, Venue-Based Services are increasingly deployed by venue owners and Wi-Fi operators in their networks to improve their users' experience and generate new revenue streams. These services are locally offered by the venue and client mobile devices should typically authenticate and associate to Wi-Fi networks to be able to discover these services. However, end-users often prefer to associate to a Wi-Fi network only if it offers the specific service they need. Moreover, they no longer want to intervene frequently to manually search for and choose a network which offers the desired service. Therefore, providing more personalization and transparency for access to Wi-Fi networks and services becomes a crucial concern and requirement to give customers the user experience they desire and expect. This paper proposes a solution to enable venue service discovery prior to Wi-Fi association while avoiding channel overhead and defines a set of service labels to uniquely and globally identify the most known venue-based services. We show then how these two contributions could be efficient and useful and help to have a personalized, transparent and automated access to venue-based services through Wi-Fi networks.","PeriodicalId":435905,"journal":{"name":"2014 International Conference and Workshop on the Network of the Future (NOF)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124981337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blind Packet Forwarding in a hierarchical architecture with Locator/Identifier Split 具有定位符/标识符分割的分层结构中的盲包转发
Pub Date : 2014-12-01 DOI: 10.1109/NOF.2014.7119775
I. Simsek, Yves Igor Jerschow, M. Becke, E. Rathgeb
In our previous work, we discussed the issue that with existing techniques we can either provide end-to-end information security or establish smart in-network services. Using the example of Blind Packet Forwarding (BPF), we demonstrated the feasibility to simultaneously realise both goals. However, the basic BPF design is not sufficiently scalable and lacks support for mobility and multihoming. This paper focuses on the issues of the basic BPF design and resolves them by applying the Locator/Identifier Split approach. We extend our BPF design and especially adopt the features of the Hierarchical Architecture for Internet Routing (HAIR). Additionally, we present our prototype implementation of the improved BPF, which benefits from the flow-based forwarding in OpenFlow, and evaluate it.
在我们之前的工作中,我们讨论了使用现有技术可以提供端到端信息安全或建立智能网络内服务的问题。以盲包转发(BPF)为例,论证了同时实现这两个目标的可行性。然而,基本的BPF设计没有足够的可扩展性,并且缺乏对移动性和多宿主的支持。本文重点讨论了BPF基本设计中存在的问题,并采用定位符/标识符分离的方法解决了这些问题。我们扩展了我们的BPF设计,特别是采用了互联网路由的层次结构(HAIR)的特点。此外,我们提出了改进的BPF的原型实现,它受益于OpenFlow中基于流的转发,并对其进行了评估。
{"title":"Blind Packet Forwarding in a hierarchical architecture with Locator/Identifier Split","authors":"I. Simsek, Yves Igor Jerschow, M. Becke, E. Rathgeb","doi":"10.1109/NOF.2014.7119775","DOIUrl":"https://doi.org/10.1109/NOF.2014.7119775","url":null,"abstract":"In our previous work, we discussed the issue that with existing techniques we can either provide end-to-end information security or establish smart in-network services. Using the example of Blind Packet Forwarding (BPF), we demonstrated the feasibility to simultaneously realise both goals. However, the basic BPF design is not sufficiently scalable and lacks support for mobility and multihoming. This paper focuses on the issues of the basic BPF design and resolves them by applying the Locator/Identifier Split approach. We extend our BPF design and especially adopt the features of the Hierarchical Architecture for Internet Routing (HAIR). Additionally, we present our prototype implementation of the improved BPF, which benefits from the flow-based forwarding in OpenFlow, and evaluate it.","PeriodicalId":435905,"journal":{"name":"2014 International Conference and Workshop on the Network of the Future (NOF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129303781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SDN-based Trusted Path Control 基于sdn的可信路径控制
Pub Date : 2014-12-01 DOI: 10.1109/NOF.2014.7119799
S. Betgé-Brezetz, Guy-Bertrand Kamga, Ali El Amrani Joutei, Oussama Maalmi
Security of sensitive data in the network is a key issue in a world where such sensitive data can easily be transferred between different servers and locations (e.g., in networked clouds). In this context, there is a particular need to control the path followed by the data when they move across the cloud (e.g., to avoid crossing -even encrypted- un-trusted nodes or areas). In this paper we proposed therefore a new approach which aims to leverage the programmability offered by the SDN technology in order to enforce a trusted path for the transfer of sensitive data in the network. Given a policy related to the sensitive data (e.g., the data should not cross a given area), our approach allows sending this policy to an extended SDN controller (called Trusted Path Controller) which automatically enforces this policy in the SDN network. Two architectures have been investigated: the Out-of-Band architecture (the policy being sent to the Trusted Path Controller via a Web Service interface) and the In-Band architecture (the policy being sent to the Trusted Path Controller via a dedicated “signaling packet”). These two architectures have been implemented in a SDN controller. Experimentations and evaluations have also been performed on a test-bed of SDN switches which allow showing the feasibility of this approach as well as its performances.
