首页 > 最新文献

IET Networks最新文献

英文 中文
Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system 大坝监控与数据采集系统安全评估的通用标准和恶意入侵检测机制
IF 1.4 Q1 Mathematics Pub Date : 2024-06-06 DOI: 10.1049/ntw2.12127
Kuan-Chu Lu, I. Liu, Zong‐Chao Liu, Jung-Shian Li
Supervisory control and data acquisition (SCADA) systems are vital in monitoring and controlling industrial processes through the web. However, while such systems result in lower costs, greater utilisation efficiency, and improved reliability, they are vulnerable to cyberattacks, with consequences ranging from the inconvenience and minor disruption to severe physical damage and even loss of life. The authors evaluate the security of the Dam system in the form of Common Criteria, develop safety goals to improve this safety, and focus on threats and risks to the dam SCADA system. Finally proposes an anomaly‐based machine‐learning framework for detecting malicious network attacks in the SCADA system of a dam. Three unsupervised classification algorithms are considered: hierarchical clustering, local outlier factor, and isolation forest. It is shown that the hierarchical clustering algorithm achieves the highest precision and F‐score of the three algorithms. Overall, the results confirm the effectiveness of anomaly‐based detection algorithms in enhancing the robustness of SCADA systems toward malicious attacks. At the same time, it complies with the security objectives of Common Criteria, achieving the safety and protection of the dam.
监控和数据采集 (SCADA) 系统对通过网络监控工业流程至关重要。然而,这些系统在降低成本、提高利用效率和可靠性的同时,也很容易受到网络攻击,其后果轻则造成不便和轻微中断,重则造成严重的物理损坏,甚至造成人员伤亡。作者以通用标准的形式评估了大坝系统的安全性,制定了提高安全性的安全目标,并重点关注了大坝 SCADA 系统面临的威胁和风险。最后提出了一个基于异常的机器学习框架,用于检测大坝 SCADA 系统中的恶意网络攻击。考虑了三种无监督分类算法:分层聚类、局部离群因子和隔离林。结果表明,在三种算法中,分层聚类算法的精度和 F 分数最高。总体而言,结果证实了基于异常检测算法在增强 SCADA 系统对恶意攻击的鲁棒性方面的有效性。同时,它符合通用标准的安全目标,实现了对大坝的安全保护。
{"title":"Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system","authors":"Kuan-Chu Lu, I. Liu, Zong‐Chao Liu, Jung-Shian Li","doi":"10.1049/ntw2.12127","DOIUrl":"https://doi.org/10.1049/ntw2.12127","url":null,"abstract":"Supervisory control and data acquisition (SCADA) systems are vital in monitoring and controlling industrial processes through the web. However, while such systems result in lower costs, greater utilisation efficiency, and improved reliability, they are vulnerable to cyberattacks, with consequences ranging from the inconvenience and minor disruption to severe physical damage and even loss of life. The authors evaluate the security of the Dam system in the form of Common Criteria, develop safety goals to improve this safety, and focus on threats and risks to the dam SCADA system. Finally proposes an anomaly‐based machine‐learning framework for detecting malicious network attacks in the SCADA system of a dam. Three unsupervised classification algorithms are considered: hierarchical clustering, local outlier factor, and isolation forest. It is shown that the hierarchical clustering algorithm achieves the highest precision and F‐score of the three algorithms. Overall, the results confirm the effectiveness of anomaly‐based detection algorithms in enhancing the robustness of SCADA systems toward malicious attacks. At the same time, it complies with the security objectives of Common Criteria, achieving the safety and protection of the dam.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach 高能效、高吞吐量的移动无线传感器网络:深度强化学习方法
IF 1.4 Q1 Mathematics Pub Date : 2024-05-21 DOI: 10.1049/ntw2.12126
N. Alsalmi, K. Navaie, H. Rahmani
The efficient development of Mobile Wireless Sensor Networks (MWSNs) relies heavily on optimizing two key parameters: Throughput and Energy Consumption. The proposed work investigates network connectivity issues with MWSN and proposes two routing algorithms, namely Self‐Organising Maps based‐Optimised Link State Routing (SOM‐OLSR) and Deep Reinforcement Learning based‐Optimised Link State Routing (DRL‐OLSR) for MWSNs. The primary objective of the proposed algorithms is to achieve energy‐efficient routing while maximizing throughput. The proposed algorithms are evaluated through simulations by considering various performance metrics, including connection probability (CP), end‐to‐end delay, overhead, network throughput, and energy consumption. The simulation analysis is discussed under three scenarios. The first scenario undertakes ‘no optimisation’, the second considers SOM‐OLSR, and the third undertakes DRL‐OLSR. A comparison between DRL‐OLSR and SOM‐OLSR reveals that the former surpasses the latter in terms of low latency and prolonged network lifetime. Specifically, DRL‐OLSR demonstrates a 47% increase in throughput, a 67% reduction in energy consumption, and a CP three times higher than SOM‐OLSR. Furthermore, when contrasted with the ‘no optimisation’ scenario, DRL‐OLSR achieves a remarkable 69.7% higher throughput and nearly 89% lower energy consumption. These findings highlight the effectiveness of the DRL‐OLSR approach in wireless sensor networks.
移动无线传感器网络(MWSN)的高效发展在很大程度上依赖于两个关键参数的优化:吞吐量和能耗。本文研究了 MWSN 的网络连接问题,并为 MWSN 提出了两种路由算法,即基于自组织图的优化链路状态路由(SOM-OLSR)和基于深度强化学习的优化链路状态路由(DRL-OLSR)。所提算法的主要目标是在实现吞吐量最大化的同时实现高能效路由。通过考虑各种性能指标,包括连接概率 (CP)、端到端延迟、开销、网络吞吐量和能耗,对所提算法进行了仿真评估。仿真分析在三种情况下进行讨论。第一种情况是 "无优化",第二种情况是 SOM-OLSR,第三种情况是 DRL-OLSR。对 DRL-OLSR 和 SOM-OLSR 进行比较后发现,前者在低延迟和延长网络寿命方面优于后者。具体来说,DRL-OLSR 的吞吐量提高了 47%,能耗降低了 67%,CP 值是 SOM-OLSR 的三倍。此外,与 "无优化 "方案相比,DRL-OLSR 的吞吐量显著提高了 69.7%,能耗降低了近 89%。这些发现凸显了 DRL-OLSR 方法在无线传感器网络中的有效性。
