2008 33rd IEEE Conference on Local Computer Networks (LCN)最新文献

筛选
英文 中文
Spherical Coordinate Routing for 3D wireless ad-hoc and sensor networks 三维无线自组织和传感器网络的球面坐标路由
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664163
Shao Tao, A. Ananda, M. Chan
{"title":"Spherical Coordinate Routing for 3D wireless ad-hoc and sensor networks","authors":"Shao Tao, A. Ananda, M. Chan","doi":"10.1109/LCN.2008.4664163","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664163","url":null,"abstract":"While wireless networks are generally deployed in three dimensional environments, most geometric routing protocols are designed and evaluated with a focus on two dimensional space. In this paper, we present a connectivity based routing protocol in 3D space named Spherical Coordinate Routing(SCR), which exploits connectivity-based greedy forwarding for efficient routing paths and a spherical coordinate tree based recovery method to guarantee packet delivery. SCR can deploy multiple recovery trees simultaneously to enhance the routing efficiency and resilience against network dynamics. Simulation results show that the packet delivery ratio of SCR is 22% ~ 63% higher than that of BVR, LCR and NoGeo, at the critical node density range of 4 to 8. The amount of forwarding traffic required per packet delivery is considerably lower than protocols relying on scoped flooding based recovery. The SCR protocol can efficiently recover from topology changes due to clustered node failures, while maintaining excellent path stretch and traffic load performance in a 3D network topology.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126581130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Supporting a seamless map in peer-to-peer system for Massively Multiplayer Online Role Playing Games 支持大规模多人在线角色扮演游戏的点对点系统无缝地图
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664202
Xinbo Jiang, F. Safaei
{"title":"Supporting a seamless map in peer-to-peer system for Massively Multiplayer Online Role Playing Games","authors":"Xinbo Jiang, F. Safaei","doi":"10.1109/LCN.2008.4664202","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664202","url":null,"abstract":"Massively multiplayer online role playing games feature huge maps that can be partitioned into smaller components called zones to achieve scalability. In peer-to-peer (P2P) systems, those zones can be assigned to peers who are willing to take up the role of zone servers. A seamless map requires inter-zone communications to allow interactions between players across zone boundaries. In assigning zones to peers, it is critical to seek approaches to reduce the inter-zone communication cost in P2P system. In this paper, we formulate the zone assignment problem for P2P system and demonstrate that the problem is NP-hard. We hence propose a low-cost heuristic that partitions the physical network into bins, as well as, aggregating the partitions of the virtual world by clustering neighboring zones in a game map. We then demonstrate that by assigning clustered neighboring zones in the virtual map into peers in common physical network bins, we are able to achieve similar inter-zone communication cost for the zone assignment problem as that can be achieved by the optimization model we formulated, while avoiding the prohibitively high computation cost required by the latter.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Monitoring the spatial-temporal effect of internet traffic based on Random Matrix Theory 基于随机矩阵理论的互联网流量时空效应监测
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664178
Jia Liu, Wenzhu Zhang, Jian Yuan, Depeng Jin, Lieguang Zeng
{"title":"Monitoring the spatial-temporal effect of internet traffic based on Random Matrix Theory","authors":"Jia Liu, Wenzhu Zhang, Jian Yuan, Depeng Jin, Lieguang Zeng","doi":"10.1109/LCN.2008.4664178","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664178","url":null,"abstract":"Monitoring traffic pattern is always an important approach to improve the performance of computer networks. In recent years, peer-to-peer (P2P) service gradually dominates the Internet traffic against traditional client-server (C-S) service such as Web. The changed situation of networks is mainly in two aspects. One is that popular P2P file-sharing applications require both board downstream and upstream bandwidth, which conflicts to asymmetry structure of the C-S service oriented networks, and another is that the topology of P2P overlay networks is varying with peers joining and leaving. The dramatic shift of Internet traffic may cause different patterns from that observed in early years. This leads a new round of Internet measurement, which requires effective monitoring of network-wide traffic within the region of ISP or autonomous system. Unfortunately, few of technologies can capture well the dynamics of C-S and P2P traffic in a macroscopic level. In this paper, we propose a method based on random matrix theory (RMT) for the detection of networkwide traffic pattern. Using only a few observation points, our method can monitor the macroscopic effect of the Internet traffic. We show that such macroscopic-level monitoring can be used to capture shifts in spatial-temporal patterns caused by P2P and C-S traffic, and inform where and when P2P and C-S traffic possibly arise in transit networks.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127696964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A cross-domain framework for coordinated end-to-end QoS adaptation 用于协调端到端QoS适配的跨域框架