网络中敏感数据的安全性是一个关键问题,因为这些敏感数据可以很容易地在不同的服务器和位置之间传输(例如,在网络云中)。在这种情况下,特别需要控制数据在云中移动时所遵循的路径(例如,避免穿越(甚至加密)不受信任的节点或区域)。因此,在本文中,我们提出了一种新的方法,旨在利用SDN技术提供的可编程性,以便为网络中敏感数据的传输提供可信路径。给定与敏感数据相关的策略(例如,数据不应该跨越给定区域),我们的方法允许将此策略发送到扩展的SDN控制器(称为可信路径控制器),该控制器在SDN网络中自动执行此策略。研究了两种体系结构:带外体系结构(通过Web服务接口将策略发送到可信路径控制器)和带内体系结构(通过专用的“信令包”将策略发送到可信路径控制器)。这两种架构已经在SDN控制器中实现。在SDN交换机的测试台上也进行了实验和评估,以显示该方法的可行性及其性能。
{"title":"SDN-based Trusted Path Control","authors":"S. Betgé-Brezetz, Guy-Bertrand Kamga, Ali El Amrani Joutei, Oussama Maalmi","doi":"10.1109/NOF.2014.7119799","DOIUrl":"https://doi.org/10.1109/NOF.2014.7119799","url":null,"abstract":"Security of sensitive data in the network is a key issue in a world where such sensitive data can easily be transferred between different servers and locations (e.g., in networked clouds). In this context, there is a particular need to control the path followed by the data when they move across the cloud (e.g., to avoid crossing -even encrypted- un-trusted nodes or areas). In this paper we proposed therefore a new approach which aims to leverage the programmability offered by the SDN technology in order to enforce a trusted path for the transfer of sensitive data in the network. Given a policy related to the sensitive data (e.g., the data should not cross a given area), our approach allows sending this policy to an extended SDN controller (called Trusted Path Controller) which automatically enforces this policy in the SDN network. Two architectures have been investigated: the Out-of-Band architecture (the policy being sent to the Trusted Path Controller via a Web Service interface) and the In-Band architecture (the policy being sent to the Trusted Path Controller via a dedicated “signaling packet”). These two architectures have been implemented in a SDN controller. Experimentations and evaluations have also been performed on a test-bed of SDN switches which allow showing the feasibility of this approach as well as its performances.","PeriodicalId":435905,"journal":{"name":"2014 International Conference and Workshop on the Network of the Future (NOF)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128174542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Autonomous architecture for managing firewalling Cloud-based service 用于管理防火墙的自治架构
Pub Date : 2014-12-01 DOI: 10.1109/NOF.2014.7119774
F. Guenane, Bendriss Jaafar, M. N. Lima, G. Pujolle
The Cloud computing model is considered as a very promising internet-based computing platform, the resources it provides to create virtual machines are rarely used to manage security. Researchers used this power in a new way, in order to offer new security services based on Cloud paradigm to copc with threats such as DDOS (Distribute Denial Of Service) attacks, using the extensible resources and other Cloud's characteristics. Our model is based on the SECaaS (SECurity as a Service) to manage security using specialized virtual firewalls proposed as a service by the Cloud Provider. The main advantage of this approach is to instantiate firewalls when needed and adapt resources to filter the network flow avoiding bottlenecks and congestion. In this paper, we present a new autonomous model to manage cloud based firewalling services using the Multi-Agent System. The aim of this solution is to manage and provide optimal resource provisioning for this type of service.
