{"title":"Sensor placement algorithms for confident information coverage in wireless sensor networks","authors":"Jiajun Zhu, Bang Wang","doi":"10.1109/ICCCN.2014.6911802","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911802","url":null,"abstract":"Coverage is an important performance metric in wireless sensor networks, which reflects how well a sensor field is monitored by the deployed sensors. This paper studies the sensor placement problem for ensuring network coverage. Instead of using the simplistic disk coverage model, we adopt our recently proposed confident information coverage model for field attribute monitoring applications. The sensor field is divided into grid cells each with equal area, and sensors can be only placed at the center of each grid cell. Our objective is to place the least number of sensors to provide confident information coverage for all the grid points. We first formulate the sensor placement problem as a constrained optimization problem and use the exhaustive search algorithm to find the optimal solution. To reduce computation complexity, we also propose two greedy algorithms to find the approximate solutions. The simulation results show that the performance of the two proposed algorithms is close to the optimal solution obtained by the exhaustive search algorithm yet with significantly reduced computation complexity.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124080017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Panagiotis Georgopoulos, M. Broadbent, B. Plattner, N. Race
{"title":"Cache as a service: Leveraging SDN to efficiently and transparently support video-on-demand on the last mile","authors":"Panagiotis Georgopoulos, M. Broadbent, B. Plattner, N. Race","doi":"10.1109/ICCCN.2014.6911775","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911775","url":null,"abstract":"High quality online video streaming, both live and on-demand, has become an essential part of consumers' every-day lives. The popularity of video streaming has placed a heavy burden on the network infrastructure that now has to transfer an enormous amount of data very quickly to the end-user. To further exacerbate the situation, the Video-on-Demand (VoD) distribution paradigm uses a unicast independent flow for each user request. This results in multiple duplicate flows carrying the same video assets many times end-to-end. We present OpenCache: a highly configurable, efficient and transparent in-network caching service that aims to improve the VoD distribution efficiency by caching video assets as close to the end-user as possible. OpenCache leverages Software Defined Networking to benefit last mile environments by improving network utilisation and increasing the Quality of Experience for the end-user. Our evaluation on a pan-European OpenFlow testbed uses adaptive video streaming and demonstrates that with the use of OpenCache, the external link utilisation is reduced by 100%. Furthermore the streaming application receives better quality video and observes higher throughput, lower latency and shorter start up and buffering times.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126422479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Despotovic, A. Hecker, Ahsan Malik, Riccardo Guerzoni, I. Vaishnavi, R. Trivisonno, S. Beker
{"title":"VNetMapper: A fast and scalable approach to virtual networks embedding","authors":"Z. Despotovic, A. Hecker, Ahsan Malik, Riccardo Guerzoni, I. Vaishnavi, R. Trivisonno, S. Beker","doi":"10.1109/ICCCN.2014.6911859","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911859","url":null,"abstract":"Virtual network embedding is considered an important problem to solve in order to make infrastructure virtualization economically reasonable. The most efficient algorithms proposed so far define link and node mappings as optimal solutions of Integer Programming (IP) problems. They exhibit reasonably good performance only for small problem instance sizes, including few tens of nodes and links per physical substrate, few nodes and links per virtual request and a dozen of virtual requests to handle in parallel. However, we find these instances too small to be of any practical use. To address this scalability issue, we propose VNetMapper, an algorithm to solve the virtual network embedding problem based on an integer program formulation with appropriately selected objective function, variables and the set of constraints tuned to give an optimal performance. We show through simulations that VNetMapper can quickly, within seconds, solve large problem instances, involving physical substrates with hundreds of nodes and thousands of links and batches of hundreds of virtual network requests. By identifying exact properties that make VNetMapper so fast and scalable, we present guidelines for designing scalable integer programs.