{"title":"Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach","authors":"N. Alsalmi, K. Navaie, H. Rahmani","doi":"10.1049/ntw2.12126","DOIUrl":"https://doi.org/10.1049/ntw2.12126","url":null,"abstract":"The efficient development of Mobile Wireless Sensor Networks (MWSNs) relies heavily on optimizing two key parameters: Throughput and Energy Consumption. The proposed work investigates network connectivity issues with MWSN and proposes two routing algorithms, namely Self‐Organising Maps based‐Optimised Link State Routing (SOM‐OLSR) and Deep Reinforcement Learning based‐Optimised Link State Routing (DRL‐OLSR) for MWSNs. The primary objective of the proposed algorithms is to achieve energy‐efficient routing while maximizing throughput. The proposed algorithms are evaluated through simulations by considering various performance metrics, including connection probability (CP), end‐to‐end delay, overhead, network throughput, and energy consumption. The simulation analysis is discussed under three scenarios. The first scenario undertakes ‘no optimisation’, the second considers SOM‐OLSR, and the third undertakes DRL‐OLSR. A comparison between DRL‐OLSR and SOM‐OLSR reveals that the former surpasses the latter in terms of low latency and prolonged network lifetime. Specifically, DRL‐OLSR demonstrates a 47% increase in throughput, a 67% reduction in energy consumption, and a CP three times higher than SOM‐OLSR. Furthermore, when contrasted with the ‘no optimisation’ scenario, DRL‐OLSR achieves a remarkable 69.7% higher throughput and nearly 89% lower energy consumption. These findings highlight the effectiveness of the DRL‐OLSR approach in wireless sensor networks.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141118592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disaster scenario optimised link state routing protocol and message prioritisation 灾难场景优化链路状态路由协议和报文优先级
IF 1.4 Q1 Mathematics Pub Date : 2024-04-07 DOI: 10.1049/ntw2.12125
Umar Aliyu, Haifa Takruri, Martin Hope, A. Gidado, Hamid Abubakar Adamu
Natural and artificial (human‐made) disasters have been steadily increasing all over the world, signifying the importance of providing reliable and energy friendly communication network to survivors in the aftermath of a disaster. On the other hand, low‐battery devices running optimised link state routing (OLSR) protocol often experience quick power failure which restricts their ability to communicate for a necessary period during rescue operations. To extend the lifespans and prioritise message delivery on low‐battery devices, the authors examine disaster scenario optimised link state routing (DS‐OLSR) protocol ALERT message and propose an innovative solution to prioritise messages based on the device battery energy level, leading to more energy conservation, packet delivery as well as better emotional state of survivors. An ALERT message is a novel message type added to mobile ad‐hoc network's (MANET) popular OLSR protocol for energy efficiency. The proposed DS‐OLSR Protocol and Message Prioritisation (DS‐OLSRMP) as an extension of DS‐OLSR modifies the multipoint relay mechanism and uses a prioritisation technique which classify nodes into four priority groups: Critical, High, Medium, and Low priorities. These priority groups help in prioritising both message delivery and message status notifications for devices with low battery energy. The DS‐OLSRMP was implemented in a Network Simulator, version 3.29 and compared with DS‐OLSR, OLSRv1 and OLSRv2. The simulation results show that DS‐OLSRMP performs better than DS‐OLSR, OLSRv1 and OLSRv2 in terms of energy conservation and packets delivery in the simulation of both sparse and dense network scenarios.
世界各地的自然和人为(人为)灾害一直在稳步增加,这表明在灾难发生后为幸存者提供可靠、节能的通信网络非常重要。另一方面,运行优化链路状态路由(OLSR)协议的低电量设备经常会快速断电,这限制了它们在救援行动期间进行必要通信的能力。为了延长低电量设备的使用寿命并优先发送信息,作者研究了灾难场景下优化链路状态路由(DS-OLSR)协议的 ALERT 信息,并提出了一种创新解决方案,根据设备电池能量水平优先发送信息,从而节省更多能源、提高数据包发送效率并改善幸存者的情绪状态。ALERT 消息是一种新颖的消息类型,被添加到移动 ad-hoc 网络(MANET)流行的 OLSR 协议中,以提高能效。所提出的 DS-OLSR 协议和信息优先级(DS-OLSRMP)是 DS-OLSR 的扩展,它修改了多点中继机制,并使用优先级技术将节点分为四个优先级组:关键优先级、高优先级、中优先级和低优先级。这些优先级分组有助于为电池能量不足的设备确定信息传递和信息状态通知的优先级。DS-OLSRMP 在 3.29 版网络模拟器中实施,并与 DS-OLSR、OLSRv1 和 OLSRv2 进行了比较。仿真结果表明,在稀疏和密集网络场景的仿真中,DS-OLSRMP 在节能和数据包传送方面的表现优于 DS-OLSR、OLSRv1 和 OLSRv2。
{"title":"Disaster scenario optimised link state routing protocol and message prioritisation","authors":"Umar Aliyu, Haifa Takruri, Martin Hope, A. Gidado, Hamid Abubakar Adamu","doi":"10.1049/ntw2.12125","DOIUrl":"https://doi.org/10.1049/ntw2.12125","url":null,"abstract":"Natural and artificial (human‐made) disasters have been steadily increasing all over the world, signifying the importance of providing reliable and energy friendly communication network to survivors in the aftermath of a disaster. On the other hand, low‐battery devices running optimised link state routing (OLSR) protocol often experience quick power failure which restricts their ability to communicate for a necessary period during rescue operations. To extend the lifespans and prioritise message delivery on low‐battery devices, the authors examine disaster scenario optimised link state routing (DS‐OLSR) protocol ALERT message and propose an innovative solution to prioritise messages based on the device battery energy level, leading to more energy conservation, packet delivery as well as better emotional state of survivors. An ALERT message is a novel message type added to mobile ad‐hoc network's (MANET) popular OLSR protocol for energy efficiency. The proposed DS‐OLSR Protocol and Message Prioritisation (DS‐OLSRMP) as an extension of DS‐OLSR modifies the multipoint relay mechanism and uses a prioritisation technique which classify nodes into four priority groups: Critical, High, Medium, and Low priorities. These priority groups help in prioritising both message delivery and message status notifications for devices with low battery energy. The DS‐OLSRMP was implemented in a Network Simulator, version 3.29 and compared with DS‐OLSR, OLSRv1 and OLSRv2. The simulation results show that DS‐OLSRMP performs better than DS‐OLSR, OLSRv1 and OLSRv2 in terms of energy conservation and packets delivery in the simulation of both sparse and dense network scenarios.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140733221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A PU-learning based approach for cross-site scripting attacking reality detection 基于 PU 学习的跨站脚本攻击现实检测方法
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-02 DOI: 10.1049/ntw2.12123
Wenbo Wang, Peng Yi, Huikai Xu