云计算模型被认为是一个非常有前途的基于互联网的计算平台,它提供的用于创建虚拟机的资源很少用于管理安全性。研究人员以一种新的方式使用了这种能力,以提供基于云范式的新安全服务来应对DDOS(分布式拒绝服务)攻击等威胁,利用可扩展的资源和其他云的特征。我们的模型基于SECaaS(安全即服务)来管理安全性,使用由云提供商作为服务提出的专用虚拟防火墙。这种方法的主要优点是在需要时实例化防火墙,并调整资源以过滤网络流,避免瓶颈和拥塞。在本文中,我们提出了一种新的自治模型,利用多代理系统来管理基于云的防火墙服务。此解决方案的目的是管理并为此类服务提供最佳的资源供应。
{"title":"Autonomous architecture for managing firewalling Cloud-based service","authors":"F. Guenane, Bendriss Jaafar, M. N. Lima, G. Pujolle","doi":"10.1109/NOF.2014.7119774","DOIUrl":"https://doi.org/10.1109/NOF.2014.7119774","url":null,"abstract":"The Cloud computing model is considered as a very promising internet-based computing platform, the resources it provides to create virtual machines are rarely used to manage security. Researchers used this power in a new way, in order to offer new security services based on Cloud paradigm to copc with threats such as DDOS (Distribute Denial Of Service) attacks, using the extensible resources and other Cloud's characteristics. Our model is based on the SECaaS (SECurity as a Service) to manage security using specialized virtual firewalls proposed as a service by the Cloud Provider. The main advantage of this approach is to instantiate firewalls when needed and adapt resources to filter the network flow avoiding bottlenecks and congestion. In this paper, we present a new autonomous model to manage cloud based firewalling services using the Multi-Agent System. The aim of this solution is to manage and provide optimal resource provisioning for this type of service.","PeriodicalId":435905,"journal":{"name":"2014 International Conference and Workshop on the Network of the Future (NOF)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115086283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Q-learning-based data replication for highly dynamic distributed hash tables 基于q学习的高动态分布式哈希表数据复制
Pub Date : 2014-12-01 DOI: 10.1109/NOF.2014.7119771
S. Feki, W. Louati, N. Masmoudi, M. Jmaiel
This paper focuses on data replication in structured peer-to-peer systems over highly dynamic networks. A Q-learning-based replication approach is proposed. Data availability is periodically computed using the Q-learning function. The reward/penalty property of this function attenuates the impact of the network dynamism on the replication overhead. Hence, the departure of a node does not necessarily lead to the addition of a replica in the network. The replication process is triggered according to the overall data availability. Simulation results proved that the proposed approach ensures data availability in dynamic environments with minimum data transfer costs.
