首页 > 最新文献

2016 IEEE 41st Conference on Local Computer Networks (LCN)最新文献

英文 中文
Meta-Heuristic Solution for Dynamic Association Control in Virtualized Multi-Rate WLANs 虚拟多速率无线局域网动态关联控制的元启发式解决方案
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.53
Seyed Dawood Sajjadi Torshizi, Maryam Tanha, Jianping Pan
Chaotic deployment of Wireless Local Area Networks (WLANs) in dense urban areas is one of the common issues of many Internet Service Providers (ISPs) and Wi-Fi users. It results in a substantial reduction of the throughput and impedes the balanced distribution of bandwidth among the users. Most of these networks are managed independently and there is no cooperation among them. Moreover, the conventional association mechanism that selects the Access Points (APs) with the strongest Received Signal Strength Indicator (RSSI) aggravates this situation. In this paper, we present a versatile near-optimal solution for the fair bandwidth distribution over virtualized WLANs through dynamic association control. The proposed scheme is called ACO-PF, which is developed on top of Ant Colony Optimization (ACO) as a meta-heuristic technique to provide Proportional Fairness (PF) among the greedy clients. In fact, it presents a generic and centralized solution for ISPs that are using a common, virtualized or overlapped WLAN infrastructure for serving their customers. We have evaluated the efficacy of ACO-PF through numerical analysis versus popular existing schemes for both downlink and uplink scenarios. Our proposed technique has less complexity in terms of the implementation and running time for largescale WLANs and it can be easily developed and customized for different objective functions. In addition, it is implemented in a testbed environment to investigate the key challenges of real deployment scenarios.
在人口密集的城市地区,无线局域网(wlan)的混乱部署是许多互联网服务提供商(isp)和Wi-Fi用户共同面临的问题之一。它会导致吞吐量的大幅降低,并阻碍带宽在用户之间的均衡分配。这些网络大多是独立管理的,它们之间没有合作。此外,传统的关联机制选择具有最强接收信号强度指标(RSSI)的接入点(ap),这加剧了这种情况。本文提出了一种基于动态关联控制的虚拟wlan公平带宽分配的通用近最优解决方案。该方案是在蚁群优化(ACO)的基础上发展起来的一种元启发式算法,用于在贪婪客户端之间提供比例公平(PF)。实际上,它为使用通用的、虚拟化的或重叠的WLAN基础设施为其客户服务的isp提供了一种通用的集中式解决方案。我们通过数值分析评估了ACO-PF在下行和上行场景下的有效性,对比了现有的流行方案。该技术在大规模无线局域网的实现和运行时间方面具有较低的复杂性,并且可以很容易地针对不同的目标函数进行开发和定制。此外,它是在测试平台环境中实现的,以调查真实部署场景的关键挑战。
{"title":"Meta-Heuristic Solution for Dynamic Association Control in Virtualized Multi-Rate WLANs","authors":"Seyed Dawood Sajjadi Torshizi, Maryam Tanha, Jianping Pan","doi":"10.1109/LCN.2016.53","DOIUrl":"https://doi.org/10.1109/LCN.2016.53","url":null,"abstract":"Chaotic deployment of Wireless Local Area Networks (WLANs) in dense urban areas is one of the common issues of many Internet Service Providers (ISPs) and Wi-Fi users. It results in a substantial reduction of the throughput and impedes the balanced distribution of bandwidth among the users. Most of these networks are managed independently and there is no cooperation among them. Moreover, the conventional association mechanism that selects the Access Points (APs) with the strongest Received Signal Strength Indicator (RSSI) aggravates this situation. In this paper, we present a versatile near-optimal solution for the fair bandwidth distribution over virtualized WLANs through dynamic association control. The proposed scheme is called ACO-PF, which is developed on top of Ant Colony Optimization (ACO) as a meta-heuristic technique to provide Proportional Fairness (PF) among the greedy clients. In fact, it presents a generic and centralized solution for ISPs that are using a common, virtualized or overlapped WLAN infrastructure for serving their customers. We have evaluated the efficacy of ACO-PF through numerical analysis versus popular existing schemes for both downlink and uplink scenarios. Our proposed technique has less complexity in terms of the implementation and running time for largescale WLANs and it can be easily developed and customized for different objective functions. In addition, it is implemented in a testbed environment to investigate the key challenges of real deployment scenarios.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"35 1","pages":"253-261"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89933621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Efficiency Pipeline Processing Approach for OpenFlow Switch OpenFlow开关的高效流水线处理方法
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.43
Zhenwei Wu, Yong Jiang, Shu Yang
One primary component of OpenFlow switches is a pipeline of flow tables. Flows are directed through the pipeline by looking up a matched rule in each table. Sequentially, Packet matching starts at table 0 and continues to additional tables of the pipeline if necessary. The lookup stops when one flow entry is matched or the end of pipeline is reached. Though effective, this manner of processing is not efficient when popular rules are installed in back tables. If frequently matched rules appear earlier in the pipeline, the procedure of lookup and comparison can be improved. Unfortunately, a simple sorting algorithm is not feasible. In this paper, we formalize the problem of reducing lookup times, which is proven to be NP-hard. A heuristic approach, MILE(migrating flow rules), is proposed to minimize the average number of lookups. Experimental results show that MILE is able to reduce table lookups by 50%.
