首页 > 最新文献

2016 IEEE 41st Conference on Local Computer Networks (LCN)最新文献

英文 中文
Topology Control in Wireless Sensor Networks: What Blocks the Breakthrough? 无线传感器网络的拓扑控制:是什么阻碍了突破?
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.67
Michael Stein, Tobias Petry, Immanuel Schweizer, Martina Brachmann, M. Mühlhäuser
Graph-based topology control adapts wireless topologies to achieve certain target graph structures. Wireless sensor networks seem well-suited for the expectations (in particular those on provided energy savings) raised by topology control. Nevertheless, topology control has never made the breakthrough in real-world deployments. This work explores the reasons for this, identifying five practical obstacles of today's topology control: (i) unrealistic assumptions, (ii) unsuitable graph structures, (iii) application agnosticism, (iv) unclear role in the stack, and (v) insufficient framework support. To address the latter obstacle, we provide a re-usable framework for the implementation and evaluation of topology control. Based on this framework, we conduct a testbed-based evaluation for two application scenarios and three topology control algorithms including a novel application-specific algorithm. Indeed, the identified obstacles hinder topology control from boosting the application. However, the achieved graph structures show the practical feasibility of topology control in principle.
基于图的拓扑控制利用无线拓扑来实现特定的目标图结构。无线传感器网络似乎非常适合拓扑控制提出的期望(特别是那些提供节能的期望)。然而,拓扑控制在实际部署中从未取得突破。这项工作探讨了造成这种情况的原因,确定了当今拓扑控制的五个实际障碍:(i)不切实际的假设,(ii)不合适的图结构,(iii)应用不可知,(iv)堆栈中不明确的角色,以及(v)框架支持不足。为了解决后一个障碍,我们提供了一个可重用的框架来实现和评估拓扑控制。基于该框架,我们对两种应用场景和三种拓扑控制算法进行了基于测试平台的评估,其中包括一种新的特定应用算法。事实上,这些已确定的障碍阻碍了拓扑控制对应用程序的提升。然而,所实现的图结构在原理上显示了拓扑控制的实际可行性。
{"title":"Topology Control in Wireless Sensor Networks: What Blocks the Breakthrough?","authors":"Michael Stein, Tobias Petry, Immanuel Schweizer, Martina Brachmann, M. Mühlhäuser","doi":"10.1109/LCN.2016.67","DOIUrl":"https://doi.org/10.1109/LCN.2016.67","url":null,"abstract":"Graph-based topology control adapts wireless topologies to achieve certain target graph structures. Wireless sensor networks seem well-suited for the expectations (in particular those on provided energy savings) raised by topology control. Nevertheless, topology control has never made the breakthrough in real-world deployments. This work explores the reasons for this, identifying five practical obstacles of today's topology control: (i) unrealistic assumptions, (ii) unsuitable graph structures, (iii) application agnosticism, (iv) unclear role in the stack, and (v) insufficient framework support. To address the latter obstacle, we provide a re-usable framework for the implementation and evaluation of topology control. Based on this framework, we conduct a testbed-based evaluation for two application scenarios and three topology control algorithms including a novel application-specific algorithm. Indeed, the identified obstacles hinder topology control from boosting the application. However, the achieved graph structures show the practical feasibility of topology control in principle.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"156 1","pages":"389-397"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79851801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards Path Quality Metrics for Overlay Networks 面向覆盖网络的路径质量度量
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.31
Andri Lareida, Daniel Meier, T. Bocek, B. Stiller
Decentralized systems, such as overlay networks or content delivery networks, form a virtual network on top of a physical network leading to inefficiencies in handling network traffic as physical locations are not considered. Therefore, this work investigates, analyzes, and evaluates two feasible network locality metrics for decentralized systems to overcome such inefficiencies. Furthermore, those metrics to determine network locality have been implemented and evaluated within an international testbed. These metrics evaluated consider aspects of path stability and path symmetry. The evaluation performed did reveal that the stability and symmetry metrics provide accurate locality indication.
