37th Annual IEEE Conference on Local Computer Networks最新文献

筛选
英文 中文
Unravel the characteristics and development of current IPv6 network 阐述了当前IPv6网络的特点和发展
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423638
Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Zejia Chen
{"title":"Unravel the characteristics and development of current IPv6 network","authors":"Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Zejia Chen","doi":"10.1109/LCN.2012.6423638","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423638","url":null,"abstract":"In this paper, many aspects related to characteristics and development of IPv6 network are investigated. Additionally, in order to gain a deep view of IPv6 network, we correlate our system with a user authentication system, so we explore some meaningful user behaviors. According to the analysis, we obtain a comprehensive knowledge of current operating situation of IPv6 network which, we believe, can provide an experimental basis for IPv6 network operators and researchers.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"82 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116565469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A key distribution protocol for Wireless Sensor Networks 无线传感器网络密钥分配协议
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423591
Adrián Herrera, W. Hu
{"title":"A key distribution protocol for Wireless Sensor Networks","authors":"Adrián Herrera, W. Hu","doi":"10.1109/LCN.2012.6423591","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423591","url":null,"abstract":"This paper presents the design, implementation and evaluation of an automated method for distributing symmetric cryptographic keys in a Wireless Sensor Network (WSN). Unlike previous methods for key distribution in WSNs, we do not rely on sensitive knowledge to be stored in program memory prior to network deployment. Additionally, the protocol proposed uses dominant security primitives to ensure strong security and interoperability with existing networks (such as the Internet), while operating independent of the network layer protocol. Through both hardware experimentation and simulation, we show that this protocol can provide strong confidentiality, integrity and authenticity protection to the symmetric keys as they are distributed throughout a network, while maintaining the ability to scale to large-size networks and remain energy efficient.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128632003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Resource and query aware, peer-to-peer-based multi-attribute Resource Discovery 资源和查询感知,基于点对点的多属性资源发现
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423627
H. M. N. Dilum Bandara, A. Jayasumana
{"title":"Resource and query aware, peer-to-peer-based multi-attribute Resource Discovery","authors":"H. M. N. Dilum Bandara, A. Jayasumana","doi":"10.1109/LCN.2012.6423627","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423627","url":null,"abstract":"Distributed, multi-attribute Resource Discovery (RD) is a fundamental requirement in collaborative Peer-to-Peer (P2P), grid, and cloud computing. We present an efficient and load balanced, P2P-based multi-attribute RD solution that consists of five heuristics, which can be executed independently and distributedly. First heuristic maintains a minimum number of nodes in a ring-like overlay consequently reducing the cost of resolving range queries. Second and third heuristics dynamically balance the key and query load by transferring keys to neighbors and by adding new neighbors when existing ones are insufficient. Last two heuristics, namely fragmentation and replication, form cliques of nodes that are placed orthogonal to the overlay ring to dynamically balance the highly skewed key and query loads while reducing the query cost. By applying these heuristics in the presented order, a RD solution that better responds to real-world resource and query characteristics is developed. Simulations using real workloads are used to demonstrate its efficacy.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Safe cities. A participatory sensing approach 安全的城市。参与式感知方法
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423684
Jaime Ballesteros, Mahmudur Rahman, Bogdan Carbunar, N. Rishe
{"title":"Safe cities. A participatory sensing approach","authors":"Jaime Ballesteros, Mahmudur Rahman, Bogdan Carbunar, N. Rishe","doi":"10.1109/LCN.2012.6423684","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423684","url":null,"abstract":"Smart cities combine technology and human resources to improve the quality of life and reduce expenditures. Ensuring the safety of city residents remains one of the open problems, as standard budgetary investments fail to decrease crime levels. This work takes steps toward implementing smart, safe cities, by combining the use of personal mobile devices and social networks to make users aware of the safety of their surroundings. We propose novel metrics to define location and user based safety values. We evaluate the ability of forecasting techniques including autoregressive integrated moving average (ARIMA) and artificial neural networks (ANN) to predict future safety values. We devise iSafe, a privacy preserving algorithm for computing safety snapshots of co-located mobile device users and integrate our approach into an Android application for visualizing safety levels. We further investigate relationships between location dependent social network activity and crime levels. We evaluate our contributions using data we collected from Yelp as well as crime and census data.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Robust MAC-layer rate control mechanism for 802.11 wireless networks 802.11无线网络的健壮mac层速率控制机制