本文主要研究高度动态网络中结构化点对点系统中的数据复制。提出了一种基于q学习的复制方法。使用Q-learning函数定期计算数据可用性。该函数的奖惩特性减弱了网络动态对复制开销的影响。因此,一个节点的离开并不一定会导致网络中增加一个副本。根据数据的整体可用性触发复制进程。仿真结果表明,该方法以最小的数据传输代价保证了动态环境下的数据可用性。
{"title":"Q-learning-based data replication for highly dynamic distributed hash tables","authors":"S. Feki, W. Louati, N. Masmoudi, M. Jmaiel","doi":"10.1109/NOF.2014.7119771","DOIUrl":"https://doi.org/10.1109/NOF.2014.7119771","url":null,"abstract":"This paper focuses on data replication in structured peer-to-peer systems over highly dynamic networks. A Q-learning-based replication approach is proposed. Data availability is periodically computed using the Q-learning function. The reward/penalty property of this function attenuates the impact of the network dynamism on the replication overhead. Hence, the departure of a node does not necessarily lead to the addition of a replica in the network. The replication process is triggered according to the overall data availability. Simulation results proved that the proposed approach ensures data availability in dynamic environments with minimum data transfer costs.","PeriodicalId":435905,"journal":{"name":"2014 International Conference and Workshop on the Network of the Future (NOF)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129381483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A low computational design of multiuser MIMO system using large scale array antenna 采用大规模阵列天线的多用户MIMO系统的低计算设计
Pub Date : 2014-12-01 DOI: 10.1109/NOF.2014.7119761
T. Taniguchi, Y. Karasawa
This paper describes efficient design method of MIMO downlink system adopting large scale array antenna in transmitter side. The proposed approach is suitable when the number of receivers is small compared with the maximum value. First, the large scale antenna is divided into several subarrays, then each of them is designed based on the concept of block diagonalization, and they are combined again as an array of original size. By this operation, the computational load for multiuser design is significantly reduced, which means the proposed method can be applied even in the situation the conventional block diagonalization is computationally impractical. To cope with the uncertainty of receiver weight, two types of procedures are considered, namely, the transmitter first design, and the receiver first transmitter second design approaches. Through computer simulations, it is shown that receiver weight first design method has a better performance when the total stream number is smaller than the maximum value.
本文介绍了在发射端采用大规模阵列天线的MIMO下行系统的有效设计方法。该方法适用于接收机数量相对于最大值较小的情况。首先,将大型天线分成若干个子阵,然后根据分块对角化的概念对每个子阵进行设计,并将它们重新组合为原始尺寸的阵列。通过这种操作,大大减少了多用户设计的计算量,这意味着即使在传统的块对角化计算不切实际的情况下,所提出的方法也可以应用。为了应对接收机重量的不确定性,考虑了两种方法,即发射机优先设计方法和接收机第一发射机二次设计方法。计算机仿真结果表明,当总流数小于最大值时,接收机重量优先设计方法具有较好的性能。
{"title":"A low computational design of multiuser MIMO system using large scale array antenna","authors":"T. Taniguchi, Y. Karasawa","doi":"10.1109/NOF.2014.7119761","DOIUrl":"https://doi.org/10.1109/NOF.2014.7119761","url":null,"abstract":"This paper describes efficient design method of MIMO downlink system adopting large scale array antenna in transmitter side. The proposed approach is suitable when the number of receivers is small compared with the maximum value. First, the large scale antenna is divided into several subarrays, then each of them is designed based on the concept of block diagonalization, and they are combined again as an array of original size. By this operation, the computational load for multiuser design is significantly reduced, which means the proposed method can be applied even in the situation the conventional block diagonalization is computationally impractical. To cope with the uncertainty of receiver weight, two types of procedures are considered, namely, the transmitter first design, and the receiver first transmitter second design approaches. Through computer simulations, it is shown that receiver weight first design method has a better performance when the total stream number is smaller than the maximum value.","PeriodicalId":435905,"journal":{"name":"2014 International Conference and Workshop on the Network of the Future (NOF)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120934946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An innovative cloud-based RFID traceability architecture and service 创新的基于云的RFID可追溯性架构和服务
Pub Date : 2014-12-01 DOI: 10.1109/NOF.2014.7119772
Nour El Madhoun, F. Guenane
Today, several sectors are demanding the track of their objects to improve the efficiency and reliability of the system. RFID technology enables an automatic identification of objects attached to RFID tags via radio waves and allows reading or writing data without physical contact between an RFID reader and a tag. The main engine of RFID development is the need for traceability in order to ensure the authenticity of objects, avoid counterfeiting and track all events in the system. So, RFID technology adds intelligence to the process of identification and traceability and it is the best choice to create tracking systems. Our work aims to provide a secure RFID track and trace architecture which can be implemented in many areas and to design an RFID multi-frequency HF/UHF reader able to interact with HF or UHF tags. Moreover, to ensure and complete the historization of all sector events, we propose to enrich our traceability system with enforceable proofs through an electronic safe Cloud-based platform in a secure manner. The integration of RFID technology with a Cloud platform allows to link RFID objects to the Internet. Consequently, this network of networks represents the concept of the Internet of Things which is the key enabler for our traceability system. The present article is a report of our current research effort and our planned future work.