分散的系统,如覆盖网络或内容交付网络,在物理网络之上形成虚拟网络,导致处理网络流量的效率低下,因为没有考虑物理位置。因此,这项工作调查、分析和评估了分散系统的两个可行的网络局部性指标,以克服这种低效率。此外,这些确定网络局部性的指标已经在一个国际测试平台上实现和评估。评估的这些指标考虑了路径稳定性和路径对称性。结果表明,稳定性和对称性指标提供了准确的局域指示。
{"title":"Towards Path Quality Metrics for Overlay Networks","authors":"Andri Lareida, Daniel Meier, T. Bocek, B. Stiller","doi":"10.1109/LCN.2016.31","DOIUrl":"https://doi.org/10.1109/LCN.2016.31","url":null,"abstract":"Decentralized systems, such as overlay networks or content delivery networks, form a virtual network on top of a physical network leading to inefficiencies in handling network traffic as physical locations are not considered. Therefore, this work investigates, analyzes, and evaluates two feasible network locality metrics for decentralized systems to overcome such inefficiencies. Furthermore, those metrics to determine network locality have been implemented and evaluated within an international testbed. These metrics evaluated consider aspects of path stability and path symmetry. The evaluation performed did reveal that the stability and symmetry metrics provide accurate locality indication.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"97 1","pages":"156-159"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79214811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Graph Partitioning in Parallelization of Large Scale Networks 大规模网络并行化中的图划分
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.36
Sima Das, J. Leopold, Susmita K. Ghosh, Sajal K. Das
Real world large scale networks exhibit intrinsic community structure, with dense intra-community connectivity and sparse inter-community connectivity. Leveraging their community structure for parallelization of computational tasks and applications, is a significant step towards computational efficiency and application effectiveness. We propose a weighted depth-first-search graph partitioning algorithm for community formation that preserves the needed community dependency without any cycles. To comply with heterogeneity in community structure and size of the real world networks, we use a flexible limiting value for them. Further, our algorithm is a diversion from the existing modularity based algorithms. We evaluate our algorithm as the quality of the generated partitions, measured in terms of number of graph cuts.
现实世界的大规模网络表现出内在的社区结构,社区内连接密集,社区间连接稀疏。利用它们的社区结构来并行化计算任务和应用程序,是迈向计算效率和应用程序有效性的重要一步。我们提出了一种加权深度优先搜索图划分算法,该算法保留了所需的社区依赖而不需要任何循环。为了适应现实世界网络在社区结构和规模上的异质性,我们对它们使用了一个灵活的限制值。此外,我们的算法是现有的基于模块化的算法的一种转移。我们用生成的分区的质量来评估我们的算法,用图切割的数量来衡量。
{"title":"Graph Partitioning in Parallelization of Large Scale Networks","authors":"Sima Das, J. Leopold, Susmita K. Ghosh, Sajal K. Das","doi":"10.1109/LCN.2016.36","DOIUrl":"https://doi.org/10.1109/LCN.2016.36","url":null,"abstract":"Real world large scale networks exhibit intrinsic community structure, with dense intra-community connectivity and sparse inter-community connectivity. Leveraging their community structure for parallelization of computational tasks and applications, is a significant step towards computational efficiency and application effectiveness. We propose a weighted depth-first-search graph partitioning algorithm for community formation that preserves the needed community dependency without any cycles. To comply with heterogeneity in community structure and size of the real world networks, we use a flexible limiting value for them. Further, our algorithm is a diversion from the existing modularity based algorithms. We evaluate our algorithm as the quality of the generated partitions, measured in terms of number of graph cuts.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"30 1","pages":"176-179"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74926342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Measurement Study on the Distribution Disparity of BGP Instabilities BGP不稳定性分布差异的测度研究
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.13
Meng Chen, Mingwei Xu, Yuan Yang, Qing Li
BGP measurement is important for monitoring and understanding the Internet anomalies. Most of the previous works on BGP measurement rely on aggregated statistics from BGP monitors, e.g., total updates. However, BGP events may have quite limited visibility. Therefore, merely investigating aggregated data may lead to misunderstanding Internet instability, e.g., overestimating the impact of monitor-local events. In this empirical study, we demonstrate how BGP data are distributed among a large number of monitors. We define eleven features as the analysis targets, and three metrics to quantify disparity. We apply the method to 1.14 TB data and find that the distribution of most of the features is quite uneven, and different types of feature illustrate different levels of disparity. We also observe long periods of persistent high disparity, and a small set of cross-feature highly active monitors. Our analysis highlights the necessity of per-monitor data analysis in future BGP measurement study.