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423656
Wei Yin, Peizhao Hu, J. Indulska, M. Portmann, Jonathan Guerin
{"title":"Robust MAC-layer rate control mechanism for 802.11 wireless networks","authors":"Wei Yin, Peizhao Hu, J. Indulska, M. Portmann, Jonathan Guerin","doi":"10.1109/LCN.2012.6423656","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423656","url":null,"abstract":"Node mobility, signal fading and interference introduce dynamics in wireless channels. In 802.11 wireless networks, there are several transmission rates that can be adaptively selected by the MAC-layer rate control mechanisms to cater for various channel conditions. Accurately estimating the current channel conditions and successfully selecting the appropriate rates at the right time is critical to ensure the network's optimal performance. In this paper we focus on the problem of rate selection and present a robust, yet practical, rate control mechanism-RCELC, which measures the throughput achieved by each rate, and it selects a rate that achieve the highest throughput for the current channel conditions. To ensure its robustness RCELC optimises rate sampling and also guarantees achieving the highest throughput even in the cases of collisions. RCELC is a practical rate control mechanism that we have developed and evaluated on new mac80211 framework in Linux. We use a set of comprehensive evaluation scenarios and show that RCELC achieves superior performance and substantially outperforms the best rate control mechanism currently available in Linux.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Reliable communications in aerial sensor networks by using a hybrid antenna 混合天线在航空传感器网络中的可靠通信
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423595
Kai Li, Nadeem Ahmed, S. Kanhere, S. Jha
{"title":"Reliable communications in aerial sensor networks by using a hybrid antenna","authors":"Kai Li, Nadeem Ahmed, S. Kanhere, S. Jha","doi":"10.1109/LCN.2012.6423595","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423595","url":null,"abstract":"An AWSN composed of bird-sized Unmanned Aerial Vehicles (UAVs) equipped with sensors and wireless radio, enables low cost high granularity three-dimensional sensing of the physical world. The sensed data is relayed in real-time over a multi-hop wireless communication network to ground stations. The following characteristics of an AWSN make effective multi-hop communication challenging - (i) frequent link disconnections due to the inherent dynamism (ii) significant inter-node interference (iii) three dimensional motion of the UAVs. In this paper, we investigate the use of a hybrid antenna to accomplish efficient neighbor discovery and reliable communication in AWSNs. We propose the design of a hybrid Omni Bidirectional ESPAR (O-BESPAR) antenna, which combines the complimentary features of an isotropic omni radio (360 degree coverage) and directional ESPAR antennas (beamforming and reduced interference). Control and data messages are transmitted separately over the omni and directional modules of the antenna, respectively. Moreover, a communication protocol is presented to perform fast neighbor discovery and beam steering. We present results from extensive simulations then consider three different real-world AWSN application scenarios and empirical aerial link characterization and show that the proposed antenna design and protocol reduces the packet loss rate, as compared to a single omni or ESPAR antenna.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance of on-off traffic stemming from live adaptive segmented HTTP video streaming 实时自适应分段HTTP视频流的开关流量性能
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423654
T. Kupka, P. Halvorsen, C. Griwodz
{"title":"Performance of on-off traffic stemming from live adaptive segmented HTTP video streaming","authors":"T. Kupka, P. Halvorsen, C. Griwodz","doi":"10.1109/LCN.2012.6423654","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423654","url":null,"abstract":"A large number of live segmented adaptive HTTP video streaming services exist in the Internet today. These quasi-live solutions have been shown to scale to a large number of concurrent users, but the characteristic on-off traffic pattern makes TCP behave differently compared to the bulk transfers the protocol is designed for. In this paper, we analyze the TCP performance of such live on-off sources, and we investigate possible improvements in order to increase the resource utilization on the server side. We observe that the problem is the bandwidth wastage because of the synchronization of the on period. We investigate four different techniques to mitigate this problem. We first evaluate the techniques on pure on-off traffic using a fixed quality and then repeat the experiments with quality adaptation.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124507917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Network coding based SVC multicast over broadband wireless networks 宽带无线网络中基于SVC多播的网络编码
