首页 > 最新文献

2016 IEEE 41st Conference on Local Computer Networks (LCN)最新文献

英文 中文
Setting Up a High-Speed TCP Benchmarking Environment - Lessons Learned 建立高速TCP基准测试环境-经验教训
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.32
Thomas Lukaseder, Leonard Bradatsch, Benjamin Erb, F. Kargl
There are many high-speed TCP variants with different congestion control algorithms, which are designed for specific settings or use cases. Distinct features of these algorithms are meant to optimize different aspects of network performance, and the choice of TCP variant strongly influences application performance. However, setting up tests to help with the decision of which variant to use can be problematic, as many systems are not designed to deal with high bandwidths, such as 10 Gbps or more. This paper provides an overview of pitfalls and challenges of realistic network analysis to help in the decision making process.
有许多具有不同拥塞控制算法的高速TCP变体,这些算法是为特定设置或用例设计的。这些算法的不同特性意味着优化网络性能的不同方面,TCP变体的选择强烈影响应用程序的性能。然而,设置测试来帮助决定使用哪种变体可能会有问题,因为许多系统的设计不适合处理高带宽,例如10 Gbps或更高。本文概述了现实网络分析的缺陷和挑战,以帮助决策过程。
{"title":"Setting Up a High-Speed TCP Benchmarking Environment - Lessons Learned","authors":"Thomas Lukaseder, Leonard Bradatsch, Benjamin Erb, F. Kargl","doi":"10.1109/LCN.2016.32","DOIUrl":"https://doi.org/10.1109/LCN.2016.32","url":null,"abstract":"There are many high-speed TCP variants with different congestion control algorithms, which are designed for specific settings or use cases. Distinct features of these algorithms are meant to optimize different aspects of network performance, and the choice of TCP variant strongly influences application performance. However, setting up tests to help with the decision of which variant to use can be problematic, as many systems are not designed to deal with high bandwidths, such as 10 Gbps or more. This paper provides an overview of pitfalls and challenges of realistic network analysis to help in the decision making process.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"40 1","pages":"160-163"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82849133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Carving Software-Defined Networks for Scientific Applications with SpateN 用SpateN雕刻科学应用的软件定义网络
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.42
Celio Trois, L. C. E. Bona, Marcos Didonet Del Fabro, M. Martinello
Scientific applications (SciApps) are broadly used in all science domains. For more accurate results, they have been increasingly demanding computational power and extremely agile networks. These applications are usually implemented using numerical methods presenting well-behaved patterns to exchange data across its computing nodes. This paper presents SpateN, a tool that exploits the spatial communication patterns of SciApps as the fundamental logic to drive the network programming. SpateN classifies the SciApps nodes communications and balances the elephant flows across the available network paths. As a proof of concept, we carried out a set of experiments in real testbeds, demonstrating that network programming may affect the performance of SciApps significantly. Also, a balanced flow allocation can speed up SciApps to near-optimal execution times.
