{"title":"Interest-Centric Mobile Ad Hoc Networks","authors":"Renato C. Dutra, Heberte F. Moraes, C. Amorim","doi":"10.1109/NCA.2012.32","DOIUrl":"https://doi.org/10.1109/NCA.2012.32","url":null,"abstract":"Mobile ad hoc Networks (MANETs) pose significant shared communication medium constraints such as finite memory, number of access channels, and bandwidth to the development of effective communication protocols. Furthermore, multihop message forwarding multiplies the amount of simultaneous transmissions, which augment both channel contention and network congestion, increasing interference and reducing protocol performance. With these issues in mind, we propose a variation of MANET which we called interest-centric mobile adhoc network or simply Radnet in which every participant node implements in the network layer an Active Prefix (AP) composed of a prefix and an application interest, which the Radnet protocol uses for node identification, message addressing, probabilistic message forwarding, and name search in a distributed way. To evaluate the effectiveness of Radnets for generating lower disturbance in the shared communication medium, thus enabling resource savings, and reducing message overheads, we compared the simulated performances of Radnet protocol (RP) against those of AODV and AODV + Gossip3 (G3AODV) protocols. The results showed that RP achieved a 16 percent higher message delivery rate and one order of magnitude lower latency and message overhead for short 0.5 kB messages in scenarios with 150 mobile nodes. For 5 kB messages, however, AODV and G3AODV rarely ran until the end, due to their overwhelming message overheads, while Radnet protocol showed performances similar to that of the short message case. To evaluate the use of Radnets in practice, we ran experiments in the laboratory, including a chat application on a 20-node Radnet.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129478420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chasing the Weakest Failure Detector for k-Set Agreement in Message-Passing Systems","authors":"A. Mostéfaoui, M. Raynal, J. Stainer","doi":"10.1109/NCA.2012.19","DOIUrl":"https://doi.org/10.1109/NCA.2012.19","url":null,"abstract":"This paper continues our quest for the weakest failure detector which allows the k-set agreement problem to be solved in asynchronous message-passing systems prone to process failures. It has two main contributions which will be instrumental to complete this quest. The first contribution is a new failure detector (denoted PiSigma(x, y)) that has several noteworthy properties. (a) It is stronger than Sigma(k) which has been shown to be necessary. (b) It is equivalent to the pair (Sigma, Omega) when x=y=1 (optimal to solve consensus). (c) It is equivalent to the pair (Sigma(n-1), Omega(n-1)) when x=y=n-1 (optimal for (n-1)-set agreement). (d) It is strictly weaker than the pair (Sigma(x), anti-Omega(y)) (which has been investigated in previous works). (e) It is operational: the paper presents a PiSigma(x, y)-based algorithm that solves k-set agreement for k greater or equal to xy (intuitively, x refers to the maximum number of isolated groups of processes and y to the number of leaders in each of these groups). The second contribution of the paper is a proof that, for k strictly between 1 and n-1, the eventual leaders failure detector Omega(k) (which eventually provides each process with the same set of k process identities, this set including at least one correct process) is not necessary to solve k-set agreement problem.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131381668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Information Divergence Estimation over Data Streams","authors":"E. Anceaume, Yann Busnel","doi":"10.1109/NCA.2012.16","DOIUrl":"https://doi.org/10.1109/NCA.2012.16","url":null,"abstract":"In this paper, we consider the setting of large scale distributed systems, in which each node needs to quickly process a huge amount of data received in the form of a stream that may have been tampered with by an adversary. In this situation, a fundamental problem is how to detect and quantify the amount of work performed by the adversary. To address this issue, we have proposed in a prior work, AnKLe, a one pass algorithm for estimating the Kullback-Leibler divergence of an observed stream compared to the expected one. Experimental evaluations have shown that the estimation provided by AnKLe is accurate for different adversarial settings for which the quality of other methods dramatically decreases. In the present paper, considering n as the number of distinct data items in a stream, we show that AnKLe is an (ε, δ)-approximation algorithm with a space complexity Õ(1/ε + 1/ε2) bits in “most” cases, and Õ(1/ε + n-ε-1/ε2 ) otherwise. To the best of our knowledge, an approximation algorithm for estimating the Kullback-Leibler divergence has never been analyzed before.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114897276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Distance Prediction Using Node-Pair Geography","authors":"Ankur Jain, J. Pasquale","doi":"10.1109/NCA.2012.12","DOIUrl":"https://doi.org/10.1109/NCA.2012.12","url":null,"abstract":"Predictive methods for learning network distances are often more desirable than direct performance measurements between end hosts. Yet, predicting network distances remains an open and difficult problem, as the results from a number of comparative and analytical studies have shown. From an application requirements perspective, there is significant room for improvement in achieving prediction accuracies at a satisfactory level. In this paper, we develop and analyze a new, machine learning-based approach to distance prediction that seeks to capture and generalize geographical characteristics between Internet node pairs, instead of relying on direct and ongoing measurements of partial paths. We apply a basic algorithm in machine learning to demonstrate this idea and highlight the potential benefits that this method may offer over other popular methods that exist today.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"39 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115564107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Schnaufer, J. Kiess, Hendrik Lemelson, S. Kopf, Sebastian Geiger, W. Effelsberg