BGP测量对于监控和理解网络异常具有重要意义。以前关于BGP度量的大部分工作依赖于来自BGP监视器的聚合统计数据,例如总更新。然而,BGP事件的可见性可能相当有限。因此,仅仅调查汇总数据可能会导致对互联网不稳定性的误解,例如,高估监测本地事件的影响。在本实证研究中,我们演示了BGP数据如何分布在大量监视器之间。我们定义了11个特征作为分析目标,并定义了3个指标来量化差异。我们将该方法应用于1.14 TB数据,发现大部分特征的分布相当不均匀,不同类型的特征说明了不同程度的差异。我们还观察到长时间的持续高视差,以及一小部分跨功能的高度活跃的监视器。我们的分析强调了在未来的BGP测量研究中进行逐监测数据分析的必要性。
{"title":"A Measurement Study on the Distribution Disparity of BGP Instabilities","authors":"Meng Chen, Mingwei Xu, Yuan Yang, Qing Li","doi":"10.1109/LCN.2016.13","DOIUrl":"https://doi.org/10.1109/LCN.2016.13","url":null,"abstract":"BGP measurement is important for monitoring and understanding the Internet anomalies. Most of the previous works on BGP measurement rely on aggregated statistics from BGP monitors, e.g., total updates. However, BGP events may have quite limited visibility. Therefore, merely investigating aggregated data may lead to misunderstanding Internet instability, e.g., overestimating the impact of monitor-local events. In this empirical study, we demonstrate how BGP data are distributed among a large number of monitors. We define eleven features as the analysis targets, and three metrics to quantify disparity. We apply the method to 1.14 TB data and find that the distribution of most of the features is quite uneven, and different types of feature illustrate different levels of disparity. We also observe long periods of persistent high disparity, and a small set of cross-feature highly active monitors. Our analysis highlights the necessity of per-monitor data analysis in future BGP measurement study.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"38 1","pages":"19-27"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77351963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward Smart Moving Target Defense for Linux Container Resiliency 面向Linux容器弹性的智能移动目标防御
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.106
M. Azab, B. Mokhtar, A. S. Abed, M. Eltoweissy
This paper presents ESCAPE, an informed moving target defense mechanism for cloud containers. ESCAPE models the interaction between attackers and their target containers as a "predator searching for a prey" search game. Live migration of Linux-containers (prey) is used to avoid attacks (predator) and failures. The entire process is guided by a novel host-based behavior-monitoring system that seamlessly monitors containers for indications of intrusions and attacks. To evaluate ESCAPE effectiveness, we simulated the attack avoidance process based on a mathematical model mimicking the prey-vs-predator search game. Simulation results show high container survival probabilities with minimal added overhead.
本文提出了一种针对云容器的知情移动目标防御机制——ESCAPE。ESCAPE将攻击者和目标容器之间的互动建模为“捕食者寻找猎物”的搜索游戏。linux容器(猎物)的实时迁移用于避免攻击(捕食者)和失败。整个过程由一个新颖的基于主机的行为监控系统指导,该系统可以无缝地监控容器的入侵和攻击迹象。为了评估ESCAPE的有效性,我们基于模拟猎物对捕食者搜索博弈的数学模型模拟了攻击回避过程。仿真结果表明,在最小的额外开销下,容器的生存概率很高。
{"title":"Toward Smart Moving Target Defense for Linux Container Resiliency","authors":"M. Azab, B. Mokhtar, A. S. Abed, M. Eltoweissy","doi":"10.1109/LCN.2016.106","DOIUrl":"https://doi.org/10.1109/LCN.2016.106","url":null,"abstract":"This paper presents ESCAPE, an informed moving target defense mechanism for cloud containers. ESCAPE models the interaction between attackers and their target containers as a \"predator searching for a prey\" search game. Live migration of Linux-containers (prey) is used to avoid attacks (predator) and failures. The entire process is guided by a novel host-based behavior-monitoring system that seamlessly monitors containers for indications of intrusions and attacks. To evaluate ESCAPE effectiveness, we simulated the attack avoidance process based on a mathematical model mimicking the prey-vs-predator search game. Simulation results show high container survival probabilities with minimal added overhead.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"7 1","pages":"619-622"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79116114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Wavelet-Based Analysis of Interference in WSNs 基于小波的WSNs干扰分析
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.127
Aikaterini Vlachaki, I. Nikolaidis, J. Harms
Motivated by the computational, bandwidth and energy restrictions of wireless sensor network nodes and their need to, collectively, determine the presence of exogenous interference that could impair their communication, we consider schemes that could support the task of interference classification as a first step towards interference mitigation strategies. In particular, we examine the effectiveness of the Discrete Wavelet Transform (DWT) to communicate to other nodes the state of the channel, as sampled by a node, in a compressed, denoised form. We examine the suitability of different wavelet filters and thresholding methods in order to: (a) preserve key features of the interference, (b) denoise the noisy interference samples, and (c) reduce the amount of information that needs to be communicated to describe the interference.