科学应用程序(SciApps)广泛应用于所有科学领域。为了获得更准确的结果,他们对计算能力和极其敏捷的网络的要求越来越高。这些应用程序通常使用数值方法来实现,这些数值方法表现出良好的模式,以便在其计算节点之间交换数据。SpateN是一个利用SciApps的空间通信模式作为驱动网络编程的基本逻辑的工具。SpateN对SciApps节点的通信进行分类,并在可用的网络路径上平衡大象流。作为概念验证,我们在真实的测试平台上进行了一系列实验,证明网络编程可能会显著影响SciApps的性能。此外,平衡的流分配可以将SciApps的执行时间加快到接近最佳的水平。
{"title":"Carving Software-Defined Networks for Scientific Applications with SpateN","authors":"Celio Trois, L. C. E. Bona, Marcos Didonet Del Fabro, M. Martinello","doi":"10.1109/LCN.2016.42","DOIUrl":"https://doi.org/10.1109/LCN.2016.42","url":null,"abstract":"Scientific applications (SciApps) are broadly used in all science domains. For more accurate results, they have been increasingly demanding computational power and extremely agile networks. These applications are usually implemented using numerical methods presenting well-behaved patterns to exchange data across its computing nodes. This paper presents SpateN, a tool that exploits the spatial communication patterns of SciApps as the fundamental logic to drive the network programming. SpateN classifies the SciApps nodes communications and balances the elephant flows across the available network paths. As a proof of concept, we carried out a set of experiments in real testbeds, demonstrating that network programming may affect the performance of SciApps significantly. Also, a balanced flow allocation can speed up SciApps to near-optimal execution times.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"200-203"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89294195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Probr - A Generic and Passive WiFi Tracking System Probr -一种通用的无源WiFi跟踪系统
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.30
Joel Scheuner, Genc Mazlami, Dominik Schöni, Sebastian Stephan, A. D. Carli, T. Bocek, B. Stiller
WiFi-enabled devices broadcast a vast amount of data without being associated to any access points. To study and analyze this data, a generic passive WiFi tracking system called Probr was developed. Probr manages various types of WiFi capturing devices, collects captured WiFi traces, processes collected WiFi traces, and visualizes WiFi activities via its Web interface. Probr supports several on-line analysis use cases and is extensible with respect to custom storage solutions to fit further use cases. Thus, Probr is the first system of that kind known, enabling full device administration and provided completely as Open Source. A case study conducted demonstrates the capabilities of Probr for use cases such as room utilization estimation, indoor device localization, tracking a person's presence between multiple Probr-equipped locations, and analysis of device vendor preferences.
支持wifi的设备无需与任何接入点相关联即可广播大量数据。为了研究和分析这些数据,开发了一种称为Probr的通用被动WiFi跟踪系统。Probr管理各种WiFi捕获设备,收集捕获的WiFi轨迹,处理收集到的WiFi轨迹,并通过其Web界面可视化WiFi活动。Probr支持几个在线分析用例,并且可以根据自定义存储解决方案进行扩展,以适应进一步的用例。因此,Probr是已知的第一个此类系统,它支持完整的设备管理,并完全作为开源提供。一个案例研究演示了Probr在一些用例中的功能,比如房间利用率估计、室内设备定位、在多个配备了Probr的位置之间跟踪一个人的存在,以及分析设备供应商的偏好。
{"title":"Probr - A Generic and Passive WiFi Tracking System","authors":"Joel Scheuner, Genc Mazlami, Dominik Schöni, Sebastian Stephan, A. D. Carli, T. Bocek, B. Stiller","doi":"10.1109/LCN.2016.30","DOIUrl":"https://doi.org/10.1109/LCN.2016.30","url":null,"abstract":"WiFi-enabled devices broadcast a vast amount of data without being associated to any access points. To study and analyze this data, a generic passive WiFi tracking system called Probr was developed. Probr manages various types of WiFi capturing devices, collects captured WiFi traces, processes collected WiFi traces, and visualizes WiFi activities via its Web interface. Probr supports several on-line analysis use cases and is extensible with respect to custom storage solutions to fit further use cases. Thus, Probr is the first system of that kind known, enabling full device administration and provided completely as Open Source. A case study conducted demonstrates the capabilities of Probr for use cases such as room utilization estimation, indoor device localization, tracking a person's presence between multiple Probr-equipped locations, and analysis of device vendor preferences.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"52 1","pages":"495-502"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91136815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension 分布式版本控制系统的机密性和真实性-一个Mercurial扩展
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.11
Michael Lass, Dominik Leibenger, Christoph Sorge
Version Control Systems (VCS) are a valuable tool for software development and document management. Both client/server and distributed (Peer-to-Peer) models exist, with the latter (e.g., Git and Mercurial) becoming increasingly popular. Their distributed nature introduces complications, especially concerning security: it is hard to control the dissemination of contents stored in distributed VCS as they rely on replication of complete repositories to any involved user. We overcome this issue by designing and implementing a concept for cryptography-enforced access control which is transparent to the user. Use of field-tested schemes (end-to-end encryption, digital signatures) allows for strong security, while adoption of convergent encryption and content-defined chunking retains storage efficiency. The concept is seamlessly integrated into Mercurial-respecting its distributed storage concept-to ensure practical usability and compatibility to existing deployments.