OpenFlow交换机的一个主要组件是流表管道。通过在每个表中查找匹配的规则来引导流通过管道。按顺序,数据包匹配从表0开始,并在必要时继续到管道的其他表。当匹配到一个流条目或到达管道末端时,查找停止。虽然这种处理方式是有效的,但是当流行规则安装在后表中时,这种处理方式就不那么有效了。如果频繁匹配的规则较早地出现在管道中,则可以改进查找和比较过程。不幸的是,简单的排序算法是不可行的。在本文中,我们形式化了减少查找时间的问题,该问题被证明是np困难的。提出了一种启发式方法,MILE(迁移流规则),以最小化平均查找次数。实验结果表明,MILE能够减少50%的表查找。
{"title":"An Efficiency Pipeline Processing Approach for OpenFlow Switch","authors":"Zhenwei Wu, Yong Jiang, Shu Yang","doi":"10.1109/LCN.2016.43","DOIUrl":"https://doi.org/10.1109/LCN.2016.43","url":null,"abstract":"One primary component of OpenFlow switches is a pipeline of flow tables. Flows are directed through the pipeline by looking up a matched rule in each table. Sequentially, Packet matching starts at table 0 and continues to additional tables of the pipeline if necessary. The lookup stops when one flow entry is matched or the end of pipeline is reached. Though effective, this manner of processing is not efficient when popular rules are installed in back tables. If frequently matched rules appear earlier in the pipeline, the procedure of lookup and comparison can be improved. Unfortunately, a simple sorting algorithm is not feasible. In this paper, we formalize the problem of reducing lookup times, which is proven to be NP-hard. A heuristic approach, MILE(migrating flow rules), is proposed to minimize the average number of lookups. Experimental results show that MILE is able to reduce table lookups by 50%.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"16 1","pages":"204-207"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87847269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Breach Path Reliability for Directional Sensor Networks 定向传感器网络缺口路径可靠性研究
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.65
Mohammed Elmorsy, E. Elmallah
Wireless Sensor Networks (WSNs) equipped with directional communication and sensing devices provide a high level of tunability needed in optimizing their performance in critical applications. Such devices and nodes, however, remain prone to failure when operating in the field. In this paper we formalize a problem, called directional breach path detection reliability (DIR-BPDREL), that quantifies the ability of such networks to jointly detect and report unauthorized traversal through a network when communication and sensing devices fail independently of each other. We adopt a framework for deriving lower and upper bounds on exact reliability solutions, and develop efficient algorithms for optimizing the computations using pathset and cutset structures of the given network. The algorithms process separate communication and sensing graphs to ensure joint detection and reporting of intrusion events from multiple possible entry-exit sides. The obtained numerical results give insight into the effect of various design parameters on network wide performance.
