首页 > 最新文献

2016 IEEE 41st Conference on Local Computer Networks (LCN)最新文献

英文 中文
Tri-MCL: Synergistic Localization for Mobile Ad-Hoc and Wireless Sensor Networks 三mcl:移动Ad-Hoc和无线传感器网络的协同定位
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.61
Arne Bochem, Yali Yuan, D. Hogrefe
Localization is a highly important topic in wireless sensor networks as well as in many Internet of Things applications. Many current localization algorithms are based on the Sequential Monte Carlo Localization method (MCL), the accuracy of which is bounded by the radio range. High computational complexity in the sampling step is another issue of these approaches. We present Tri-MCL which significantly improves on the accuracy of the Monte Carlo Localization algorithm. To do this, we leverage three different distance measurement algorithms based on range-free approaches. Using these, we estimate the distances between unknown nodes and anchor nodes to perform more fine-grained filtering of the particles as well as for weighting the particles in the final estimation step of the algorithm. Simulation results illustrate that the proposed algorithm achieves better accuracy than the MCL and SA-MCL algorithms. Furthermore, it also exhibits high efficiency in the sampling step.
在无线传感器网络以及许多物联网应用中,定位是一个非常重要的话题。目前许多定位算法都是基于顺序蒙特卡罗定位方法(MCL),其精度受无线电距离的限制。采样步骤的高计算复杂度是这些方法的另一个问题。我们提出的Tri-MCL显著提高了蒙特卡罗定位算法的精度。为此,我们利用了三种基于无距离方法的不同距离测量算法。利用这些,我们估计未知节点和锚节点之间的距离,对粒子进行更细粒度的过滤,并在算法的最后估计步骤中对粒子进行加权。仿真结果表明,该算法比MCL和SA-MCL算法具有更好的精度。此外,它在采样步骤中也表现出很高的效率。
{"title":"Tri-MCL: Synergistic Localization for Mobile Ad-Hoc and Wireless Sensor Networks","authors":"Arne Bochem, Yali Yuan, D. Hogrefe","doi":"10.1109/LCN.2016.61","DOIUrl":"https://doi.org/10.1109/LCN.2016.61","url":null,"abstract":"Localization is a highly important topic in wireless sensor networks as well as in many Internet of Things applications. Many current localization algorithms are based on the Sequential Monte Carlo Localization method (MCL), the accuracy of which is bounded by the radio range. High computational complexity in the sampling step is another issue of these approaches. We present Tri-MCL which significantly improves on the accuracy of the Monte Carlo Localization algorithm. To do this, we leverage three different distance measurement algorithms based on range-free approaches. Using these, we estimate the distances between unknown nodes and anchor nodes to perform more fine-grained filtering of the particles as well as for weighting the particles in the final estimation step of the algorithm. Simulation results illustrate that the proposed algorithm achieves better accuracy than the MCL and SA-MCL algorithms. Furthermore, it also exhibits high efficiency in the sampling step.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"58 1","pages":"333-338"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82018297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Rapid Deployment Indoor Localization without Prior Human Participation 无需事先人工参与的快速部署室内定位
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.89
Han Xu, Zimu Zhou, Longfei Shangguan
In this work, we propose RAD, a RApid Deployment localization framework without human sampling. The basic idea of RAD is to automatically generate a fingerprint database through space partition, of which each cell is fingerprinted by its maximum influence APs. Based on this robust location indicator, fine-grained localization can be achieved by a discretized particle filter utilizing sensor data fusion. We devise techniques for CIVD-based field division, graph-based particle filter, EM-based individual character learning, and build a prototype that runs on commodity devices. Extensive experiments show that RAD provides a comparable performance to the state-of-the-art RSS-based methods while relieving it of prior human participation.