版本控制系统(VCS)是软件开发和文档管理的重要工具。客户端/服务器和分布式(点对点)模型都存在,后者(例如Git和Mercurial)正变得越来越流行。它们的分布式特性带来了复杂性,特别是在安全性方面:很难控制存储在分布式VCS中的内容的传播,因为它们依赖于向任何相关用户复制完整的存储库。我们通过设计和实现对用户透明的密码学强制访问控制的概念来克服这个问题。使用经过现场测试的方案(端到端加密、数字签名)可以提供强大的安全性,而采用聚合加密和内容定义的分块可以保持存储效率。这个概念被无缝地集成到mercurly中——考虑到它的分布式存储概念——以确保实际的可用性和对现有部署的兼容性。
{"title":"Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension","authors":"Michael Lass, Dominik Leibenger, Christoph Sorge","doi":"10.1109/LCN.2016.11","DOIUrl":"https://doi.org/10.1109/LCN.2016.11","url":null,"abstract":"Version Control Systems (VCS) are a valuable tool for software development and document management. Both client/server and distributed (Peer-to-Peer) models exist, with the latter (e.g., Git and Mercurial) becoming increasingly popular. Their distributed nature introduces complications, especially concerning security: it is hard to control the dissemination of contents stored in distributed VCS as they rely on replication of complete repositories to any involved user. We overcome this issue by designing and implementing a concept for cryptography-enforced access control which is transparent to the user. Use of field-tested schemes (end-to-end encryption, digital signatures) allows for strong security, while adoption of convergent encryption and content-defined chunking retains storage efficiency. The concept is seamlessly integrated into Mercurial-respecting its distributed storage concept-to ensure practical usability and compatibility to existing deployments.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78826964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved Energy-Aware Routing Algorithm in Software-Defined Networks 软件定义网络中改进的能量感知路由算法
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.41
Adriana Fernández-Fernández, C. Cervelló-Pastor, Leonardo Ochoa-Aday
The growing energy consumption of communication networks has attracted the attention of the networking researchers in the last decade. In this context, SDN allows a flexible programmability, suitable for the power-consumption optimization problem. In this paper we present an energy-aware routing approach which minimizes the number of links used to satisfy a given traffic demand. Different from previous works, we optimize energy consumption in OpenFlow networks with in-band control traffic. To this end, we start formulating an optimization model that considers routing requirements for control and data plane communications. To reduce the complexity of our model in large-scale topologies, a heuristic algorithm is developed as well. Although it is not widely researched, except for quantitative and heuristic results, we also derive a simple and efficient algorithm for the best controller placement in terms of energy saving. Simulation results confirm that the proposed solution enables the achievement of significant energy savings.
近十年来,日益增长的通信网络能耗引起了网络研究人员的广泛关注。在这种情况下,SDN允许灵活的可编程性,适合于功耗优化问题。在本文中,我们提出了一种能量感知路由方法,该方法可以最大限度地减少用于满足给定流量需求的链路数量。与以往的工作不同,我们优化了OpenFlow网络中带内控制流量的能耗。为此,我们开始制定一个优化模型,该模型考虑了控制和数据平面通信的路由需求。为了降低模型在大规模拓扑结构中的复杂性,我们还开发了一种启发式算法。虽然目前还没有广泛的研究,但除了定量和启发式的结果外,我们还从节能的角度推导了一种简单有效的最佳控制器布局算法。仿真结果证实了所提出的解决方案能够实现显著的节能。
{"title":"Improved Energy-Aware Routing Algorithm in Software-Defined Networks","authors":"Adriana Fernández-Fernández, C. Cervelló-Pastor, Leonardo Ochoa-Aday","doi":"10.1109/LCN.2016.41","DOIUrl":"https://doi.org/10.1109/LCN.2016.41","url":null,"abstract":"The growing energy consumption of communication networks has attracted the attention of the networking researchers in the last decade. In this context, SDN allows a flexible programmability, suitable for the power-consumption optimization problem. In this paper we present an energy-aware routing approach which minimizes the number of links used to satisfy a given traffic demand. Different from previous works, we optimize energy consumption in OpenFlow networks with in-band control traffic. To this end, we start formulating an optimization model that considers routing requirements for control and data plane communications. To reduce the complexity of our model in large-scale topologies, a heuristic algorithm is developed as well. Although it is not widely researched, except for quantitative and heuristic results, we also derive a simple and efficient algorithm for the best controller placement in terms of energy saving. Simulation results confirm that the proposed solution enables the achievement of significant energy savings.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"25 1","pages":"196-199"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84483243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Multipath Bandwidth Guarantees for Multi-Tenant Cloud Networking 多租户云组网的多路径带宽保障