Cross-site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking attempts with the attacking reality. The authors collect responses from a web server and train a bagging-based PU learning model to determine whether the XSS vulnerability is truly triggered. To validate the authors’ proposed framework, experiments are performed on 5 popular web applications with 11 specified CVE recorded vulnerabilities and 32 vulnerable inputs. Results show that the authors’ approach outperforms existing research studies, effectively identifies the attacking reality from attacking attempts, and meanwhile reduces the number of worthless security alarms.

跨站脚本(XSS)攻击一直是网络空间安全领域最危险的攻击之一。传统方法主要通过检测请求中的恶意有效载荷来发现 XSS 攻击,无法区分攻击企图和攻击现实。作者收集了网络服务器的响应,并训练了一个基于分组的 PU 学习模型,以确定 XSS 漏洞是否真正被触发。为了验证作者提出的框架,我们在 5 个流行的网络应用程序上进行了实验,这些应用程序运行了 11 个指定的 CVE 记录漏洞和 32 个漏洞输入。结果表明,作者的方法优于现有研究,能从攻击尝试中有效识别攻击现实,同时减少了无价值安全警报的数量。
{"title":"A PU-learning based approach for cross-site scripting attacking reality detection","authors":"Wenbo Wang,&nbsp;Peng Yi,&nbsp;Huikai Xu","doi":"10.1049/ntw2.12123","DOIUrl":"10.1049/ntw2.12123","url":null,"abstract":"<p>Cross-site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking attempts with the attacking reality. The authors collect responses from a web server and train a bagging-based PU learning model to determine whether the XSS vulnerability is truly triggered. To validate the authors’ proposed framework, experiments are performed on 5 popular web applications with 11 specified CVE recorded vulnerabilities and 32 vulnerable inputs. Results show that the authors’ approach outperforms existing research studies, effectively identifies the attacking reality from attacking attempts, and meanwhile reduces the number of worthless security alarms.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12123","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140754465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced multivariate singular spectrum analysis-based network traffic forecasting for real time industrial IoT applications 基于多变量奇异频谱分析的增强型网络流量预测,适用于实时工业物联网应用
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-12 DOI: 10.1049/ntw2.12121
Deva Priya Isravel, Salaja Silas, Jaspher Kathrine, Elijah Blessing Rajsingh, Andrew J

Industrial IoT (IIoT) applications are widely used in multiple use cases to automate the industrial environment. Industry 4.0 presents challenges in numerous areas, including heterogeneous data, efficient data sensing and collection, real-time data processing, and higher request arrival rates, due to the massive amount of industrial data. Building a time-sensitive network that supports the voluminous and dynamic IoT traffic from heterogeneous applications is complex. Therefore, the authors provide insights into the challenges of industrial networks and propose a strategy for enhanced traffic management. An efficient multivariate forecasting model that adapts the Multivariate Singular Spectrum Analysis is employed for an SDN-based IIoT network. The proposed method considers multiple traffic flow parameters, such as packet sent and received, flow bytes sent and received, source rate, round trip time, jitter, packet arrival rate and flow duration to predict future flows. The experimental results show that the proposed method can effectively predict by contemplating every possible variation in the observed samples and predict average load, delay, inter-packet arrival rate and source sending rate with improved accuracy. The forecast results shows reduced error estimation when compared with existing methods with Mean Absolute Percentage Error of 1.64%, Mean Squared Error of 11.99, Root Mean Squared Error of 3.46 and Mean Absolute Error of 2.63.