{"title":"Proximity Detection and Message Exchange in WLANs","authors":"S. Schnaufer, J. Kiess, Hendrik Lemelson, S. Kopf, Sebastian Geiger, W. Effelsberg","doi":"10.1109/NCA.2012.31","DOIUrl":"https://doi.org/10.1109/NCA.2012.31","url":null,"abstract":"We present a novel system that allows small handheld devices to detect other devices in the local proximity and to exchange messages with them. The client devices use WLAN to access the system via a web interface and do not require additional software or modification of the device's operating system. The physical closeness of client devices is estimated based on their signal strengths measured by the system's access points. A major advantage compared to indoor positioning systems is the fact that our system does not require a training phase. We conduct a comprehensive evaluation to demonstrate the practicability of our approach.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122971039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Technique for Self-Optimizing Scalable and Dependable Server Clusters under QoS Constraints","authors":"R. M. Llamas, D. García, J. Entrialgo","doi":"10.1109/NCA.2012.29","DOIUrl":"https://doi.org/10.1109/NCA.2012.29","url":null,"abstract":"Cluster management has become a multi objective task that involves many disciplines like power optimization, fault tolerance, dependability and online system operation analysis. Efficient and secure operation of these clusters is a key objective of any data center policy. In addition, the service provided by these servers must fulfill a level of quality of service (QoS) to the customers. Applying self-management techniques to these clusters would simplify and automate its operation. Current self-management techniques that take into account service level agreements (SLAs) do not cover at the same time the two most important sides of the cluster operation: self-optimization, for an efficient and profitable operation, and self-healing, for a secure operation and high level of quality of service perceived by users. This work integrates a self-optimization strategy for Internet server clusters that optimizes the power consumption, using dynamic provisioning of servers, with a self-healing strategy that improves the reaction of the cluster to a server failure, by using the spare capacity of the cluster intelligently. The self-management technique is based on empirical response time and power consumption models of the servers that simplify its operation. Additionally, the technique presented in this paper guarantees the fulfillment of the SLA.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Methodology for Enhancing Automated Process in IT Incident Management","authors":"Haochen Li, Zhiqiang Zhan","doi":"10.1109/NCA.2012.28","DOIUrl":"https://doi.org/10.1109/NCA.2012.28","url":null,"abstract":"Operating system experienced a rise in number of incidents in recent years. Analysis and reemployment of past solution therefore may make a contribution in reducing service interrupt time and minimizing business losses. The training and retaining of human resources is another primary disbursement source for enterprise. Thus, it is of great significance for enterprises to find reasonable solutions automatically. Combined with keyword tokenization, data mining, numerical optimization and neural network, this paper presents a system that compares and finds the most similar incident solution in the past, based on the description provided by customers in natural language. We try to improve the automated process by increasing the efficiency and accuracy through machine learning methodology and also devote to presenting a practical decision support method.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127373419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Regenerating Codes for Fault Tolerance in Distributed Storage Systems","authors":"K. Peter, P. Sobe","doi":"10.1109/NCA.2012.35","DOIUrl":"https://doi.org/10.1109/NCA.2012.35","url":null,"abstract":"Recently, regenerating codes, a special network coding technique, were discovered for fault-tolerant storage systems with the promising advantage of efficient data recovery in the case of a single node failure and replacement (regeneration case). From the perspective of coding theory, regenerating codes are extensively studied, but there exists no reference on how to implement these codes in storage systems. We provide a comparison of Reed-Solomon codes and regenerating codes from an implementation point of view. The comparison includes the experimental evaluation of the encoding and the regeneration data throughput.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114706670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-fence Countermeasure Based Inter-domain Source Address Validation Method","authors":"Jie Li, J. Bi, Jianping Wu, Wei Zhang","doi":"10.1109/NCA.2012.20","DOIUrl":"https://doi.org/10.1109/NCA.2012.20","url":null,"abstract":"The functional deficiency of the Internet architecture enables attackers the ability to easily to spoof IP source address. The traditional signature-and-verification based anti-spoofing methods are often limited by essential process based on an explicit analysis and process of the IP header and does not adapt to incremental deployment. This paper designs a multi-fence countermeasure based inter-domain source address validation method named VIP. By employing intelligent originating information label and extended MPLS based cloud and network, VIP enables lightweight-label-based packet forwarding and validation. And VIP offers gains in efficiency by reducing the load on both forwarding tables and validation processing without negative influences and complex operations on de facto networks. In addition to enhanced scalability, VIP may facilitate incremental deployment in the long run.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127075276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delay-Aware Query Routing Tree for Wireless Sensor Networks","authors":"Shaila Pervin, J. Kamruzzaman, G. Karmakar","doi":"10.1109/NCA.2012.39","DOIUrl":"https://doi.org/10.1109/NCA.2012.39","url":null,"abstract":"Timeliness in query response is the major quality metric for query processing in the real-time applications of Wireless Sensor Networks (WSNs). The structure of the query routing tree directly affects the whole query processing delay as it provides the path to forward a query to the relevant nodes and return the response to the sink. In the current literature, query routing structure is designed irrespective of the variation in query loads among the sensors. As a consequence, current schemes do not guarantee for the routing tree to provide a faster path to the sensors with higher query load. This motivates the current work to consider query load in constructing and self-reconfiguring the routing tree. In this paper, we present a query load-based spanning tree construction method that reduces the query response delay as well as energy consumption in query execution and provides query response with the best possible accuracy. Simulation results illustrate the efficacy of the proposed framework.","PeriodicalId":242424,"journal":{"name":"2012 IEEE 11th International Symposium on Network Computing and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}