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.73
Wei Wang, Yi Sun, S. Uhlig, Gengfa Fang, Nanshu Wang, Zhongcheng Li
Resource isolation of the computation and storage in the cloud is relatively mature, but the network resource is still shared among tenants leading to variable and unpredictable network performance when bandwidth guarantees are not enforced. Currently most of the bandwidth guarantee approaches are based on the idea of single-path reservation without fully exploiting the multipath resource, which leads to poor network utilization. In this paper, we propose a multi-path bandwidth guarantee approach called MultiBand, which provides bandwidth guarantees by allocating bandwidth across multiple paths. We utilize label-based routing technique to explicitly control the packets' transmission paths, and design a MHTB rate limiter model to split and schedule the traffic over the multiple reserved paths. Besides, Our Multiband solution has the work-conserving property. We evaluated our approach through simulations with realistic topologies and typical traffic patterns. Our results show that MultiBand is able to provide multipath bandwidth guarantees and to achieve higher network utility and tenant throughput compared with those of current approaches.
云计算和存储的资源隔离已经比较成熟,但在没有带宽保证的情况下,网络资源仍然在租户之间共享,导致网络性能不稳定、不可预测。目前大多数带宽保证方法都是基于单路径保留的思想,没有充分利用多路径资源,导致网络利用率不高。在本文中,我们提出了一种称为MultiBand的多路径带宽保证方法,它通过在多条路径上分配带宽来提供带宽保证。我们利用基于标签的路由技术来显式控制数据包的传输路径,并设计了一个MHTB速率限制器模型,在多条保留路径上对流量进行分割和调度。此外,我们的多频段解决方案还具有省功的特性。我们通过模拟现实拓扑和典型流量模式来评估我们的方法。我们的结果表明,与目前的方法相比,MultiBand能够提供多路径带宽保证,并实现更高的网络效用和租户吞吐量。
{"title":"Multipath Bandwidth Guarantees for Multi-Tenant Cloud Networking","authors":"Wei Wang, Yi Sun, S. Uhlig, Gengfa Fang, Nanshu Wang, Zhongcheng Li","doi":"10.1109/LCN.2016.73","DOIUrl":"https://doi.org/10.1109/LCN.2016.73","url":null,"abstract":"Resource isolation of the computation and storage in the cloud is relatively mature, but the network resource is still shared among tenants leading to variable and unpredictable network performance when bandwidth guarantees are not enforced. Currently most of the bandwidth guarantee approaches are based on the idea of single-path reservation without fully exploiting the multipath resource, which leads to poor network utilization. In this paper, we propose a multi-path bandwidth guarantee approach called MultiBand, which provides bandwidth guarantees by allocating bandwidth across multiple paths. We utilize label-based routing technique to explicitly control the packets' transmission paths, and design a MHTB rate limiter model to split and schedule the traffic over the multiple reserved paths. Besides, Our Multiband solution has the work-conserving property. We evaluated our approach through simulations with realistic topologies and typical traffic patterns. Our results show that MultiBand is able to provide multipath bandwidth guarantees and to achieve higher network utility and tenant throughput compared with those of current approaches.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"79 1","pages":"442-450"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77666885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Coexistence of Different Congestion Control Mechanisms 不同拥塞控制机制的共存研究
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.94
Mario Hock, R. Bless, M. Zitterbart
Interactive and delay-sensitive applications constitute an important and growing part of the Internet. Today, low delays can only be achieved if there are no congested links along the path. At a bottleneck, the commonly used congestion control mechanisms induce high queuing delay and packet loss. Specialized congestion control mechanisms achieving a low queuing delay in an otherwise congested network exist. However, if their flows share a bottleneck with traditionally congestion controlled flows, they get suppressed or loose their low-delay property. This paper presents three approaches - Separate Paths, Separate Queues and Limited Queue - that enable coexistence of congestion control mechanisms that are optimized for different goals, e.g., interactive applications and bulk transfers. The measurement results show that concurrent operation of different congestion control mechanisms can be successfully implemented this way.