工业物联网(IIoT)应用被广泛应用于多种使用案例中,以实现工业环境的自动化。由于工业数据量巨大,工业 4.0 在许多方面都提出了挑战,包括异构数据、高效数据传感和收集、实时数据处理以及更高的请求到达率。构建一个支持来自异构应用的大量动态物联网流量的时间敏感型网络非常复杂。因此,作者深入分析了工业网络面临的挑战,并提出了加强流量管理的策略。基于 SDN 的 IIoT 网络采用了一种适应多变量奇异谱分析的高效多变量预测模型。所提出的方法考虑了多个流量参数,如发送和接收的数据包、发送和接收的流量字节数、源速率、往返时间、抖动、数据包到达率和流量持续时间,以预测未来流量。实验结果表明,所提出的方法能考虑到观测样本中各种可能的变化,从而有效地进行预测,并能预测平均负载、延迟、包间到达率和源发送率,提高了预测的准确性。预测结果显示,与现有方法相比,误差估计有所减少,平均绝对百分比误差为 1.64%,平均平方误差为 11.99,根平均平方误差为 3.46,平均绝对误差为 2.63。
{"title":"Enhanced multivariate singular spectrum analysis-based network traffic forecasting for real time industrial IoT applications","authors":"Deva Priya Isravel,&nbsp;Salaja Silas,&nbsp;Jaspher Kathrine,&nbsp;Elijah Blessing Rajsingh,&nbsp;Andrew J","doi":"10.1049/ntw2.12121","DOIUrl":"10.1049/ntw2.12121","url":null,"abstract":"<p>Industrial IoT (IIoT) applications are widely used in multiple use cases to automate the industrial environment. Industry 4.0 presents challenges in numerous areas, including heterogeneous data, efficient data sensing and collection, real-time data processing, and higher request arrival rates, due to the massive amount of industrial data. Building a time-sensitive network that supports the voluminous and dynamic IoT traffic from heterogeneous applications is complex. Therefore, the authors provide insights into the challenges of industrial networks and propose a strategy for enhanced traffic management. An efficient multivariate forecasting model that adapts the Multivariate Singular Spectrum Analysis is employed for an SDN-based IIoT network. The proposed method considers multiple traffic flow parameters, such as packet sent and received, flow bytes sent and received, source rate, round trip time, jitter, packet arrival rate and flow duration to predict future flows. The experimental results show that the proposed method can effectively predict by contemplating every possible variation in the observed samples and predict average load, delay, inter-packet arrival rate and source sending rate with improved accuracy. The forecast results shows reduced error estimation when compared with existing methods with Mean Absolute Percentage Error of 1.64%, Mean Squared Error of 11.99, Root Mean Squared Error of 3.46 and Mean Absolute Error of 2.63.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12121","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140249853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of handover triggering condition estimation using mobility models in heterogeneous mobile networks 异构移动网络中利用移动性模型进行切换触发条件估计的性能评估
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-08 DOI: 10.1049/ntw2.12120
Asad Ali Malik, Muhammad Ali Jamshed, Ali Nauman, Adeel Iqbal, Atif Shakeel, Riaz Hussain

Heterogeneous networks (HetNets) refer to the communication network, consisting of different types of nodes connected through communication networks deploying diverse radio access technologies like LTE, Wi-Fi, Zigbee, and Z-wave, and using different communication protocols and operating frequencies. Vertical handover, is the process of switching a mobile device from one network type to another, such as from a cellular network to a Wi-Fi network, and is critical for ensuring a seamless user experience and optimal network performance, within the handover process handover triggering estimation is one of the crucial step affecting the overall performance. A mathematical analysis is presented for the handover triggering estimation. The performance evaluation shows significant improvement in the probability of successful handover using the proposed handover triggering condition based on speed, distance, and different mobility models. The handover triggering condition is optimised based on the speed of the mobile node, handover completion time, and the coverage range of the current and the target networks of the HetNet node, with due consideration of the mobility model.