由于无线传感器网络节点的计算、带宽和能量限制以及它们需要共同确定可能损害其通信的外源干扰的存在,我们考虑了可以支持干扰分类任务的方案,作为实现干扰缓解策略的第一步。特别是,我们研究了离散小波变换(DWT)以压缩、去噪的形式向其他节点传递信道状态的有效性,该状态由节点采样。我们研究了不同小波滤波器和阈值方法的适用性,以便:(a)保留干扰的关键特征,(b)去噪噪声干扰样本,以及(c)减少描述干扰需要传达的信息量。
{"title":"Wavelet-Based Analysis of Interference in WSNs","authors":"Aikaterini Vlachaki, I. Nikolaidis, J. Harms","doi":"10.1109/LCN.2016.127","DOIUrl":"https://doi.org/10.1109/LCN.2016.127","url":null,"abstract":"Motivated by the computational, bandwidth and energy restrictions of wireless sensor network nodes and their need to, collectively, determine the presence of exogenous interference that could impair their communication, we consider schemes that could support the task of interference classification as a first step towards interference mitigation strategies. In particular, we examine the effectiveness of the Discrete Wavelet Transform (DWT) to communicate to other nodes the state of the channel, as sampled by a node, in a compressed, denoised form. We examine the suitability of different wavelet filters and thresholding methods in order to: (a) preserve key features of the interference, (b) denoise the noisy interference samples, and (c) reduce the amount of information that needs to be communicated to describe the interference.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"30 1","pages":"639-642"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72962450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Monitoring Multi-Hop Multi-Channel Wireless Networks: Online Sniffer Channel Assignment 监控多跳多信道无线网络:在线嗅探器信道分配
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.97
Jing Xu, Wei Liu, K. Zeng
Data capture is important for some critical network applications, such as network diagnosis and criminal investigation. In multi-channel wireless networks, the fundamental challenge for data capture is how to assign operation channels to wireless sniffers. The existing approaches make some impractical assumptions, such as the prior knowledge on network traffic and the perfect conditions of data capture. In this paper, we relax these assumptions and investigate the sniffer-channel assignment problem in multi-hop scenarios. Especially, sniffer redundancy deployment is discussed, which enables multiple sniffers to monitor one traffic. This problem is formulated as a combinatorial multi-arm bandit (MAB) problem, and a cooperative distribute learning policy is proposed. We analyze the regret of our policy in theory, and validate its effectiveness through numerical simulations.
数据捕获对于网络诊断和犯罪调查等关键网络应用非常重要。在多通道无线网络中,数据捕获的基本挑战是如何为无线嗅探器分配操作通道。现有的方法存在一些不切实际的假设,如网络流量的先验知识和数据捕获的完美条件。在本文中,我们放宽了这些假设,并研究了多跳场景下嗅探器信道分配问题。特别讨论了嗅探器冗余部署,使多个嗅探器能够监视一个流量。将该问题表述为组合多臂强盗(MAB)问题,提出了一种协作式分布式学习策略。从理论上分析了该策略的缺陷,并通过数值模拟验证了其有效性。
{"title":"Monitoring Multi-Hop Multi-Channel Wireless Networks: Online Sniffer Channel Assignment","authors":"Jing Xu, Wei Liu, K. Zeng","doi":"10.1109/LCN.2016.97","DOIUrl":"https://doi.org/10.1109/LCN.2016.97","url":null,"abstract":"Data capture is important for some critical network applications, such as network diagnosis and criminal investigation. In multi-channel wireless networks, the fundamental challenge for data capture is how to assign operation channels to wireless sniffers. The existing approaches make some impractical assumptions, such as the prior knowledge on network traffic and the perfect conditions of data capture. In this paper, we relax these assumptions and investigate the sniffer-channel assignment problem in multi-hop scenarios. Especially, sniffer redundancy deployment is discussed, which enables multiple sniffers to monitor one traffic. This problem is formulated as a combinatorial multi-arm bandit (MAB) problem, and a cooperative distribute learning policy is proposed. We analyze the regret of our policy in theory, and validate its effectiveness through numerical simulations.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"83 7 1","pages":"579-582"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80077248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Air-Interface Slice Based Dynamic Resource Reservation for Ultra-Low-Latency IoT Transmissions 基于空接口切片的超低延迟物联网传输动态资源预留
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.102
Guolin Sun, Guohui Wang, Guisong Liu
The ultra-low latency transmission for emergency services needs an effective resources management scheme to deliver content in few milliseconds. The traditional solutions can't guarantee the ultra-low latency performance required by such traffic. In this paper, we propose an air-interface slice based dynamic resource reservation schema for a massive number of sensors with emergency flows in the context of the next generation cellular networks. The proposed schema allows ultra-low latency flows to be transported by guaranteed-rate radio link connection with a content name as identifier and it achieves air-interface latency in few milliseconds. The dynamic bit-map update, silence probability and window-based re-transmission are introduced based on the Frame Slotted Aloha, which can schedules the delay-sensitive flows immediately from one or many groups of connected terminals. Furthermore, a probability theory based analytic model is provided and evaluated with Monte-Carlo simulation results.