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664224
Lifen Zhou, H. Pung, L. Ngoh
{"title":"A cross-domain framework for coordinated end-to-end QoS adaptation","authors":"Lifen Zhou, H. Pung, L. Ngoh","doi":"10.1109/LCN.2008.4664224","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664224","url":null,"abstract":"In this paper, we propose a novel cross-domain QoS framework for coordinated end-to-end QoS adaptation. The framework treats each autonomous QoS service on the end-to-end path as a QoS component and models its capabilities and behavior with respect to the requirements of end-to-end QoS coordination. Based on such information, the end-to-end QoS framework runtime copes with a QoS violation by selecting a suitable QoS adaptation solution among all the end-to-end candidate choices. Preliminary simulation results demonstrate the feasibility of our framework for distributed end-to-end QoS coordination.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A graph theoretic approach in achieving robust peer-to-peer networking paradigm 实现健壮点对点网络范例的图论方法
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664227
Hosein Shafiei, F. Hoseini, A. Khonsari, M. Ould-Khaoua
{"title":"A graph theoretic approach in achieving robust peer-to-peer networking paradigm","authors":"Hosein Shafiei, F. Hoseini, A. Khonsari, M. Ould-Khaoua","doi":"10.1109/LCN.2008.4664227","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664227","url":null,"abstract":"In this paper, we proposed a graph theoretic approach employing an algorithmic method to construct constant-degree graphs possessing not only provably minimum diameter, but also maximum connectivity with respect to other similar graphs.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123305128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opportunistic Wireless Broadcast (OWB): Dynamic redundancy detection in the wireless medium 机会无线广播(OWB):无线媒体中的动态冗余检测
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664284
D. Salyers, A. Striegel, C. Poellabauer
{"title":"Opportunistic Wireless Broadcast (OWB): Dynamic redundancy detection in the wireless medium","authors":"D. Salyers, A. Striegel, C. Poellabauer","doi":"10.1109/LCN.2008.4664284","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664284","url":null,"abstract":"The demand for rich multimedia content is continuously increasing as exemplified by the success of sites such as YouTube, Google Video, and others. Critically, the richness of multimedia content places significant demands on the limited bandwidth available in wireless networks. To that end, this paper proposes a novel mechanism, opportunistic wireless broadcast (OWB), that opportunistically aggregates redundant content over short timescales into unified broadcasts in order to dramatically improve the efficiency of streaming media. Unlike end-to-end techniques such as application-layer multicast (ALM) or native IP multicast, OWB does not require modifications to the server or client applications, thus offering a practical transition for deployment. Experimental studies are presented showing that even with a minimal amount of redundancy, OWB can significantly improve network throughput and quality of service in terms of end-to-end delay.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating “no-new-wires” home networks 评估“无新线路”家庭网络
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664296
Yeting Yu, Jianping Pan, Ming Lu, Lin X. Cai, D. Hoffman
{"title":"Evaluating “no-new-wires” home networks","authors":"Yeting Yu, Jianping Pan, Ming Lu, Lin X. Cai, D. Hoffman","doi":"10.1109/LCN.2008.4664296","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664296","url":null,"abstract":"Emerging broadband entertainment applications such as IPTV (Internet protocol television) and whole-house PVR (personal video recorder) bring new challenges to existing home networks. Gigabit Ethernet is an obvious choice, but consumers are still reluctant due to the need for rewiring in most dwellings. Several ldquono-new-wiresrdquo technologies have been proposed in recent years, but there is little work on how to distribute IPTV, VoIP (voice over IP) and data traffic together effectively and efficiently in a household environment. In this paper, we propose a wireless/wired-hybrid, multi-link structure for broadband home networks, and investigate its feasibility and performance through a multimedia over multi-link testbed. Our measurement study shows that the proposed multi-link structure can improve the performance, reliability and availability of home networks considerably, indicating that it is an attractive approach to multimedia in-home distribution. In addition, the paper also discusses the challenges and approaches in further improving the performance of heterogeneous, multi-link home networks.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129866337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Key management in wireless sensor networks with inter-network sensor roaming 网络间传感器漫游无线传感器网络中的密钥管理