异构网络(HetNets)是指由不同类型的节点组成的通信网络,这些节点通过通信网络连接,部署了不同的无线接入技术,如 LTE、Wi-Fi、Zigbee 和 Z-wave,并使用不同的通信协议和工作频率。垂直切换是将移动设备从一种网络类型切换到另一种网络类型(如从蜂窝网络切换到 Wi-Fi 网络)的过程,是确保无缝用户体验和最佳网络性能的关键,而在切换过程中,切换触发估计是影响整体性能的关键步骤之一。本文对切换触发估计进行了数学分析。性能评估结果表明,使用基于速度、距离和不同移动性模型提出的切换触发条件,成功切换的概率有了显著提高。切换触发条件根据移动节点的速度、切换完成时间以及 HetNet 节点当前网络和目标网络的覆盖范围进行优化,并适当考虑了移动性模型。
{"title":"Performance evaluation of handover triggering condition estimation using mobility models in heterogeneous mobile networks","authors":"Asad Ali Malik,&nbsp;Muhammad Ali Jamshed,&nbsp;Ali Nauman,&nbsp;Adeel Iqbal,&nbsp;Atif Shakeel,&nbsp;Riaz Hussain","doi":"10.1049/ntw2.12120","DOIUrl":"https://doi.org/10.1049/ntw2.12120","url":null,"abstract":"<p>Heterogeneous networks (HetNets) refer to the communication network, consisting of different types of nodes connected through communication networks deploying diverse radio access technologies like LTE, Wi-Fi, Zigbee, and Z-wave, and using different communication protocols and operating frequencies. Vertical handover, is the process of switching a mobile device from one network type to another, such as from a cellular network to a Wi-Fi network, and is critical for ensuring a seamless user experience and optimal network performance, within the handover process handover triggering estimation is one of the crucial step affecting the overall performance. A mathematical analysis is presented for the handover triggering estimation. The performance evaluation shows significant improvement in the probability of successful handover using the proposed handover triggering condition based on speed, distance, and different mobility models. The handover triggering condition is optimised based on the speed of the mobile node, handover completion time, and the coverage range of the current and the target networks of the HetNet node, with due consideration of the mobility model.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12120","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141624371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sub‐optimal Internet of Thing devices deployment using branch and bound method 使用分支和绑定方法部署次优物联网设备
IF 1.4 Q1 Mathematics Pub Date : 2024-02-29 DOI: 10.1049/ntw2.12119
Haesik Kim
The Internet of Thing (IoT) network deployments are widely investigated in 4G and 5G systems and will still be key technical systems to drive massive connectivity of 6G systems. In 6G, IoT systems will operate with 6G new technologies such as Integrated Sensing and Communications. The IoT systems of 6G will be a platform to collect information in real world and create new use cases and business models. As the IoT devices and cellular networks are getting smarter, the IoT ecosystem allows us to bridge between human life and digital life and accelerate the transition towards a hyper‐connected world. Optimal and scalable IoT network design has been investigated in many research groups but key challenges in this topic still remain. An IoT devices deployment problem is investigated to minimise the transmission and computation cost among network nodes. The IoT devices deployment problem is formulated as Mixed‐Integer Nonlinear Programming problem. After relaxing the constraints and transforming the problem to a mixed integer linear programming (MILP) problem, the authors propose a new branch and bound (BB) method with a machine learning function and solve the MILP problem as a sub‐optimal solution. In the numerical analysis, the authors evaluate both conventional BB method and the proposed BB method with weighting factors and compare the objective function values, the number of explored nodes, and computational time. The performances of the proposed BB method are significantly improved under the given simulation configuration. The author finds the optimal mapping of IoT devices to fusion nodes.
物联网(IoT)网络部署已在 4G 和 5G 系统中得到广泛研究,并将继续成为推动 6G 系统大规模连接的关键技术系统。在 6G 中,物联网系统将利用 6G 新技术(如综合传感与通信)运行。6G 物联网系统将成为收集现实世界信息的平台,并创造新的使用案例和商业模式。随着物联网设备和蜂窝网络变得越来越智能,物联网生态系统将成为人类生活和数字生活之间的桥梁,并加速向超级互联世界的过渡。许多研究小组都对最佳和可扩展的物联网网络设计进行了研究,但这一课题的关键挑战依然存在。我们研究了一个物联网设备部署问题,以最大限度地降低网络节点之间的传输和计算成本。物联网设备部署问题被表述为混合整数非线性编程问题。在放宽约束条件并将问题转化为混合整数线性规划(MILP)问题后,作者提出了一种带有机器学习功能的新分支与约束(BB)方法,并将 MILP 问题作为次优解求解。在数值分析中,作者评估了传统的分支与边界法和带有加权因子的拟议分支与边界法,并比较了目标函数值、探索节点数和计算时间。在给定的仿真配置下,建议的 BB 方法的性能得到了显著改善。作者找到了物联网设备与融合节点的最佳映射。
{"title":"Sub‐optimal Internet of Thing devices deployment using branch and bound method","authors":"Haesik Kim","doi":"10.1049/ntw2.12119","DOIUrl":"https://doi.org/10.1049/ntw2.12119","url":null,"abstract":"The Internet of Thing (IoT) network deployments are widely investigated in 4G and 5G systems and will still be key technical systems to drive massive connectivity of 6G systems. In 6G, IoT systems will operate with 6G new technologies such as Integrated Sensing and Communications. The IoT systems of 6G will be a platform to collect information in real world and create new use cases and business models. As the IoT devices and cellular networks are getting smarter, the IoT ecosystem allows us to bridge between human life and digital life and accelerate the transition towards a hyper‐connected world. Optimal and scalable IoT network design has been investigated in many research groups but key challenges in this topic still remain. An IoT devices deployment problem is investigated to minimise the transmission and computation cost among network nodes. The IoT devices deployment problem is formulated as Mixed‐Integer Nonlinear Programming problem. After relaxing the constraints and transforming the problem to a mixed integer linear programming (MILP) problem, the authors propose a new branch and bound (BB) method with a machine learning function and solve the MILP problem as a sub‐optimal solution. In the numerical analysis, the authors evaluate both conventional BB method and the proposed BB method with weighting factors and compare the objective function values, the number of explored nodes, and computational time. The performances of the proposed BB method are significantly improved under the given simulation configuration. The author finds the optimal mapping of IoT devices to fusion nodes.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140408512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: Special issue on network/traffic optimisation towards 6G network 特邀编辑:面向 6G 网络的网络/流量优化特刊
IF 1.4 Q1 Mathematics Pub Date : 2024-02-28 DOI: 10.1049/ntw2.12118
Michael Logothetis, João Paulo Barraca, Shigeo Shioda, Khaled Rabie

An even faster and more heterogeneous communication infrastructure is planned for the 6G network, based on 5G in a way that leads us to much more deeply connected, programmable, intelligent, and sensing devices, with excellent network performance and coverage, and new dimensions of functionality. Therefore, 6G brings even greater challenges to network/traffic engineering and optimisation.

This virtual collection on Network/Traffic Optimisation towards 6G Network brings together the best six research papers submitted from academia, and reflects some of the latest and original achievements, concentrating on the performance of a mobile hotspot in vehicular communication, on the mobility modelling and ad hoc routing in Flying Ad-hoc NETworks (FANETs), on the performance of a joint antenna and relay selection Multiple-Input Multiple-Output (MIMO) system for cooperative Non-Orthogonal Multiple Access (NOMA) networks, on optimal resource optimisation based on multi-layer monitoring and Machine Learning (ML), on Voice over Wi-Fi Security Threats—Address Resolution Protocol (ARP) attacks and countermeasures—and on the management of 5G and Beyond networks through cloud-native deployments and end-to-end monitoring.

Although the rapid and substantial changes in networking technologies towards the 6G Network over the recent years could readily justify this virtual issue, our real motivation was the 13th event of the International Symposium of Communications Systems, Networks and Digital Signal Processing, held in Porto, Portugal (20–22 July 2022), and the IET's open call.