在这项工作中,我们提出了RAD,一种不需要人工采样的快速部署定位框架。RAD的基本思想是通过空间分区自动生成指纹数据库,每个单元格按其最大影响ap进行指纹识别。基于该鲁棒定位指标,利用传感器数据融合的离散化粒子滤波实现细粒度定位。我们设计了基于civd的领域划分、基于图形的粒子过滤、基于em的个人字符学习等技术,并构建了在商品设备上运行的原型。大量的实验表明,RAD提供了与最先进的基于rss的方法相当的性能,同时减轻了先前的人类参与。
{"title":"Rapid Deployment Indoor Localization without Prior Human Participation","authors":"Han Xu, Zimu Zhou, Longfei Shangguan","doi":"10.1109/LCN.2016.89","DOIUrl":"https://doi.org/10.1109/LCN.2016.89","url":null,"abstract":"In this work, we propose RAD, a RApid Deployment localization framework without human sampling. The basic idea of RAD is to automatically generate a fingerprint database through space partition, of which each cell is fingerprinted by its maximum influence APs. Based on this robust location indicator, fine-grained localization can be achieved by a discretized particle filter utilizing sensor data fusion. We devise techniques for CIVD-based field division, graph-based particle filter, EM-based individual character learning, and build a prototype that runs on commodity devices. Extensive experiments show that RAD provides a comparable performance to the state-of-the-art RSS-based methods while relieving it of prior human participation.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"29 1","pages":"547-550"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81296447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting the So-Called Constructive Interference in Concurrent Transmission 再论并发传输中所谓的建设性干扰
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.56
Chun-Hao Liao, Yuki Katsumata, Makoto Suzuki, H. Morikawa
Many works attributed the successful reception of concurrent transmission (CT) to the constructive interference. However, due to the inevitable carrier frequency offset (CFO) and the resulted beating effect, the claim of constructive interference is actually not valid. To clarify the reason behind the successful receptions under CT, we conduct extensive evaluations and identify the following findings. 1) We show that the IEEE 802.15.4 receivers survive the beating effect mainly because of the direct sequence spread spectrum (DSSS), while systems without the protection of DSSS are not applicable to CT. 2) We identify a counterintuitive phenomenon that the IEEE 802.15.4 receiver could survive only the beating results from large CFO, while performing poorly when CFO is small. 3) We demonstrate that, even if the receivers survive, CT links lead to little performance improvements compared to conventional signal transmission links from the SNR point of view.
许多研究将并发传输(CT)的成功接收归结为构造干扰。然而,由于不可避免的载波频率偏移(CFO)和由此产生的跳动效应,构造干扰的主张实际上是无效的。为了阐明CT下成功接待的原因,我们进行了广泛的评估,并确定了以下发现。1)研究表明,IEEE 802.15.4接收机之所以能够抵御冲击效应,主要是由于直接序列扩频(DSSS)的保护,而没有DSSS保护的系统不适用于CT。2)我们发现了一个反直觉的现象,即IEEE 802.15.4接收器只能在大型CFO的击败结果中存活,而在小型CFO时表现不佳。3)我们证明,即使接收器存活下来,从信噪比的角度来看,与传统信号传输链路相比,CT链路的性能改进很小。
{"title":"Revisiting the So-Called Constructive Interference in Concurrent Transmission","authors":"Chun-Hao Liao, Yuki Katsumata, Makoto Suzuki, H. Morikawa","doi":"10.1109/LCN.2016.56","DOIUrl":"https://doi.org/10.1109/LCN.2016.56","url":null,"abstract":"Many works attributed the successful reception of concurrent transmission (CT) to the constructive interference. However, due to the inevitable carrier frequency offset (CFO) and the resulted beating effect, the claim of constructive interference is actually not valid. To clarify the reason behind the successful receptions under CT, we conduct extensive evaluations and identify the following findings. 1) We show that the IEEE 802.15.4 receivers survive the beating effect mainly because of the direct sequence spread spectrum (DSSS), while systems without the protection of DSSS are not applicable to CT. 2) We identify a counterintuitive phenomenon that the IEEE 802.15.4 receiver could survive only the beating results from large CFO, while performing poorly when CFO is small. 3) We demonstrate that, even if the receivers survive, CT links lead to little performance improvements compared to conventional signal transmission links from the SNR point of view.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"58 1","pages":"280-288"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87659272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
User-Centric Network Provisioning in Software Defined Data Center Environment 软件定义数据中心环境中以用户为中心的网络配置
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.57
Taimur Bakhshi, B. Ghita
Present data center (DC) network provisioning schemes primarily utilize conventional load-balancing technologies, offering individual application performance improvement. Diversity in application usage however, makes isolated application prioritization a performance caveat for users with varying application trends. The present paper proposes a user profiling approach to capture application trends based on generic flow measurements (NetFlow) and employs the extracted profiles to create DC traffic forwarding policies. The scheme allows operators to define a global profile and application hierarchy based on extracted profiles to prioritize traffic for individual user classes. The proposed design was tested by extracting user profiles from a realistic enterprise network, and further simulated to dynamically manage DC traffic using the software defined networking paradigm. Compared to conventional traffic management schemes, the frame delivery ratio and effective throughput of our design was significantly higher for high priority north-south user traffic as well as the inter-server east-west application traffic.