配备定向通信和传感设备的无线传感器网络(wsn)提供了在关键应用中优化其性能所需的高水平可调性。然而,这些设备和节点在现场操作时仍然容易出现故障。在本文中,我们形式化了一个问题,称为定向破坏路径检测可靠性(DIR-BPDREL),该问题量化了当通信和传感设备相互独立故障时,此类网络联合检测和报告通过网络的未经授权的穿越的能力。我们采用了一个框架来推导精确可靠性解的下界和上界,并开发了有效的算法来优化使用给定网络的路径集和割集结构的计算。该算法处理单独的通信和感知图,以确保从多个可能的进出侧联合检测和报告入侵事件。所得的数值结果揭示了各种设计参数对网络性能的影响。
{"title":"Breach Path Reliability for Directional Sensor Networks","authors":"Mohammed Elmorsy, E. Elmallah","doi":"10.1109/LCN.2016.65","DOIUrl":"https://doi.org/10.1109/LCN.2016.65","url":null,"abstract":"Wireless Sensor Networks (WSNs) equipped with directional communication and sensing devices provide a high level of tunability needed in optimizing their performance in critical applications. Such devices and nodes, however, remain prone to failure when operating in the field. In this paper we formalize a problem, called directional breach path detection reliability (DIR-BPDREL), that quantifies the ability of such networks to jointly detect and report unauthorized traversal through a network when communication and sensing devices fail independently of each other. We adopt a framework for deriving lower and upper bounds on exact reliability solutions, and develop efficient algorithms for optimizing the computations using pathset and cutset structures of the given network. The algorithms process separate communication and sensing graphs to ensure joint detection and reporting of intrusion events from multiple possible entry-exit sides. The obtained numerical results give insight into the effect of various design parameters on network wide performance.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"12 1","pages":"371-379"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87400564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A-LMST: An Adaptive LMST Local Topology Control Algorithm for Mobile Ad Hoc Networks A-LMST:一种移动Ad Hoc网络自适应LMST局部拓扑控制算法
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.34
Luciana B. Abiuzi, Cecília A. C. César, C. Ribeiro
The pattern of mobile nodes movement and node removals or additions cause frequent and unpredictable changes in the topology of mobile ad hoc networks. Network performance can thus vary significantly under different mobility models, as well as from the variation in parameters of a given mobility model, such as node movement speed and number of nodes in the network. Hence, the efficiency of a network depends not only on its control protocols, but also on its topology. In this paper, we first compare the impact that mobility parameter variations produces on typical network metrics - routing packets generated, routing overhead and route discovery average delay - in networks with and without topology control. Results from experiments in a wireless network simulator show that, in networks with topology control using 2 or 3 hops for route discovery depending on the node degree, the number of routing packets decreases, therefore improving the operation and efficiency of the network. Based on these results, a local adaptive self-configuration LMST topology control was then proposed and analysed, producing better results as the network size increases.
移动节点移动和节点移除或添加的模式导致移动自组织网络拓扑结构频繁且不可预测的变化。因此,在不同的移动性模型下,以及给定移动性模型的参数(如节点移动速度和网络中的节点数量)的变化,网络性能可能会有很大差异。因此,网络的效率不仅取决于其控制协议,还取决于其拓扑结构。在本文中,我们首先比较了移动性参数变化在有和没有拓扑控制的网络中对典型网络指标(生成的路由数据包、路由开销和路由发现平均延迟)的影响。在无线网络模拟器上的实验结果表明,在根据节点度采用2或3跳拓扑控制进行路由发现的网络中,路由数据包的数量减少,从而提高了网络的运行效率。在此基础上,提出并分析了一种局部自适应自配置LMST拓扑控制方法,随着网络规模的增大,控制效果更好。
{"title":"A-LMST: An Adaptive LMST Local Topology Control Algorithm for Mobile Ad Hoc Networks","authors":"Luciana B. Abiuzi, Cecília A. C. César, C. Ribeiro","doi":"10.1109/LCN.2016.34","DOIUrl":"https://doi.org/10.1109/LCN.2016.34","url":null,"abstract":"The pattern of mobile nodes movement and node removals or additions cause frequent and unpredictable changes in the topology of mobile ad hoc networks. Network performance can thus vary significantly under different mobility models, as well as from the variation in parameters of a given mobility model, such as node movement speed and number of nodes in the network. Hence, the efficiency of a network depends not only on its control protocols, but also on its topology. In this paper, we first compare the impact that mobility parameter variations produces on typical network metrics - routing packets generated, routing overhead and route discovery average delay - in networks with and without topology control. Results from experiments in a wireless network simulator show that, in networks with topology control using 2 or 3 hops for route discovery depending on the node degree, the number of routing packets decreases, therefore improving the operation and efficiency of the network. Based on these results, a local adaptive self-configuration LMST topology control was then proposed and analysed, producing better results as the network size increases.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"20 1","pages":"168-171"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75905380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fragmentation-Based Multipath Routing for Attack Resilience in Software Defined Networks 基于碎片的多路径路由在软件定义网络中的攻击弹性
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.98
Purnima Murali Mohan, Teng Joon Lim, G. Mohan
In this paper, we propose a Fragmentation-based Multipath Routing (FMR) model for Software Defined Networks (SDNs) to enable attack-resilient data transfer. With the use of erasure encoding to fragment a message, the fragments are routed along multiple paths such that no intermediate node receives enough fragments required for message decoding. This ensures that, any intruder on a compromised node does not infer the original data from the received fragments. We develop an optimization programming formulation of the problem to choose reliable paths that provide resilience to attacks. Using FMR, the SDN controller dynamically routes the data fragments along a set of most reliable paths to achieve multipath diversity and hence improve data availability at the destination even in the presence of an attack. We carry out performance studies and demonstrate the effectiveness of our approach in terms of weighted path reliability and blocking performance.