We begin with the first paper where Marinos Vlasakis et al theoretically analyse the performance of a mobile hotspot with limited bandwidth capacity and a Connection Admission Control functionality which provides Quality of Service (QoS) support for handover voice calls by serving them in priority over new voice calls. An interesting application example of vehicular communication is presented by considering a vehicle (say a bus), which alternates between stop and moving phases. In the stop phase, the vehicle can service both new and handover calls, while in the moving phase, only new calls (originating from the vehicle) are supported. Obviously, when passengers enter the vehicle while talking on their mobile phone, a handover should occur, that is, the Access Point must support handover connections in priority over new call connections. To this end, the capacity of the mobile hotspot is probabilistically reserved during the stop phase to benefit handover calls. In this case, new calls are accepted with a probability. This is called probabilistic bandwidth reservation policy. The system is modelled based on three-dimensional Markov chains. Moreover, the traffic is assumed quasi-random (originating from a finite traffic source population). This consideration is the first for loss/queueing models applied in a mobile hotspot and is proven to be very essential.

In the s

在 5G 的基础上,我们计划为 6G 网络提供更快、更异构的通信基础设施,从而实现更深入的互联、可编程、智能和传感设备,并提供卓越的网络性能和覆盖范围以及新的功能维度。因此,6G 给网络/流量工程和优化带来了更大的挑战。这本关于面向 6G 网络的网络/流量优化的虚拟文集汇集了学术界提交的六篇最佳研究论文,反映了一些最新的原创性成果,主要集中在车载通信中移动热点的性能、移动性建模和飞行 ad-hoc 网络(FANETs)中的 ad hoc 路由、合作非正交多址(NOMA)网络的联合天线和中继选择多输入多输出(MIMO)系统的性能,基于多层监控和机器学习(ML)的最优资源优化,Wi-Fi语音安全威胁--地址解析协议(ARP)攻击和应对措施,以及通过云原生部署和端到端监控管理5G及其他网络。尽管近年来网络技术在向 6G 网络发展的过程中发生了快速而巨大的变化,这很容易为这一虚拟议题提供依据,但我们真正的动机是在葡萄牙波尔图举行的第 13 届通信系统、网络和数字信号处理国际研讨会(2022 年 7 月 20-22 日),以及 IET 的公开征集。我们从第一篇论文开始,Marinos Vlasakis 等人从理论上分析了带宽容量有限的移动热点的性能,以及连接接入控制(Connection Admission Control)功能,该功能通过优先于新语音呼叫为切换语音呼叫提供服务质量(QoS)支持。考虑到车辆(如公共汽车)在停止和行驶阶段之间交替,介绍了一个有趣的车载通信应用实例。在停止阶段,车辆可以为新呼叫和移交呼叫提供服务,而在移动阶段,只支持新呼叫(来自车辆)。显然,当乘客在使用手机通话时进入车内,就应该进行切换,也就是说,接入点必须优先支持切换连接,而不是新呼叫连接。为此,在停车阶段,移动热点的容量有可能被预留,以利于切换呼叫。在这种情况下,新呼叫会以一定概率被接受。这就是所谓的概率带宽预留策略。该系统基于三维马尔可夫链建模。此外,流量被假定为准随机的(源自有限的流量源群体)。在 G. Amponis 等人撰写的第二篇论文中,提出了一种新颖的方法来模拟特设网络中的空中节点移动,特别是在 FANET 中。考虑到表示三维、锚定和自相似蜂群移动(无人机)建模的应用感知和移动感知路由,提出了所谓的锚定自相似三维高斯-马尔科夫移动模型(ASSGM-3D),以准确捕捉严重影响 FANET 通信性能的空中节点的复杂动态(如风、湍流和高度变化)。所提出的模型结合了一组时空统计指标,并考虑了以前已知的指标。此外,ASSGM-3D 的设计还使用了一组路由协议的实验数据,即优化链路状态路由(Optimised Link State Routing)和按需分布矢量路由(Ad-hoc On-demand Distance Vector Routing),以及传统的移动模型,包括高斯-马尔科夫模型(Gauss-Markov Model)和随机漫步模型(Random Walk Model)。在第三篇论文中,V. Balyan 观察到:(1) 在 6G 应用的紧急通信场景中,快速可靠的通信是至关重要的。Balyan 在第三篇论文中指出:(1) 合理选择中继站可大幅提高为用户提供的服务质量和网络覆盖范围,尤其是在使用多天线的情况下,如在 MIMO 中继 5G 及以上网络中;(2) 网络用户分为两类,即信道质量好和信道质量差,通常分别位于小区的中心和边缘,这与合作 NOMA(5G 及以上网络中的一种技术)的概念非常吻合,从而大幅提高了为用户提供的服务质量和网络覆盖范围。在 NOMA 技术中,多个用户可以在同一时间、同一编码和同一频率以不同的功率水平进行传输。 在合作 NOMA 中,信道质量好的用户会解码发送给信道质量差的用户的信息,因此,信道质量好的用户被用作中继站,以提高信道质量差的用户的 QoS 支持(需要短程通信系统才能将信息从信道质量好的用户发送给信道质量差的用户)。针对这种现代网络环境,作者提出了一种天线选择方案,旨在最大限度地提高信道质量差的用户的瞬时速率,同时提供更好的服务质量。然后,中继选择方案选择负载最小的中继。因此,通过这个名为 ASRS 的组合方案,基站 (BS)、中继节点和中继天线的最佳天线都被选中。模拟评估了所提方案的中断概率与信噪比、基站天线数量、中继站数量等的关系。此外还介绍了其他性能指标。在第四篇论文中,D. Uzunidis、P. Karkazis 和 H. Leligou 对利用 ML 优化网络资源进行了新的阐述。首先,在实践中,最小化网络资源总体分配与最优分配之间的距离(称为 "临界点",在临界点上,分配的资源能确保 SLA,且利用率为零)要容易得多。其次,每项服务的资源分配决策变得比以往任何时候都更加复杂,因为需要在更细的层面上做出快速决策,而了解每项服务的概况是必要的,也是一项艰巨的任务,因为每天都会出现新的服务类型。第三,一个不可避免的考虑因素是现代网络环境和所使用的虚拟化技术中的高度异构性这一关键问题;为了应对这些问题,不仅在应用层,而且在所有层上都必须对分配的资源进行监控和管理。考虑到以上三点,作者提出了一种新颖的架构/机制,在确保服务质量的同时,最大限度地减少每项服务所分配的资源。从异构资源中监控和收集数据,用于训练 ML 模型,同时实时为每项服务量身定制。通过 ML 对每项服务的资源进行整体优化,强调从各层收集数据,为 ML 模型提供养分。为了验证和评估所提出的机制,我们将其应用于现实生活中的服务,即 Hadoop(处理大数据)和后端服务。通过收集和分析来自物理层、CPU、内存使用率、网络吞吐量等的监控数据列表,以及来自运行服务的其他性能指标,进行服务剖析和性能预测。在第五篇论文中,Lu Kuan-Chu 等人提出了一种在超越 5G 或 6G 网络中保护 Wi-Fi 语音(VoWi-Fi)服务免受网络攻击的方法。其动机是台湾的主要电信运营商已经推出了 VoWi-Fi 通话服务,通过基于 3GPP IP 多媒体子系统技术的家庭/公共 Wi-Fi 网络,而不是蜂窝基站,向移动用户提供蜂窝电话和文本信息。如果这些服务通过不受信任的 Wi-Fi 网络,就会构成潜在威胁。为了抵御可能的攻击,我们为未来的应用程序开发商或设备制造商提出了一种攻击防御算法,可以检测用户的通话环境是否安全。此外,作者还参考了 3GPP 标准,建议电信公司加强观测机制,以检测异常情况,并为网络向 6G 网络的发展提供新的设计知识。在最新的论文中,S. Barrachina-Munoz 等人研究了 5G 及以后网络管理的三个关键方面:云原生部署、端到端监控和网络智能。在对当前文献进行全面回顾后,作者介绍了如何构建拟议的全功能实验框架(测试平台)并对现有研究进行补充。建议的框架在跨越云和主机的多域网络中的 Kubernetes 集群上使用容器化网络操作,以及容器化端到端监控。