交互式和对延迟敏感的应用程序构成了Internet中一个重要且不断增长的部分。今天,只有在路径沿线没有拥堵的情况下,才能实现低延迟。在瓶颈处,常用的拥塞控制机制会导致高排队延迟和丢包。存在专门的拥塞控制机制,可以在其他拥塞网络中实现低排队延迟。然而,如果它们的流与传统的拥塞控制流共享一个瓶颈,它们就会被抑制或失去其低延迟特性。本文提出了三种方法——分离路径、分离队列和有限队列——它们使针对不同目标优化的拥塞控制机制共存,例如,交互式应用程序和批量传输。测试结果表明,这种方法可以成功地实现不同拥塞控制机制的并发操作。
{"title":"Toward Coexistence of Different Congestion Control Mechanisms","authors":"Mario Hock, R. Bless, M. Zitterbart","doi":"10.1109/LCN.2016.94","DOIUrl":"https://doi.org/10.1109/LCN.2016.94","url":null,"abstract":"Interactive and delay-sensitive applications constitute an important and growing part of the Internet. Today, low delays can only be achieved if there are no congested links along the path. At a bottleneck, the commonly used congestion control mechanisms induce high queuing delay and packet loss. Specialized congestion control mechanisms achieving a low queuing delay in an otherwise congested network exist. However, if their flows share a bottleneck with traditionally congestion controlled flows, they get suppressed or loose their low-delay property. This paper presents three approaches - Separate Paths, Separate Queues and Limited Queue - that enable coexistence of congestion control mechanisms that are optimized for different goals, e.g., interactive applications and bulk transfers. The measurement results show that concurrent operation of different congestion control mechanisms can be successfully implemented this way.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"16 1","pages":"567-570"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90399416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
BAH: A Bitmap Index Compression Algorithm for Fast Data Retrieval BAH:一种快速数据检索的位图索引压缩算法
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.120
Chenxing Li, Zhen Chen, Wenxun Zheng, Yinjun Wu, Junwei Cao
Efficient retrieval of traffic archival data is a must-have technique to detect network attacks, such as APT(advanced persistent threat) attack. In order to take insight from Internet traffic, the bitmap index is increasingly used for efficiently querying over large datasets. However, a raw bitmap index leads to high space consumption and overhead on loading indexes. Various bitmap index compression algorithms are proposed to save storage while improving query efficiency. This paper proposes a new bitmap index compression algorithm called BAH (Byte Aligned Hybrid compression coding). An acceleration algorithm using SIMD is designed to increase the efficiency of AND operation over multiple compressed bitmaps. In all, BAH has a better compression ratio and faster intersection querying speed compared with several previous works such as WAH, PLWAH, COMPAX, Roaring etc. The theoretical analysis shows that the space required by BAH is no larger than 1.6 times the information entropy of the bitmap with density larger than 0.2%. In the experiments, BAH saves about 65% space and 60% space compared with WAH on two datasets. The experiments also demonstrate the query efficiency of BAH with the application in Internet Traffic and Web pages.