应急服务的超低延迟传输需要一种有效的资源管理方案,在几毫秒内传送内容。传统的解决方案无法保证这种流量所需的超低延迟性能。本文提出了一种基于空接口切片的下一代蜂窝网络中具有应急流的海量传感器动态资源预留方案。提出的模式允许超低延迟流通过保证速率的无线链路连接传输,以内容名称作为标识符,并在几毫秒内实现空中接口延迟。引入了基于帧槽Aloha的动态位图更新、沉默概率和基于窗口的重传,可以立即调度来自一组或多组连接终端的延迟敏感流。在此基础上,提出了一种基于概率论的分析模型,并用蒙特卡罗仿真结果进行了验证。
{"title":"Air-Interface Slice Based Dynamic Resource Reservation for Ultra-Low-Latency IoT Transmissions","authors":"Guolin Sun, Guohui Wang, Guisong Liu","doi":"10.1109/LCN.2016.102","DOIUrl":"https://doi.org/10.1109/LCN.2016.102","url":null,"abstract":"The ultra-low latency transmission for emergency services needs an effective resources management scheme to deliver content in few milliseconds. The traditional solutions can't guarantee the ultra-low latency performance required by such traffic. In this paper, we propose an air-interface slice based dynamic resource reservation schema for a massive number of sensors with emergency flows in the context of the next generation cellular networks. The proposed schema allows ultra-low latency flows to be transported by guaranteed-rate radio link connection with a content name as identifier and it achieves air-interface latency in few milliseconds. The dynamic bit-map update, silence probability and window-based re-transmission are introduced based on the Frame Slotted Aloha, which can schedules the delay-sensitive flows immediately from one or many groups of connected terminals. Furthermore, a probability theory based analytic model is provided and evaluated with Monte-Carlo simulation results.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"34 1","pages":"603-606"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80331409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using Probabilistic Multipath Routing to Improve Route Stability in MANETs 基于概率多路径路由的多路径网络稳定性研究
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.40
Fabian Rump, Sascha Jopen, M. Frank
Many MANET routing protocols do not perform well in dense scenarios with high network load. In these situations, we can observe a high level of route instability, which is often called "route flapping". In this paper we present the PRIME routing protocol, which uses a probabilistic multipath forwarding process to increase route stability in dense scenarios with high network load. We describe the routing protocol and propose different scenarios to evaluate the protocol performance. We compare the behavior of our protocol with the well-known OLSR and AODV protocols in those scenarios. The evaluation results show that the PRIME routing protocol does in fact have a positive impact on route stability and can improve the overall network performance in situations with high network load.