{"title":"Guest Editorial: Special issue on network/traffic optimisation towards 6G network","authors":"Michael Logothetis,&nbsp;João Paulo Barraca,&nbsp;Shigeo Shioda,&nbsp;Khaled Rabie","doi":"10.1049/ntw2.12118","DOIUrl":"https://doi.org/10.1049/ntw2.12118","url":null,"abstract":"<p>An even faster and more heterogeneous communication infrastructure is planned for the 6G network, based on 5G in a way that leads us to much more deeply connected, programmable, intelligent, and sensing devices, with excellent network performance and coverage, and new dimensions of functionality. Therefore, 6G brings even greater challenges to network/traffic engineering and optimisation.</p><p>This virtual collection on Network/Traffic Optimisation towards 6G Network brings together the best six research papers submitted from academia, and reflects some of the latest and original achievements, concentrating on the performance of a mobile hotspot in vehicular communication, on the mobility modelling and ad hoc routing in Flying Ad-hoc NETworks (FANETs), on the performance of a joint antenna and relay selection Multiple-Input Multiple-Output (MIMO) system for cooperative Non-Orthogonal Multiple Access (NOMA) networks, on optimal resource optimisation based on multi-layer monitoring and Machine Learning (ML), on Voice over Wi-Fi Security Threats—Address Resolution Protocol (ARP) attacks and countermeasures—and on the management of 5G and Beyond networks through cloud-native deployments and end-to-end monitoring.</p><p>Although the rapid and substantial changes in networking technologies towards the 6G Network over the recent years could readily justify this virtual issue, our real motivation was the 13th event of the International Symposium of Communications Systems, Networks and Digital Signal Processing, held in Porto, Portugal (20–22 July 2022), and the IET's open call.</p><p>We begin with the first paper where Marinos Vlasakis et al theoretically analyse the performance of a mobile hotspot with limited bandwidth capacity and a Connection Admission Control functionality which provides Quality of Service (QoS) support for handover voice calls by serving them in priority over new voice calls. An interesting application example of vehicular communication is presented by considering a vehicle (say a bus), which alternates between stop and moving phases. In the stop phase, the vehicle can service both new and handover calls, while in the moving phase, only new calls (originating from the vehicle) are supported. Obviously, when passengers enter the vehicle while talking on their mobile phone, a handover should occur, that is, the Access Point must support handover connections in priority over new call connections. To this end, the capacity of the mobile hotspot is probabilistically reserved during the stop phase to benefit handover calls. In this case, new calls are accepted with a probability. This is called probabilistic bandwidth reservation policy. The system is modelled based on three-dimensional Markov chains. Moreover, the traffic is assumed quasi-random (originating from a finite traffic source population). This consideration is the first for loss/queueing models applied in a mobile hotspot and is proven to be very essential.</p><p>In the s","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12118","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140104346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating delay of the media access control protocols for IoT-RoF using quantum entanglement 利用量子纠缠研究物联网 RoF 媒体访问控制协议的延迟问题
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-24 DOI: 10.1049/ntw2.12117
Shakir Salman Ahmad, Hamed Al-Raweshidy, Rajagopal Nilavalan

One of the significant challenges of the Radio over fibre (RoF) Medium Access Control (MAC) protocol is the propagation delay. This delay can lead to serious issues, such as higher propagation delay resulting in collisions and unnecessary retransmissions. Quantum entanglement is an excellent candidate to overcome the propagation delay of the RoF MAC protocol. A new quantum MAC protocol is proposed, named the Quantum Entanglement-based MAC protocol (QE-MAC), in which Quantum Teleportation is utilised to address the propagation delay. Four entanglement states are employed to represent the control packets of the classical MAC protocol, and data is transmitted over the classical channel. Instead of using control packets such as acknowledgement, request to send, and Clear to send, state transitions are employed. This approach avoids the delay and collision issues associated with control packets, resulting in a significant improvement in network performance. The delay, duty cycle (DC), and power consumption of the proposed QE-MAC protocol are formulated and derived. The protocol is evaluated in terms of delay, DC, and power consumption, demonstrating superior performance compared to the classical RoF MAC protocol. In comparison to published works, our proposed approach has successfully reduced both delay and power consumption by 35%.