目前的数据中心(DC)网络供应方案主要利用传统的负载平衡技术,提供单个应用程序性能改进。但是,应用程序使用的多样性使得孤立的应用程序优先级对于具有不同应用程序趋势的用户来说是一个性能警告。本文提出了一种基于通用流量测量(NetFlow)的用户分析方法来捕获应用趋势,并使用提取的配置文件来创建数据中心流量转发策略。该方案允许运营商根据提取的配置文件定义全局配置文件和应用程序层次结构,以优先考虑各个用户类的流量。通过从实际企业网络中提取用户配置文件,对所提出的设计进行了测试,并使用软件定义网络范式对数据中心流量进行了动态管理仿真。与传统的流量管理方案相比,我们设计的帧交付率和有效吞吐量对于高优先级的南北用户流量以及服务器间的东西应用流量都显着更高。
{"title":"User-Centric Network Provisioning in Software Defined Data Center Environment","authors":"Taimur Bakhshi, B. Ghita","doi":"10.1109/LCN.2016.57","DOIUrl":"https://doi.org/10.1109/LCN.2016.57","url":null,"abstract":"Present data center (DC) network provisioning schemes primarily utilize conventional load-balancing technologies, offering individual application performance improvement. Diversity in application usage however, makes isolated application prioritization a performance caveat for users with varying application trends. The present paper proposes a user profiling approach to capture application trends based on generic flow measurements (NetFlow) and employs the extracted profiles to create DC traffic forwarding policies. The scheme allows operators to define a global profile and application hierarchy based on extracted profiles to prioritize traffic for individual user classes. The proposed design was tested by extracting user profiles from a realistic enterprise network, and further simulated to dynamically manage DC traffic using the software defined networking paradigm. Compared to conventional traffic management schemes, the frame delivery ratio and effective throughput of our design was significantly higher for high priority north-south user traffic as well as the inter-server east-west application traffic.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"225 1","pages":"289-297"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85258809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Organization-Level Control of Excessive Internet Downloads 组织层面对互联网过度下载的控制
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.38
Saad Y. Sait, H. Murthy, K. Sivalingam
The control of excessive downloads by rogue users in organizational LANs is the subject of this work. Two mechanisms have been used in order to accomplish this. The first mechanism, is TCP rate control (TCR), it is a receiver-based flow control technique that can be used to effectively rate limit rogue users' flows, making more bandwidth available to regular users. The second mechanism, admission control reduces the bandwidth wastage due to users disconnecting out of impatience when user goodputs are low. Using simulation-based experiments, it has been demonstrated that the composite technique, exclusive TCP rate and admission control (xTRAC) provides seamless control of rogue users, while improving response times and goodput by upto 58% during overload. In this way regular users are incentivized and rogue users are penalized leading to long-term control of users.
控制组织局域网中恶意用户的过度下载是本工作的主题。为了实现这一目标,使用了两种机制。第一种机制是TCP速率控制(TCP rate control, TCR),它是一种基于接收端的流量控制技术,可以有效地限制恶意用户的流量,为常规用户提供更多的带宽。第二种机制,准入控制减少了由于用户在用户商品价格低时由于不耐烦而断开连接而造成的带宽浪费。通过基于仿真的实验,已经证明了复合技术,独占TCP速率和准入控制(xTRAC)提供了对流氓用户的无缝控制,同时在过载时将响应时间和good - put提高了58%。通过这种方式,常规用户会受到激励,而不守规矩的用户会受到惩罚,从而形成对用户的长期控制。
{"title":"Organization-Level Control of Excessive Internet Downloads","authors":"Saad Y. Sait, H. Murthy, K. Sivalingam","doi":"10.1109/LCN.2016.38","DOIUrl":"https://doi.org/10.1109/LCN.2016.38","url":null,"abstract":"The control of excessive downloads by rogue users in organizational LANs is the subject of this work. Two mechanisms have been used in order to accomplish this. The first mechanism, is TCP rate control (TCR), it is a receiver-based flow control technique that can be used to effectively rate limit rogue users' flows, making more bandwidth available to regular users. The second mechanism, admission control reduces the bandwidth wastage due to users disconnecting out of impatience when user goodputs are low. Using simulation-based experiments, it has been demonstrated that the composite technique, exclusive TCP rate and admission control (xTRAC) provides seamless control of rogue users, while improving response times and goodput by upto 58% during overload. In this way regular users are incentivized and rogue users are penalized leading to long-term control of users.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"34 1","pages":"184-187"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91242585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Graph Partitioning in Parallelization of Large Scale Networks 大规模网络并行化中的图划分
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.36
Sima Das, J. Leopold, Susmita K. Ghosh, Sajal K. Das
Real world large scale networks exhibit intrinsic community structure, with dense intra-community connectivity and sparse inter-community connectivity. Leveraging their community structure for parallelization of computational tasks and applications, is a significant step towards computational efficiency and application effectiveness. We propose a weighted depth-first-search graph partitioning algorithm for community formation that preserves the needed community dependency without any cycles. To comply with heterogeneity in community structure and size of the real world networks, we use a flexible limiting value for them. Further, our algorithm is a diversion from the existing modularity based algorithms. We evaluate our algorithm as the quality of the generated partitions, measured in terms of number of graph cuts.