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664187
Sejin Choi, V. Sarangan, Steve Trost
{"title":"Key management in wireless sensor networks with inter-network sensor roaming","authors":"Sejin Choi, V. Sarangan, Steve Trost","doi":"10.1109/LCN.2008.4664187","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664187","url":null,"abstract":"Wireless sensor networks (WSNs) are considered to be an ideal solution for many commercial and industrial applications due to their low-cost and easy deployability. However, Security is a critical concern in WSNs due to the technical challenge of providing sufficient security with battery-powered sensors that have limited computational resources. Although numerous advancements have been made in the field of key management in WSNs, most have focused on establishing keys within a single WSN. In addition, many have assumed that the locations of the sensors are fixed. As the number of WSN applications increases, there is an increasing demand for solutions that allow sensors to securely roam between different WSNs even when the WSNs are managed by independent organizations. This paper presents a base station-to-sensor pairwise key management protocol that allows sensor nodes to relocate to other WSNs as required by the application. In addition, the proposed solution localizes the damage that can arise when a sensor or a base-station is compromised without increasing the computational burden on the sensors. To the best of our knowledge, this is one of the first few works to address the pairwise key distribution problem in WSNs that allow nodes to roam between different, independent networks.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129282327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effect of intrusion detection on secure group communications in hierarchically structured group architectures 分层结构组体系结构中入侵检测对安全组通信的影响
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664307
Jin-Hee Cho, I. Chen
{"title":"Effect of intrusion detection on secure group communications in hierarchically structured group architectures","authors":"Jin-Hee Cho, I. Chen","doi":"10.1109/LCN.2008.4664307","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664307","url":null,"abstract":"We develop a class of adaptive security protocols with designs to allow group communication systems (GCSs) in mobile ad hoc networks (MANETs) to dynamically adjust operational settings to best satisfy application-imposed performance and security requirements, leveraging the inherent tradeoff between security and performance properties of the system. These adaptive security protocols include an intrusion detection protocol for dealing with insider attacks and a scalable region-based hierarchical group key management protocol for dealing with outsider attacks. Our design settings include the time interval over which intrusion detection should be performed, and the regional area size for the region-based hierarchical group key management protocol for group key management. When given a set of parameter values characterizing operational and environmental conditions of a GCS, we identify optimal design settings to be used by the system dynamically to maximize the mean time to security failure of the system while minimizing the total group communication cost incurred for GCSs in MANET environments.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks 以网络内聚合为例,研究了一种降低安全无线传感器网络设计复杂性的支持工具
2008 33rd IEEE Conference on Local Computer Networks (LCN) Pub Date : 2008-10-31 DOI: 10.1109/LCN.2008.4664280
Steffen Peter, K. Piotrowski, P. Langendörfer
{"title":"In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks","authors":"Steffen Peter, K. Piotrowski, P. Langendörfer","doi":"10.1109/LCN.2008.4664280","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664280","url":null,"abstract":"This paper shows how complex security-related design decisions in wireless sensor networks can be made less difficult with a proposed supporting tool. As case study in this paper we focus on in-network-aggregation which is a promising option to reduce network effort. We introduce several algorithms for concealed data aggregation, each with its own benefits and drawbacks concerning security issues but also with respect to code size, processing overhead etc. Selecting the optimal combination requires in-depth knowledge of programming resource constrained devices, protocols for those devices, and last but not least significant background in security. Our proposed configuration tool - named configKIT - has been designed to cope with such complexity. This paper presents how configKIT works, how it will be set up, and how it can be applied in practice. The pre-compiler assessment process considers memory, energy and security parameters and provides reliable application-dependent configurations to the developer before a single line of code is written. The approach can reduce development time significantly and enables even complex and sophisticated security algorithms to a broader public.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131478964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信