今天,一些部门要求跟踪他们的对象,以提高系统的效率和可靠性。RFID技术可以通过无线电波自动识别附着在RFID标签上的物体,并允许在RFID阅读器和标签之间没有物理接触的情况下读取或写入数据。RFID发展的主要引擎是对可追溯性的需求,以确保物品的真实性,避免假冒和跟踪系统中的所有事件。因此,RFID技术为识别和追溯过程增加了智能,是创建跟踪系统的最佳选择。我们的工作旨在提供一个安全的RFID跟踪和跟踪架构,可以在许多领域实现,并设计一个RFID多频HF/UHF读取器,能够与HF或UHF标签交互。此外,为了确保和完成所有部门事件的历史记录,我们建议通过电子安全云平台以安全的方式丰富我们的可追溯系统,并提供可执行的证据。RFID技术与云平台的集成允许将RFID对象连接到互联网。因此,这个网络的网络代表了物联网的概念,物联网是我们可追溯系统的关键推动者。这篇文章是我们目前的研究工作和我们未来的工作计划的报告。
{"title":"An innovative cloud-based RFID traceability architecture and service","authors":"Nour El Madhoun, F. Guenane","doi":"10.1109/NOF.2014.7119772","DOIUrl":"https://doi.org/10.1109/NOF.2014.7119772","url":null,"abstract":"Today, several sectors are demanding the track of their objects to improve the efficiency and reliability of the system. RFID technology enables an automatic identification of objects attached to RFID tags via radio waves and allows reading or writing data without physical contact between an RFID reader and a tag. The main engine of RFID development is the need for traceability in order to ensure the authenticity of objects, avoid counterfeiting and track all events in the system. So, RFID technology adds intelligence to the process of identification and traceability and it is the best choice to create tracking systems. Our work aims to provide a secure RFID track and trace architecture which can be implemented in many areas and to design an RFID multi-frequency HF/UHF reader able to interact with HF or UHF tags. Moreover, to ensure and complete the historization of all sector events, we propose to enrich our traceability system with enforceable proofs through an electronic safe Cloud-based platform in a secure manner. The integration of RFID technology with a Cloud platform allows to link RFID objects to the Internet. Consequently, this network of networks represents the concept of the Internet of Things which is the key enabler for our traceability system. The present article is a report of our current research effort and our planned future work.","PeriodicalId":435905,"journal":{"name":"2014 International Conference and Workshop on the Network of the Future (NOF)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116707937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Carrier sensing-aware rate control mechanism for future efficient WLANs 未来高效无线局域网的载波感知速率控制机制
Pub Date : 2014-12-01 DOI: 10.1109/NOF.2014.7119777
Imad Jamil, L. Cariou, J. Hélard
The rate control mechanism is an effective way to improve the overall system performance in IEEE 802.11 multi-rate networks. However, in dense environments, due to the large number of contending nodes, the packet collisions trigger unfairly the rate control mechanism to decrease the transmission data rate. In this work, we address the performance degradation problem of rate control caused by these unnecessary data rate decrements. A physical carrier sensing adaptation enhances the spatial reuse and paves the way to an adapted rate control algorithm to boost the performance of the network. Extensive simulations show a gain of 260% in achieved throughput compared to the conventional scenario.