现实世界的大规模网络表现出内在的社区结构,社区内连接密集,社区间连接稀疏。利用它们的社区结构来并行化计算任务和应用程序,是迈向计算效率和应用程序有效性的重要一步。我们提出了一种加权深度优先搜索图划分算法,该算法保留了所需的社区依赖而不需要任何循环。为了适应现实世界网络在社区结构和规模上的异质性,我们对它们使用了一个灵活的限制值。此外,我们的算法是现有的基于模块化的算法的一种转移。我们用生成的分区的质量来评估我们的算法,用图切割的数量来衡量。
{"title":"Graph Partitioning in Parallelization of Large Scale Networks","authors":"Sima Das, J. Leopold, Susmita K. Ghosh, Sajal K. Das","doi":"10.1109/LCN.2016.36","DOIUrl":"https://doi.org/10.1109/LCN.2016.36","url":null,"abstract":"Real world large scale networks exhibit intrinsic community structure, with dense intra-community connectivity and sparse inter-community connectivity. Leveraging their community structure for parallelization of computational tasks and applications, is a significant step towards computational efficiency and application effectiveness. We propose a weighted depth-first-search graph partitioning algorithm for community formation that preserves the needed community dependency without any cycles. To comply with heterogeneity in community structure and size of the real world networks, we use a flexible limiting value for them. Further, our algorithm is a diversion from the existing modularity based algorithms. We evaluate our algorithm as the quality of the generated partitions, measured in terms of number of graph cuts.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"30 1","pages":"176-179"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74926342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Path Quality Metrics for Overlay Networks 面向覆盖网络的路径质量度量
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.31
Andri Lareida, Daniel Meier, T. Bocek, B. Stiller
Decentralized systems, such as overlay networks or content delivery networks, form a virtual network on top of a physical network leading to inefficiencies in handling network traffic as physical locations are not considered. Therefore, this work investigates, analyzes, and evaluates two feasible network locality metrics for decentralized systems to overcome such inefficiencies. Furthermore, those metrics to determine network locality have been implemented and evaluated within an international testbed. These metrics evaluated consider aspects of path stability and path symmetry. The evaluation performed did reveal that the stability and symmetry metrics provide accurate locality indication.
分散的系统,如覆盖网络或内容交付网络,在物理网络之上形成虚拟网络,导致处理网络流量的效率低下,因为没有考虑物理位置。因此,这项工作调查、分析和评估了分散系统的两个可行的网络局部性指标,以克服这种低效率。此外,这些确定网络局部性的指标已经在一个国际测试平台上实现和评估。评估的这些指标考虑了路径稳定性和路径对称性。结果表明,稳定性和对称性指标提供了准确的局域指示。
{"title":"Towards Path Quality Metrics for Overlay Networks","authors":"Andri Lareida, Daniel Meier, T. Bocek, B. Stiller","doi":"10.1109/LCN.2016.31","DOIUrl":"https://doi.org/10.1109/LCN.2016.31","url":null,"abstract":"Decentralized systems, such as overlay networks or content delivery networks, form a virtual network on top of a physical network leading to inefficiencies in handling network traffic as physical locations are not considered. Therefore, this work investigates, analyzes, and evaluates two feasible network locality metrics for decentralized systems to overcome such inefficiencies. Furthermore, those metrics to determine network locality have been implemented and evaluated within an international testbed. These metrics evaluated consider aspects of path stability and path symmetry. The evaluation performed did reveal that the stability and symmetry metrics provide accurate locality indication.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"97 1","pages":"156-159"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79214811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Topology Control in Wireless Sensor Networks: What Blocks the Breakthrough? 无线传感器网络的拓扑控制:是什么阻碍了突破?