许多MANET路由协议在高网络负载的密集场景下表现不佳。在这些情况下,我们可以观察到高度的航路不稳定性,这通常被称为“航路扑动”。在本文中,我们提出了PRIME路由协议,它使用概率多路径转发过程来提高高网络负载密集场景下路由的稳定性。我们描述了路由协议,并提出了不同的场景来评估协议的性能。在这些场景中,我们将我们的协议与众所周知的OLSR和AODV协议的行为进行了比较。评估结果表明,在高网络负载情况下,PRIME路由协议确实对路由稳定性有积极的影响,可以提高整体网络性能。
{"title":"Using Probabilistic Multipath Routing to Improve Route Stability in MANETs","authors":"Fabian Rump, Sascha Jopen, M. Frank","doi":"10.1109/LCN.2016.40","DOIUrl":"https://doi.org/10.1109/LCN.2016.40","url":null,"abstract":"Many MANET routing protocols do not perform well in dense scenarios with high network load. In these situations, we can observe a high level of route instability, which is often called \"route flapping\". In this paper we present the PRIME routing protocol, which uses a probabilistic multipath forwarding process to increase route stability in dense scenarios with high network load. We describe the routing protocol and propose different scenarios to evaluate the protocol performance. We compare the behavior of our protocol with the well-known OLSR and AODV protocols in those scenarios. The evaluation results show that the PRIME routing protocol does in fact have a positive impact on route stability and can improve the overall network performance in situations with high network load.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"73 1","pages":"192-195"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86380605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Addressing Network Interoperability in Hybrid IEEE 802.11s/LTE Smart Grid Communications 混合IEEE 802.11s/LTE智能电网通信中的寻址网络互操作性
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.107
Nico Saputro, K. Akkaya, Samet Tonyali
Ensuring network interoperability when IEEE 802.11s-based NAN and LTE-based WAN is deployed for Smart Grid (SG) Advanced Metering Infrastructure (AMI) poses significant challenges. Besides the QoS mismatch between networks, LTE tunneling mechanism becomes an issue when forwarding downlink traffic to IEEE 802.11s network since the gateway of these networks is supposed to be the end device in LTE setup. Yet, inherent security/privacy overhead in SG traffic makes it even more challenging. To address these issues, a novel UE access list is proposed for LTE network to enable the downlink traffic identification to IEEE 802.11s network and accordingly selects the corresponding gateway. For the QoS mismatch, Dual-Queues (DQs) for each Access Category of the underlying MAC protocol, namely Enhanced Distributed Channel Access (EDCA) in IEEE 802.11s network is proposed. By using ns-3 network simulator, extensive performance evaluations under heavy security overhead are conducted to assess the performance of the proposed mechanisms.
智能电网(SG)高级计量基础设施(AMI)在部署基于IEEE 802.11的NAN和基于lte的WAN时,如何保证网络的互操作性是一个重大挑战。除了网络之间的QoS不匹配之外,由于这些网络的网关在LTE设置中应该是终端设备,因此在将下行流量转发到IEEE 802.11s网络时,LTE隧道机制成为一个问题。然而,SG流量中固有的安全/隐私开销使其更具挑战性。为了解决这些问题,提出了一种新的LTE网络终端接入列表,以实现对IEEE 802.11s网络的下行流量识别,并选择相应的网关。针对QoS不匹配的问题,在IEEE 802.11s网络中提出了基于底层MAC协议的每个访问类别的双队列(Dual-Queues, dq),即增强分布式通道访问(Enhanced Distributed Channel Access, EDCA)。通过使用ns-3网络模拟器,在高安全开销下进行了广泛的性能评估,以评估所提出机制的性能。
{"title":"Addressing Network Interoperability in Hybrid IEEE 802.11s/LTE Smart Grid Communications","authors":"Nico Saputro, K. Akkaya, Samet Tonyali","doi":"10.1109/LCN.2016.107","DOIUrl":"https://doi.org/10.1109/LCN.2016.107","url":null,"abstract":"Ensuring network interoperability when IEEE 802.11s-based NAN and LTE-based WAN is deployed for Smart Grid (SG) Advanced Metering Infrastructure (AMI) poses significant challenges. Besides the QoS mismatch between networks, LTE tunneling mechanism becomes an issue when forwarding downlink traffic to IEEE 802.11s network since the gateway of these networks is supposed to be the end device in LTE setup. Yet, inherent security/privacy overhead in SG traffic makes it even more challenging. To address these issues, a novel UE access list is proposed for LTE network to enable the downlink traffic identification to IEEE 802.11s network and accordingly selects the corresponding gateway. For the QoS mismatch, Dual-Queues (DQs) for each Access Category of the underlying MAC protocol, namely Enhanced Distributed Channel Access (EDCA) in IEEE 802.11s network is proposed. By using ns-3 network simulator, extensive performance evaluations under heavy security overhead are conducted to assess the performance of the proposed mechanisms.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"14 1","pages":"623-626"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84370626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 IEEE 41st Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1