在本文中,我们提出了一种基于碎片的多路径路由(FMR)模型,用于软件定义网络(sdn),以实现攻击弹性数据传输。通过使用擦除编码对消息进行分段,这些分段沿着多条路径路由,这样中间节点就不会接收到消息解码所需的足够的分段。这确保了在受损节点上的任何入侵者都不会从接收到的片段中推断出原始数据。我们开发了一个优化规划公式的问题,以选择可靠的路径,提供弹性攻击。使用FMR, SDN控制器沿着一组最可靠的路径动态路由数据片段,以实现多路径多样性,从而提高目的地的数据可用性,即使在存在攻击的情况下。我们进行了性能研究,并在加权路径可靠性和阻塞性能方面证明了我们的方法的有效性。
{"title":"Fragmentation-Based Multipath Routing for Attack Resilience in Software Defined Networks","authors":"Purnima Murali Mohan, Teng Joon Lim, G. Mohan","doi":"10.1109/LCN.2016.98","DOIUrl":"https://doi.org/10.1109/LCN.2016.98","url":null,"abstract":"In this paper, we propose a Fragmentation-based Multipath Routing (FMR) model for Software Defined Networks (SDNs) to enable attack-resilient data transfer. With the use of erasure encoding to fragment a message, the fragments are routed along multiple paths such that no intermediate node receives enough fragments required for message decoding. This ensures that, any intruder on a compromised node does not infer the original data from the received fragments. We develop an optimization programming formulation of the problem to choose reliable paths that provide resilience to attacks. Using FMR, the SDN controller dynamically routes the data fragments along a set of most reliable paths to achieve multipath diversity and hence improve data availability at the destination even in the presence of an attack. We carry out performance studies and demonstrate the effectiveness of our approach in terms of weighted path reliability and blocking performance.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"55 1","pages":"583-586"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81262303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Comparison of TCP Congestion Control Algorithms in 10G Networks 10G网络中TCP拥塞控制算法的比较
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.121
Thomas Lukaseder, Leonard Bradatsch, Benjamin Erb, R. V. D. Heijden, F. Kargl
The increasing availability of 10G Ethernet network capabilities challenges existing transport layer protocols. As 10G connections gain momentum outside of backbone networks, the choice of appropriate TCP congestion control algorithms becomes even more relevant for networked applications running in environments such as data centers. Therefore, we provide an extensive overview of relevant TCP congestion control algorithms for high-speed environments leveraging 10G. We analyzed and evaluated six TCP variants using a physical network testbed, with a focus on the effects of propagation delay and significant drop rates. The results indicate that of the algorithms compared, BIC is most suitable when no legacy variant is present, CUBIC is suggested otherwise.