光纤无线(RoF)介质访问控制(MAC)协议面临的重大挑战之一是传播延迟。这种延迟会导致严重的问题,如较高的传播延迟会导致碰撞和不必要的重传。量子纠缠是克服 RoF MAC 协议传播延迟的最佳候选方案。本文提出了一种新的量子 MAC 协议,命名为基于量子纠缠的 MAC 协议(QE-MAC),其中利用量子远距离传输来解决传播延迟问题。该协议采用四种纠缠状态来表示经典 MAC 协议的控制数据包,并通过经典信道传输数据。不使用确认、请求发送和清除发送等控制数据包,而是使用状态转换。这种方法避免了与控制数据包相关的延迟和碰撞问题,从而显著提高了网络性能。对拟议 QE-MAC 协议的延迟、占空比(DC)和功耗进行了表述和推导。根据延迟、占空比和功耗对该协议进行了评估,结果表明该协议的性能优于经典的 RoF MAC 协议。与已发表的作品相比,我们提出的方法成功地将延迟和功耗降低了 35%。
{"title":"Investigating delay of the media access control protocols for IoT-RoF using quantum entanglement","authors":"Shakir Salman Ahmad,&nbsp;Hamed Al-Raweshidy,&nbsp;Rajagopal Nilavalan","doi":"10.1049/ntw2.12117","DOIUrl":"10.1049/ntw2.12117","url":null,"abstract":"<p>One of the significant challenges of the Radio over fibre (RoF) Medium Access Control (MAC) protocol is the propagation delay. This delay can lead to serious issues, such as higher propagation delay resulting in collisions and unnecessary retransmissions. Quantum entanglement is an excellent candidate to overcome the propagation delay of the RoF MAC protocol. A new quantum MAC protocol is proposed, named the Quantum Entanglement-based MAC protocol (QE-MAC), in which Quantum Teleportation is utilised to address the propagation delay. Four entanglement states are employed to represent the control packets of the classical MAC protocol, and data is transmitted over the classical channel. Instead of using control packets such as acknowledgement, request to send, and Clear to send, state transitions are employed. This approach avoids the delay and collision issues associated with control packets, resulting in a significant improvement in network performance. The delay, duty cycle (DC), and power consumption of the proposed QE-MAC protocol are formulated and derived. The protocol is evaluated in terms of delay, DC, and power consumption, demonstrating superior performance compared to the classical RoF MAC protocol. In comparison to published works, our proposed approach has successfully reduced both delay and power consumption by 35%.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140433534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Packets distribution over asymmetric paths using concurrent multipath transfer 利用并发多路径传输在非对称路径上分配数据包
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-20 DOI: 10.1049/ntw2.12116
Hatem Fetoh, Khaled M. Amin, Ahmed M. Hamad

Concurrent multipath transfer (CMT) is a transport layer protocol used for transferring data over multiple paths concurrently. In the case of asymmetric paths, the dissimilarity of delay, bandwidth, and loss rate among paths leads to challenges such as out-of-order packets, receiver buffer blocking, and throughput reduction. A framework that uses the end-to-end delay of paths to distribute the packets over asymmetric paths in ordering policy is proposed. The proposed framework detects network congestion in the assigned path and reduces the congestion window. Furthermore, the proposed framework predicts receiver buffer blocking and deactivates the highest delay path that causes this problem. The simulation results show that the proposed framework achieves highest throughput, lower entropy and lower average application end-to-end delay than the previous algorithms.

并发多路径传输(CMT)是一种传输层协议,用于同时通过多条路径传输数据。在非对称路径的情况下,路径间延迟、带宽和损耗率的差异会导致数据包失序、接收器缓冲区阻塞和吞吐量降低等问题。本文提出了一个框架,利用路径的端到端延迟在排序策略中将数据包分配到非对称路径上。所提出的框架能检测到指定路径上的网络拥塞,并减少拥塞窗口。此外,提出的框架还能预测接收器缓冲区阻塞,并停用导致这一问题的最高延迟路径。仿真结果表明,与之前的算法相比,建议的框架实现了最高的吞吐量、较低的熵和较低的平均应用端到端延迟。
{"title":"Packets distribution over asymmetric paths using concurrent multipath transfer","authors":"Hatem Fetoh,&nbsp;Khaled M. Amin,&nbsp;Ahmed M. Hamad","doi":"10.1049/ntw2.12116","DOIUrl":"10.1049/ntw2.12116","url":null,"abstract":"<p>Concurrent multipath transfer (CMT) is a transport layer protocol used for transferring data over multiple paths concurrently. In the case of asymmetric paths, the dissimilarity of delay, bandwidth, and loss rate among paths leads to challenges such as out-of-order packets, receiver buffer blocking, and throughput reduction. A framework that uses the end-to-end delay of paths to distribute the packets over asymmetric paths in ordering policy is proposed. The proposed framework detects network congestion in the assigned path and reduces the congestion window. Furthermore, the proposed framework predicts receiver buffer blocking and deactivates the highest delay path that causes this problem. The simulation results show that the proposed framework achieves highest throughput, lower entropy and lower average application end-to-end delay than the previous algorithms.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12116","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140447606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1