高效检索流量档案数据是检测APT(高级持续威胁)等网络攻击的必要技术。为了从互联网流量中获得洞察力,位图索引越来越多地用于对大型数据集进行有效查询。但是,原始位图索引会导致高空间消耗和加载索引的开销。为了在节省存储空间的同时提高查询效率,提出了多种位图索引压缩算法。提出了一种新的位图索引压缩算法BAH (Byte Aligned Hybrid compression coding)。为了提高多个压缩位图的AND运算效率,设计了一种基于SIMD的加速算法。总而言之,与之前的几个作品如WAH、PLWAH、COMPAX、Roaring等相比,BAH具有更好的压缩比和更快的交叉口查询速度。理论分析表明,BAH所需的空间不大于密度大于0.2%的位图信息熵的1.6倍。在实验中,在两个数据集上,BAH比WAH分别节省65%和60%的空间。实验还验证了BAH在Internet流量和网页查询中的应用效率。
{"title":"BAH: A Bitmap Index Compression Algorithm for Fast Data Retrieval","authors":"Chenxing Li, Zhen Chen, Wenxun Zheng, Yinjun Wu, Junwei Cao","doi":"10.1109/LCN.2016.120","DOIUrl":"https://doi.org/10.1109/LCN.2016.120","url":null,"abstract":"Efficient retrieval of traffic archival data is a must-have technique to detect network attacks, such as APT(advanced persistent threat) attack. In order to take insight from Internet traffic, the bitmap index is increasingly used for efficiently querying over large datasets. However, a raw bitmap index leads to high space consumption and overhead on loading indexes. Various bitmap index compression algorithms are proposed to save storage while improving query efficiency. This paper proposes a new bitmap index compression algorithm called BAH (Byte Aligned Hybrid compression coding). An acceleration algorithm using SIMD is designed to increase the efficiency of AND operation over multiple compressed bitmaps. In all, BAH has a better compression ratio and faster intersection querying speed compared with several previous works such as WAH, PLWAH, COMPAX, Roaring etc. The theoretical analysis shows that the space required by BAH is no larger than 1.6 times the information entropy of the bitmap with density larger than 0.2%. In the experiments, BAH saves about 65% space and 60% space compared with WAH on two datasets. The experiments also demonstrate the query efficiency of BAH with the application in Internet Traffic and Web pages.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"40 1","pages":"697-705"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78582556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Maximum Likelihood Topology Maps for Wireless Sensor Networks Using an Automated Robot 基于自动化机器人的无线传感器网络最大似然拓扑图
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.62
Ashanie Gunathillake, A. Savkin, A. Jayasumana
Topology maps represent the layout arrangement of nodes while maintaining the connectivity. As it is extracted using connectivity information only, it does not accurately represent the physical layout such as physical voids, shape, and relative distances among physical positions of sensor nodes. A novel concept Maximum Likelihood-Topology Maps for Wireless Sensor Networks is presented. As it is based on a packet reception probability function, which is sensitive to the distance, it represents the physical layout more accurately. In this paper, we use a binary matrix recorded by a mobile robot representing the reception of packets from sensor nodes by the mobile robot at different locations along the robots trajectory. Maximum likelihood topology coordinates are then extracted from the binary matrix by using a packet receiving probability function. Also, the robot trajectory is automated to avoid the obstacles and cover the entire network within least possible amount of time. The result shows that our algorithm generates topology maps for various network shapes under different environmental conditions accurately, and that it outperforms the existing algorithms by representing the physical layout of the network more accurately.