10G以太网网络功能的日益可用性对现有的传输层协议提出了挑战。随着10G连接在骨干网络之外的发展势头,选择合适的TCP拥塞控制算法对于在数据中心等环境中运行的网络应用程序变得更加重要。因此,我们对利用10G的高速环境中的相关TCP拥塞控制算法进行了广泛的概述。我们使用物理网络测试平台分析和评估了六种TCP变体,重点关注传播延迟和显著掉包率的影响。结果表明,在没有遗留变量的情况下,BIC算法是最合适的,否则,建议使用CUBIC算法。
{"title":"A Comparison of TCP Congestion Control Algorithms in 10G Networks","authors":"Thomas Lukaseder, Leonard Bradatsch, Benjamin Erb, R. V. D. Heijden, F. Kargl","doi":"10.1109/LCN.2016.121","DOIUrl":"https://doi.org/10.1109/LCN.2016.121","url":null,"abstract":"The increasing availability of 10G Ethernet network capabilities challenges existing transport layer protocols. As 10G connections gain momentum outside of backbone networks, the choice of appropriate TCP congestion control algorithms becomes even more relevant for networked applications running in environments such as data centers. Therefore, we provide an extensive overview of relevant TCP congestion control algorithms for high-speed environments leveraging 10G. We analyzed and evaluated six TCP variants using a physical network testbed, with a focus on the effects of propagation delay and significant drop rates. The results indicate that of the algorithms compared, BIC is most suitable when no legacy variant is present, CUBIC is suggested otherwise.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"14 1","pages":"706-714"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90554723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Rate-Adaptive Link Quality Estimation for Coded Packet Networks 编码分组网络的速率自适应链路质量估计
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.124
Maurice Leclaire, Stephan M. Günther, Marten Lienen, Maximilian Riemensberger, G. Carle
Coded packet networks allow for proactive injection of redundant packets to compensate for packet loss. Link metrics are usually based on the estimated transmission counter (ETX). This metric is used to determine the expected number of coded packets needed, but does not make guarantees for a specific decoding probability. In this paper we show that relying on the ETX metric leads to a surprisingly high probability that decoding is not possible. Based on this result, we derive a redundancy scheme to allow for an adjustable decoding probability. In a third step, we extend this scheme to also consider the reliability of link quality estimates themselves. We provide a numerically stable and hardware-accelerated implementation of our redundancy scheme, and compare all approaches in a simulated environment. Finally, we show the effect of the new redundancy scheme on different transport layer protocols in a wireless setup with random linear network coding.
编码包网络允许主动注入冗余包来补偿包丢失。链路度量通常基于估计的传输计数器(ETX)。该指标用于确定所需编码数据包的预期数量,但不能保证特定的解码概率。在本文中,我们表明,依赖于ETX度量导致解码不可能的惊人高概率。基于这个结果,我们推导了一个冗余方案,允许可调的解码概率。在第三步,我们扩展该方案,同时考虑链路质量估计本身的可靠性。我们提供了一个数字稳定和硬件加速的冗余方案实现,并在模拟环境中比较了所有方法。最后,我们展示了在随机线性网络编码的无线设置中,新的冗余方案对不同传输层协议的影响。
{"title":"Rate-Adaptive Link Quality Estimation for Coded Packet Networks","authors":"Maurice Leclaire, Stephan M. Günther, Marten Lienen, Maximilian Riemensberger, G. Carle","doi":"10.1109/LCN.2016.124","DOIUrl":"https://doi.org/10.1109/LCN.2016.124","url":null,"abstract":"Coded packet networks allow for proactive injection of redundant packets to compensate for packet loss. Link metrics are usually based on the estimated transmission counter (ETX). This metric is used to determine the expected number of coded packets needed, but does not make guarantees for a specific decoding probability. In this paper we show that relying on the ETX metric leads to a surprisingly high probability that decoding is not possible. Based on this result, we derive a redundancy scheme to allow for an adjustable decoding probability. In a third step, we extend this scheme to also consider the reliability of link quality estimates themselves. We provide a numerically stable and hardware-accelerated implementation of our redundancy scheme, and compare all approaches in a simulated environment. Finally, we show the effect of the new redundancy scheme on different transport layer protocols in a wireless setup with random linear network coding.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"54 1","pages":"732-740"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91051491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Data-Centric Clustering with Sensor Networks for Energy Efficient IoT Applications 自适应数据中心集群与传感器网络的节能物联网应用
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.68
Sanat Sarangi, S. Pappula
A wireless sensor network (WSN) typically involves deploying multiple nodes in an area to measure environmental parameters. WSNs are getting enveloped within the realm of IoT which significantly increases their scale of deployment. The end-objective of deploying a sensor network is to get valuable data about a region irrespective of the physical configuration used for measurement. We propose an Adaptive Data-centric Clustering algorithm for Sensor networks (ADCS), a hierarchical algorithm where user-specific data requirements are factored into the clustering decisions. Specifically, similarity in parameter variations are used as a criteria for optimization. We have deployed an eKo-based sensor network in north-eastern India to measure environmental parameters as part of a precision agriculture application. Data from this network is used to develop models to rigorously compare the performance of three variants of ADCS: ADCS-DB, ADCS-KM and ADCS-AG and arrive at useful recommendations for deployment planning.