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.67
Michael Stein, Tobias Petry, Immanuel Schweizer, Martina Brachmann, M. Mühlhäuser
Graph-based topology control adapts wireless topologies to achieve certain target graph structures. Wireless sensor networks seem well-suited for the expectations (in particular those on provided energy savings) raised by topology control. Nevertheless, topology control has never made the breakthrough in real-world deployments. This work explores the reasons for this, identifying five practical obstacles of today's topology control: (i) unrealistic assumptions, (ii) unsuitable graph structures, (iii) application agnosticism, (iv) unclear role in the stack, and (v) insufficient framework support. To address the latter obstacle, we provide a re-usable framework for the implementation and evaluation of topology control. Based on this framework, we conduct a testbed-based evaluation for two application scenarios and three topology control algorithms including a novel application-specific algorithm. Indeed, the identified obstacles hinder topology control from boosting the application. However, the achieved graph structures show the practical feasibility of topology control in principle.
基于图的拓扑控制利用无线拓扑来实现特定的目标图结构。无线传感器网络似乎非常适合拓扑控制提出的期望(特别是那些提供节能的期望)。然而,拓扑控制在实际部署中从未取得突破。这项工作探讨了造成这种情况的原因,确定了当今拓扑控制的五个实际障碍:(i)不切实际的假设,(ii)不合适的图结构,(iii)应用不可知,(iv)堆栈中不明确的角色,以及(v)框架支持不足。为了解决后一个障碍,我们提供了一个可重用的框架来实现和评估拓扑控制。基于该框架,我们对两种应用场景和三种拓扑控制算法进行了基于测试平台的评估,其中包括一种新的特定应用算法。事实上,这些已确定的障碍阻碍了拓扑控制对应用程序的提升。然而,所实现的图结构在原理上显示了拓扑控制的实际可行性。
{"title":"Topology Control in Wireless Sensor Networks: What Blocks the Breakthrough?","authors":"Michael Stein, Tobias Petry, Immanuel Schweizer, Martina Brachmann, M. Mühlhäuser","doi":"10.1109/LCN.2016.67","DOIUrl":"https://doi.org/10.1109/LCN.2016.67","url":null,"abstract":"Graph-based topology control adapts wireless topologies to achieve certain target graph structures. Wireless sensor networks seem well-suited for the expectations (in particular those on provided energy savings) raised by topology control. Nevertheless, topology control has never made the breakthrough in real-world deployments. This work explores the reasons for this, identifying five practical obstacles of today's topology control: (i) unrealistic assumptions, (ii) unsuitable graph structures, (iii) application agnosticism, (iv) unclear role in the stack, and (v) insufficient framework support. To address the latter obstacle, we provide a re-usable framework for the implementation and evaluation of topology control. Based on this framework, we conduct a testbed-based evaluation for two application scenarios and three topology control algorithms including a novel application-specific algorithm. Indeed, the identified obstacles hinder topology control from boosting the application. However, the achieved graph structures show the practical feasibility of topology control in principle.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"156 1","pages":"389-397"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79851801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
CodePLC: A Network Coding MAC Protocol for Power Line Communication 电力线通信的网络编码MAC协议
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.112
L. M. Silveira, Robert M. Oliveira, Moises Vidal Ribeiro, L. Vieira, M. Vieira, A. Vieira
Power line communication systems face several challenges which degrade data communication quality. To overcome such issues, we propose CodePLC, a network coding Power Line Communication MAC protocol. We use a single relay node to intermediate communication, storing, and forwarding linear combinations of data packets. We evaluate CodePLC performance through simulations of a common topology for a PLC system under a wide range of scenarios. In sum, our results show that in a broadcast like transmission, the use of network coding enhances overall system performance. When compared to a traditional PLC system, we have observed an average of 115% goodput increase. Moreover, our protocol reduces in 112% the average of network occupancy buffers. Finally, CodePLC reduces mean latency by four times.