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423657
Hao Zhou, Yusheng Ji, Yu Gu, Bao-hua Zhao
{"title":"Network coding based SVC multicast over broadband wireless networks","authors":"Hao Zhou, Yusheng Ji, Yu Gu, Bao-hua Zhao","doi":"10.1109/LCN.2012.6423657","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423657","url":null,"abstract":"Video multicast over wireless networks has its own challenges when facing the heterogeneity of networks and end-user capabilities, along with packet losses. Scalable video coding using different modulation and coding schemes (MCSs) applied to different video layers can provide different video qualities to different users according to their channel conditions. A layered hybrid NC/ARQ scheme is proposed in this paper to handle packet losses together with a structure network coding (SNC) technique to encode the SVC stream. It is important to choose an appropriate MCS for each layer, decide how many SNC packets in one layer should be transmitted, and determine the resources allocated to multiple video sessions to apply scalable video coding to wireless multicast streaming. We prove that such a resource allocation problem is NP-hard and propose an optimal algorithm with a pseudo-polynomial run time under a reasonable assumption. We also discuss the phenomenon of unexpected packet losses caused degradation of the layered hybrid NC/ARQ schemes in a high packet loss ratio environment, and propose a solution for overcoming such a problem. Our algorithm can attain the optimal transmission configuration for maximizing the expected utility for all receivers. The results from simulations revealed that our algorithm offers significant improvements to the video quality over an optimal algorithm without needing feedback from the receivers and an algorithm using a layered hybrid FEC/ARQ scheme, and it has the outstanding ability to combat unexpected packet losses.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132784169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive HELLO for the Neighborhood Discovery Protocol 邻域发现协议的自适应HELLO
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423663
Raphael Ernst, P. Martini
{"title":"Adaptive HELLO for the Neighborhood Discovery Protocol","authors":"Raphael Ernst, P. Martini","doi":"10.1109/LCN.2012.6423663","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423663","url":null,"abstract":"In typical Mobile Ad-Hoc Network (MANET) applications, the network topology changes frequently due to device movement, or link failure. Consequently, a fast response to connectivity changes is one of the most important challenges in MANETs. Most proactive routing protocols detect changes by exchanging control messages. The Neighborhood Discovery Protocol (NHDP) specifies the exchange of these kind of messages. As shown in prior studies, the proposed fixed intervals of NHDP cause unnecessary protocol overhead or late link detection. Our Adaptive HELLO (AH) scheme adapts the interval dynamically with respect to the actual situation and coordinates it between the nodes when necessary. The result is a fast link change detection and an overhead reduction in certain scenarios.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133493981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Models and algorithms for elastic-demand network equilibrium problems in communication networks with multicast sessions 具有组播会话的通信网络中弹性需求网络平衡问题的模型和算法
37th Annual IEEE Conference on Local Computer Networks Pub Date : 2012-10-22 DOI: 10.1109/LCN.2012.6423637
Xuefeng Ma, J. Huai, B. Li, Hanwen Wang, Ye Jiao
{"title":"Models and algorithms for elastic-demand network equilibrium problems in communication networks with multicast sessions","authors":"Xuefeng Ma, J. Huai, B. Li, Hanwen Wang, Ye Jiao","doi":"10.1109/LCN.2012.6423637","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423637","url":null,"abstract":"We consider the problem of elastic-demand network equilibrium in communication networks which support both multirate multicast sessions and unicast sessions. Extending existing work for unicast sessions, we first present the elastic-demand network equilibrium models in different multicast sessions, which can be formulated as a convex programming problem. To solve the convex programming problem we use the augmented Lagrangian multiplier algorithm in which the attractive features of the exterior penalty with primal-dual methods and Lagrangian multipliers concepts are combined while curtailing the disadvantage of both. Some numerical results about unicast sessions and multirate multicast sessions are demonstrated through efficient implementations of the augmented Lagrangian multiplier algorithm.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129971771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信