无线传感器网络(WSN)通常涉及在一个区域内部署多个节点来测量环境参数。无线传感器网络正被包裹在物联网领域中,这大大增加了它们的部署规模。部署传感器网络的最终目标是获得有关一个区域的有价值的数据,而不考虑用于测量的物理配置。我们提出了一种用于传感器网络的自适应数据中心聚类算法(ADCS),这是一种分层算法,其中用户特定的数据需求被考虑到聚类决策中。具体来说,参数变化的相似性被用作优化的标准。我们已经在印度东北部部署了一个基于eko的传感器网络来测量环境参数,作为精准农业应用的一部分。来自该网络的数据用于开发模型,以严格比较ADCS的三种变体:ADCS- db、ADCS- km和ADCS- ag的性能,并为部署规划提供有用的建议。
{"title":"Adaptive Data-Centric Clustering with Sensor Networks for Energy Efficient IoT Applications","authors":"Sanat Sarangi, S. Pappula","doi":"10.1109/LCN.2016.68","DOIUrl":"https://doi.org/10.1109/LCN.2016.68","url":null,"abstract":"A wireless sensor network (WSN) typically involves deploying multiple nodes in an area to measure environmental parameters. WSNs are getting enveloped within the realm of IoT which significantly increases their scale of deployment. The end-objective of deploying a sensor network is to get valuable data about a region irrespective of the physical configuration used for measurement. We propose an Adaptive Data-centric Clustering algorithm for Sensor networks (ADCS), a hierarchical algorithm where user-specific data requirements are factored into the clustering decisions. Specifically, similarity in parameter variations are used as a criteria for optimization. We have deployed an eKo-based sensor network in north-eastern India to measure environmental parameters as part of a precision agriculture application. Data from this network is used to develop models to rigorously compare the performance of three variants of ADCS: ADCS-DB, ADCS-KM and ADCS-AG and arrive at useful recommendations for deployment planning.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"77 1","pages":"398-405"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89536521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Man-In-the-Middle Anycast (MIMA): CDN User-Server Assignment Becomes Flexible 中间人任意播(MIMA): CDN用户服务器分配变得灵活
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.74
Jeffrey Lai, Q. Fu
Within Content Delivery Networks (CDNs), users are typically geographically load-balanced across multiple servers in order to provide better performance and locality - users are assigned to the content servers close to them. One approach to user-server assignment is the use of IP anycast, where all the content servers use the same IP address. A user request is then routed to the server closest to the user, determined by the routing protocols such as BGP. However, there are problems associated with this anycast-based approach. IP anycast is generally incapable of updating or redirecting users to a different (better) server without breaking already established TCP sessions. Moreover, the CDN operators do not have much control on where to redirect the users - it is completely controlled by Internet routing. In this paper we present our Man-In-the-Middle Anycast (MIMA) architecture, a novel anycast-based design that leverages Network Functions Virtualization (NFV) and Software Defined Networking (SDN) techniques to enable flexible and efficient user-server assignment. We demonstrate that the MIMA architecture is capable of performing flexible user-server assignment and offloading during times of high demand, such as flash crowd events that are becoming more common in a media-focused Internet. These capabilities offered by MIMA provide CDN operators a higher degree of flexibility in network management and content provisioning by enabling flexible user-server assignment.