电力线通信系统面临着降低数据通信质量的诸多挑战。为了克服这些问题,我们提出了一种网络编码电力线通信MAC协议CodePLC。我们使用单个中继节点进行中间通信,存储和转发数据包的线性组合。我们通过在广泛的场景下模拟PLC系统的公共拓扑来评估CodePLC的性能。总之,我们的结果表明,在类似广播的传输中,使用网络编码可以提高系统的整体性能。与传统的PLC系统相比,我们已经观察到平均115%的货物增加。此外,我们的协议减少了112%的平均网络占用缓冲区。最后,CodePLC将平均延迟减少了四倍。
{"title":"CodePLC: A Network Coding MAC Protocol for Power Line Communication","authors":"L. M. Silveira, Robert M. Oliveira, Moises Vidal Ribeiro, L. Vieira, M. Vieira, A. Vieira","doi":"10.1109/LCN.2016.112","DOIUrl":"https://doi.org/10.1109/LCN.2016.112","url":null,"abstract":"Power line communication systems face several challenges which degrade data communication quality. To overcome such issues, we propose CodePLC, a network coding Power Line Communication MAC protocol. We use a single relay node to intermediate communication, storing, and forwarding linear combinations of data packets. We evaluate CodePLC performance through simulations of a common topology for a PLC system under a wide range of scenarios. In sum, our results show that in a broadcast like transmission, the use of network coding enhances overall system performance. When compared to a traditional PLC system, we have observed an average of 115% goodput increase. Moreover, our protocol reduces in 112% the average of network occupancy buffers. Finally, CodePLC reduces mean latency by four times.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"20 1","pages":"643-646"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84022396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation 证书撤销保护(CRG):一种有效的证书撤销检查机制
Pub Date : 2016-11-01 DOI: 10.1109/LCN.2016.84
Qinwen Hu, M. R. Asghar, N. Brownlee
In the Public Key infrastructure (PKI) model, digital certificates play a vital role in securing online communication. Communicating parties exchange and validate these certificates, the validation fails if a certificate has been revoked. In this paper we propose the Certificate Revocation Guard (CRG) to efficiently check certificate revocation while minimising bandwidth, latency and storage overheads. CRG is based on OCSP, which caches the status of certificates locally. CRG could be installed on the user's machine, at the organisational proxy or even at the ISP level. Compared to a naive approach (where a client checks the revocation status of all certificates in the chain on every request), CRG decreases the bandwidth overheads and network latencies by 95%. Using CRG incurs 69% lower storage overheads compared to the CRL method. Our results demonstrate the effectiveness of our approach to improve certificate revocation.
在公钥基础设施(Public Key infrastructure, PKI)模型中,数字证书在保证在线通信安全方面起着至关重要的作用。通信各方交换并验证这些证书,如果证书已被撤销,则验证失败。在本文中,我们提出了证书撤销保护(CRG)来有效地检查证书撤销,同时最小化带宽,延迟和存储开销。CRG基于OCSP,将证书的状态缓存到本地。CRG可以安装在用户的机器上,在组织代理上,甚至在ISP级别上。与简单的方法(客户端在每个请求时检查链中所有证书的撤销状态)相比,CRG将带宽开销和网络延迟减少了95%。与CRL方法相比,使用CRG的存储开销降低了69%。我们的结果证明了我们改进证书撤销方法的有效性。
{"title":"Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation","authors":"Qinwen Hu, M. R. Asghar, N. Brownlee","doi":"10.1109/LCN.2016.84","DOIUrl":"https://doi.org/10.1109/LCN.2016.84","url":null,"abstract":"In the Public Key infrastructure (PKI) model, digital certificates play a vital role in securing online communication. Communicating parties exchange and validate these certificates, the validation fails if a certificate has been revoked. In this paper we propose the Certificate Revocation Guard (CRG) to efficiently check certificate revocation while minimising bandwidth, latency and storage overheads. CRG is based on OCSP, which caches the status of certificates locally. CRG could be installed on the user's machine, at the organisational proxy or even at the ISP level. Compared to a naive approach (where a client checks the revocation status of all certificates in the chain on every request), CRG decreases the bandwidth overheads and network latencies by 95%. Using CRG incurs 69% lower storage overheads compared to the CRL method. Our results demonstrate the effectiveness of our approach to improve certificate revocation.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"139 1","pages":"527-530"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85887796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2016 IEEE 41st Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1