在IEEE 802.11多速率网络中,速率控制机制是提高系统整体性能的有效途径。但在密集环境下,由于存在大量的竞争节点,报文冲突会不公平地触发速率控制机制,降低传输数据速率。在这项工作中,我们解决了由这些不必要的数据速率降低引起的速率控制性能下降问题。物理载波感知自适应增强了空间复用性,为自适应速率控制算法提高网络性能铺平了道路。广泛的模拟表明,与传统方案相比,实现的吞吐量增加了260%。
{"title":"Carrier sensing-aware rate control mechanism for future efficient WLANs","authors":"Imad Jamil, L. Cariou, J. Hélard","doi":"10.1109/NOF.2014.7119777","DOIUrl":"https://doi.org/10.1109/NOF.2014.7119777","url":null,"abstract":"The rate control mechanism is an effective way to improve the overall system performance in IEEE 802.11 multi-rate networks. However, in dense environments, due to the large number of contending nodes, the packet collisions trigger unfairly the rate control mechanism to decrease the transmission data rate. In this work, we address the performance degradation problem of rate control caused by these unnecessary data rate decrements. A physical carrier sensing adaptation enhances the spatial reuse and paves the way to an adapted rate control algorithm to boost the performance of the network. Extensive simulations show a gain of 260% in achieved throughput compared to the conventional scenario.","PeriodicalId":435905,"journal":{"name":"2014 International Conference and Workshop on the Network of the Future (NOF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
C-Chord: Hierarchical peer-to-peer protocol over a fully decentralized IaaS Cloud C-Chord:基于完全分散的IaaS云的分层点对点协议
Pub Date : 2014-12-01 DOI: 10.1109/NOF.2014.7119776
Eya Dhib, N. Tabbane, N. Zangar, K. Boussetta
Web Services publication and discovery are commonly implemented over a centralized client-server approach. Therefore, at high requests' rate server nodes are bottlenecked and the system scale is unable to follow the increasing load. To address this issue, we consider the Cloud computing concept where huge amount of resources such as, storage, processing and bandwidth capacities are available on demand. In this paper, we propose a decentralized cloud system, which aims to improve the system performances, such as requests latency and reliability, in compare with the classical centralized cloud architecture. Our solution, called C-Chord, is based on peer-to-peer hierarchical Chord network operating over a fully decentralized Infrastructure as a Service (IaaS) cloud system. In order to enhance the reliability of Web services, C-Chord relies on virtual peers that support diversification of Web Services class. It also introduces a multi-keys Web service query instead of one single key.
Web服务发布和发现通常通过集中式客户机-服务器方法实现。因此,在高请求率下,服务器节点会出现瓶颈,系统规模无法跟上负载的增长。为了解决这个问题,我们考虑了云计算概念,其中大量的资源,如存储、处理和带宽容量是按需可用的。在本文中,我们提出了一种去中心化的云系统,与传统的集中式云架构相比,它旨在提高系统的性能,如请求延迟和可靠性。我们的解决方案称为C-Chord,它基于点对点分层Chord网络,运行在一个完全分散的基础设施即服务(IaaS)云系统上。为了增强Web服务的可靠性,C-Chord依赖于支持Web服务类多样化的虚拟对等体。它还引入了一个多键Web服务查询,而不是一个键。
{"title":"C-Chord: Hierarchical peer-to-peer protocol over a fully decentralized IaaS Cloud","authors":"Eya Dhib, N. Tabbane, N. Zangar, K. Boussetta","doi":"10.1109/NOF.2014.7119776","DOIUrl":"https://doi.org/10.1109/NOF.2014.7119776","url":null,"abstract":"Web Services publication and discovery are commonly implemented over a centralized client-server approach. Therefore, at high requests' rate server nodes are bottlenecked and the system scale is unable to follow the increasing load. To address this issue, we consider the Cloud computing concept where huge amount of resources such as, storage, processing and bandwidth capacities are available on demand. In this paper, we propose a decentralized cloud system, which aims to improve the system performances, such as requests latency and reliability, in compare with the classical centralized cloud architecture. Our solution, called C-Chord, is based on peer-to-peer hierarchical Chord network operating over a fully decentralized Infrastructure as a Service (IaaS) cloud system. In order to enhance the reliability of Web services, C-Chord relies on virtual peers that support diversification of Web Services class. It also introduces a multi-keys Web service query instead of one single key.","PeriodicalId":435905,"journal":{"name":"2014 International Conference and Workshop on the Network of the Future (NOF)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124984843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 International Conference and Workshop on the Network of the Future (NOF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1