在内容交付网络(cdn)中,用户通常在多个服务器上实现地理负载平衡,以便提供更好的性能和局部性——用户被分配到离他们较近的内容服务器。用户-服务器分配的一种方法是使用IP任播,其中所有内容服务器使用相同的IP地址。然后,用户请求被路由到离用户最近的服务器,由路由协议(如BGP)决定。然而,这种基于任意播的方法存在一些问题。IP任意播通常无法在不破坏已经建立的TCP会话的情况下更新用户或将用户重定向到另一个(更好的)服务器。此外,CDN运营商对用户重定向到哪里没有太多控制权——它完全由互联网路由控制。在本文中,我们介绍了我们的中间人任播(MIMA)架构,这是一种新颖的基于任播的设计,利用网络功能虚拟化(NFV)和软件定义网络(SDN)技术来实现灵活高效的用户-服务器分配。我们证明了MIMA架构能够在高需求时执行灵活的用户服务器分配和卸载,例如在以媒体为中心的互联网中变得越来越常见的快闪人群事件。MIMA提供的这些功能通过实现灵活的用户-服务器分配,为CDN运营商在网络管理和内容供应方面提供了更高程度的灵活性。
{"title":"Man-In-the-Middle Anycast (MIMA): CDN User-Server Assignment Becomes Flexible","authors":"Jeffrey Lai, Q. Fu","doi":"10.1109/LCN.2016.74","DOIUrl":"https://doi.org/10.1109/LCN.2016.74","url":null,"abstract":"Within Content Delivery Networks (CDNs), users are typically geographically load-balanced across multiple servers in order to provide better performance and locality - users are assigned to the content servers close to them. One approach to user-server assignment is the use of IP anycast, where all the content servers use the same IP address. A user request is then routed to the server closest to the user, determined by the routing protocols such as BGP. However, there are problems associated with this anycast-based approach. IP anycast is generally incapable of updating or redirecting users to a different (better) server without breaking already established TCP sessions. Moreover, the CDN operators do not have much control on where to redirect the users - it is completely controlled by Internet routing. In this paper we present our Man-In-the-Middle Anycast (MIMA) architecture, a novel anycast-based design that leverages Network Functions Virtualization (NFV) and Software Defined Networking (SDN) techniques to enable flexible and efficient user-server assignment. We demonstrate that the MIMA architecture is capable of performing flexible user-server assignment and offloading during times of high demand, such as flash crowd events that are becoming more common in a media-focused Internet. These capabilities offered by MIMA provide CDN operators a higher degree of flexibility in network management and content provisioning by enabling flexible user-server assignment.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"2 1","pages":"451-459"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87944563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks 早起的鸟儿得到僵尸网络:基于马尔可夫链的僵尸网络攻击预警系统
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.17
Zainab Abaid, D. Sarkar, M. Kâafar, Sanjay Jha
Botnet threats include a plethora of possible attacks ranging from distributed denial of service (DDoS), to drive-by-download malware distribution and spam. While for over two decades, techniques have been proposed for either improving accuracy or speeding up the detection of attacks, much of the damage is done by the time attacks are contained. In this work we take a new direction which aims to predict forthcoming attacks (i.e. before they occur), providing early warnings to network administrators who can then prepare to contain them as soon as they manifest or simply quarantine hosts. Our approach is based on modelling the Botnet infection sequence as a Markov chain with the objective of identifying behaviour that is likely to lead to attacks. We present the results of applying a Markov model to real world Botnets' data, and show that with this approach we are successfully able to predict more than 98% of attacks from a variety of Botnet families with a very low false alarm rate.
僵尸网络威胁包括大量可能的攻击,从分布式拒绝服务(DDoS)到驱动下载恶意软件分发和垃圾邮件。虽然在过去的二十多年里,已经提出了提高攻击准确性或加速检测的技术,但大部分损害都是在攻击被控制的时候造成的。在这项工作中,我们采取了一个新的方向,旨在预测即将到来的攻击(即在它们发生之前),为网络管理员提供早期警告,然后他们可以在它们出现或仅仅隔离主机时准备遏制它们。我们的方法是基于将僵尸网络感染序列建模为马尔可夫链,目的是识别可能导致攻击的行为。我们展示了将马尔可夫模型应用于现实世界僵尸网络数据的结果,并表明使用这种方法,我们能够成功地预测来自各种僵尸网络家族的98%以上的攻击,并且误报率非常低。
{"title":"The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks","authors":"Zainab Abaid, D. Sarkar, M. Kâafar, Sanjay Jha","doi":"10.1109/LCN.2016.17","DOIUrl":"https://doi.org/10.1109/LCN.2016.17","url":null,"abstract":"Botnet threats include a plethora of possible attacks ranging from distributed denial of service (DDoS), to drive-by-download malware distribution and spam. While for over two decades, techniques have been proposed for either improving accuracy or speeding up the detection of attacks, much of the damage is done by the time attacks are contained. In this work we take a new direction which aims to predict forthcoming attacks (i.e. before they occur), providing early warnings to network administrators who can then prepare to contain them as soon as they manifest or simply quarantine hosts. Our approach is based on modelling the Botnet infection sequence as a Markov chain with the objective of identifying behaviour that is likely to lead to attacks. We present the results of applying a Markov model to real world Botnets' data, and show that with this approach we are successfully able to predict more than 98% of attacks from a variety of Botnet families with a very low false alarm rate.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"61-68"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86596828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2016 IEEE 41st Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1