拓扑图在保持连接性的同时表示节点的布局安排。由于它仅使用连接信息提取,因此不能准确地表示物理布局,例如物理空隙、形状和传感器节点物理位置之间的相对距离。提出了一种新的无线传感器网络最大似然拓扑映射概念。由于它基于对距离敏感的数据包接收概率函数,因此可以更准确地表示物理布局。在本文中,我们使用移动机器人记录的二进制矩阵来表示移动机器人沿着机器人轨迹在不同位置接收来自传感器节点的数据包。然后利用包接收概率函数从二值矩阵中提取最大似然拓扑坐标。此外,机器人的轨迹是自动的,可以避开障碍物,并在最短的时间内覆盖整个网络。结果表明,我们的算法能够准确地生成不同环境条件下各种网络形状的拓扑图,并且能够更准确地表示网络的物理布局,优于现有算法。
{"title":"Maximum Likelihood Topology Maps for Wireless Sensor Networks Using an Automated Robot","authors":"Ashanie Gunathillake, A. Savkin, A. Jayasumana","doi":"10.1109/LCN.2016.62","DOIUrl":"https://doi.org/10.1109/LCN.2016.62","url":null,"abstract":"Topology maps represent the layout arrangement of nodes while maintaining the connectivity. As it is extracted using connectivity information only, it does not accurately represent the physical layout such as physical voids, shape, and relative distances among physical positions of sensor nodes. A novel concept Maximum Likelihood-Topology Maps for Wireless Sensor Networks is presented. As it is based on a packet reception probability function, which is sensitive to the distance, it represents the physical layout more accurately. In this paper, we use a binary matrix recorded by a mobile robot representing the reception of packets from sensor nodes by the mobile robot at different locations along the robots trajectory. Maximum likelihood topology coordinates are then extracted from the binary matrix by using a packet receiving probability function. Also, the robot trajectory is automated to avoid the obstacles and cover the entire network within least possible amount of time. The result shows that our algorithm generates topology maps for various network shapes under different environmental conditions accurately, and that it outperforms the existing algorithms by representing the physical layout of the network more accurately.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"11 1","pages":"339-347"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88637826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Latency and Lifetime-Aware Clustering and Routing in Wireless Sensor Networks 无线传感器网络中的时延和寿命感知聚类和路由
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.33
Chuanyao Nie, Hui Wu, Wenguang Zheng
We investigate the latency and network lifetime-aware clustering problem for data collection in a WSN (Wireless Sensor Network) with one base station and propose a novel approach. Our approach consists of a polynomial-time heuristic for constructing clusters, a polynomial-time heuristic and an ILP (Integer Linear Programming) algorithm for constructing a routing tree for inter-cluster communication. We have performed extensive simulations on the network instances of 200, 400, 600, 800 and 1000 sensor nodes with uniform and random distributions, and compared our approach with two state-of-the-art approaches, namely MR-LEACH and DSBCV. Our simulation results show that the average network lifetime improvements of our approach using the ILP algorithm for constructing a routing tree over MR-LEACH and DSBCV are 35% and 62%, respectively, and the performance of the heuristic for constructing a routing tree is comparable to that of the ILP algorithm.
本文研究了单基站无线传感器网络中数据采集的延迟和网络生命周期感知聚类问题,并提出了一种新的方法。我们的方法包括用于构造簇的多项式时间启发式算法,用于构造簇间通信的路由树的多项式时间启发式算法和ILP(整数线性规划)算法。我们对均匀分布和随机分布的200、400、600、800和1000个传感器节点的网络实例进行了广泛的模拟,并将我们的方法与两种最先进的方法(即MR-LEACH和DSBCV)进行了比较。仿真结果表明,在MR-LEACH和DSBCV上,使用ILP算法构建路由树的平均网络生存期分别提高了35%和62%,并且构建路由树的启发式算法的性能与ILP算法相当。
{"title":"Latency and Lifetime-Aware Clustering and Routing in Wireless Sensor Networks","authors":"Chuanyao Nie, Hui Wu, Wenguang Zheng","doi":"10.1109/LCN.2016.33","DOIUrl":"https://doi.org/10.1109/LCN.2016.33","url":null,"abstract":"We investigate the latency and network lifetime-aware clustering problem for data collection in a WSN (Wireless Sensor Network) with one base station and propose a novel approach. Our approach consists of a polynomial-time heuristic for constructing clusters, a polynomial-time heuristic and an ILP (Integer Linear Programming) algorithm for constructing a routing tree for inter-cluster communication. We have performed extensive simulations on the network instances of 200, 400, 600, 800 and 1000 sensor nodes with uniform and random distributions, and compared our approach with two state-of-the-art approaches, namely MR-LEACH and DSBCV. Our simulation results show that the average network lifetime improvements of our approach using the ILP algorithm for constructing a routing tree over MR-LEACH and DSBCV are 35% and 62%, respectively, and the performance of the heuristic for constructing a routing tree is comparable to that of the ILP algorithm.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"65 1","pages":"164-167"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91330041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2016 IEEE 41st Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1