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128161236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Streaming videos over BitTorrent by balancing playback continuity and distribution of piece rareness","authors":"Chow-Sing Lin, Jhe-Wei Lin","doi":"10.1109/ICCCN.2014.6911868","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911868","url":null,"abstract":"In recent years, the BitTorrent (BT) has been one of the most efficient mechanisms for Peer-to-Peer (P2P) non-realtime content distribution. Many approaches for streaming videos over BitTorrent have been proposed by modifying the piece selection policy to cope with the real time requirement. Most of them provide the continuity of video playback at the cost of the variety of pieces on P2P streaming networks. In this paper, we propose the novel urgency-aware BT streaming mechanism, called UR-Aware, which intends to enhance the video streaming efficiency over BitTorrent on P2P networks by balancing playback continuity and distribution of piece rareness. There are two sets for piece downloading, called Uset and Rset. The Uset contains the most urgent pieces of video playback, while the Rset contains the rarest pieces. Downloading bandwidth of a peer is dynamically allocated to the two sets based on the number of consecutive pieces beyond the playback position in Uset. Furthermore, to implicitly preserve the continuity of pieces for future playback, consecutive k pieces are grouped as a section which would be selected to insert into Rset based on its rareness. The experimental results showed that the UR-Aware has the best performance among other BT streaming approaches in terms of video download time and piece late rate.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"3 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132462637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable area-based hierarchical control plane for software defined information centric networking","authors":"Shuai Gao, Yujing Zeng, Hongbin Luo, Hongke Zhang","doi":"10.1109/ICCCN.2014.6911839","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911839","url":null,"abstract":"Recently there has been a new emerging trend in integrating Information Centric Networking (ICN) and Software Defined Networking (SDN) together in the future internet research area. Software defined information centric networking (SD-ICN) may face more serious scalability problem in control plane compared with traditional SDN environment due to new features about in-network cache and content-based communication. In this paper, we address the control plane scalability problem from viewpoint of ICN/SDN integration and propose a scalable area-based hierarchical architecture (SAHA) for controller deployment in SD-ICN. The SAHA supports scalable awareness of network resources and content resources, as well as guarantees efficient interest matching and resource adaptation. Simulation experiments under OMNET++ show that the proposed SAHA can achieve good scalability in resource awareness and content-based communication.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132023314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving the Anonymity in MobilityFirst networks","authors":"K. Manandhar, B. Adcock, Xiaojun Cao","doi":"10.1109/ICCCN.2014.6911810","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911810","url":null,"abstract":"A scheme for preserving privacy in MobilityFirst (MF) clean-slate future Internet architecture is proposed in this paper. The proposed scheme, called Anonymity in MobilityFirst (AMF), utilizes the three-tiered approach to effectively exploit the inherent properties of MF Network such as Globally Unique Flat Identifier (GUID) and Global Name Resolution Service (GNRS) to provide anonymity to the users. While employing new proposed schemes in exchanging of keys between different tiers of routers to alleviate trust issues, the proposed scheme uses multiple routers in each tier to avoid collaboration amongst the routers in the three tiers to expose the end users.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132249379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Double-ruling-based location-free data replication and retrieval scheme in mobile ad hoc networks","authors":"Yao-Jen Tang, Jian-Jhih Kuo, Ming-Jer Tsai","doi":"10.1109/ICCCN.2014.6911822","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911822","url":null,"abstract":"Using the double-ruling technique, many data replication and retrieval schemes achieve low data retrieval latency. However, none of these schemes are location-free schemes in mobile ad hoc networks (MANETs). In this paper, we propose a zero-knowledge double-ruling-based location-free data replication and retrieval scheme (MobiMark) in MANETs. Our primary idea is to label the grid-like structured landmarks in the network using the landmark-labeling, dynamically designate the node that is nearest to a landmark as the landmark broker, and transmit the consumers' interests (or producers' data) to all horizontal (or vertical) landmark brokers using the double-ruling technique. Simulations show that MobiMark achieves good performance in terms of data retrieval rate and data retrieval latency.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A joint real grassmannian quantization strategy for MIMO interference alignment with limited feedback","authors":"W. Wu, Xu Li, Huarui Yin, Guo Wei","doi":"10.1109/ICCCN.2014.6911873","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911873","url":null,"abstract":"Interference alignment (IA) is a scheme to approach the capacity at high signal-to-noise ratio (SNR) in multiuser multiple-input multiple-output (MIMO) interference networks. To implement the IA scheme in a frequency-division duplexing (FDD) system, transmitter channel state information (CSIT) is fed back from the receiver with finite bits. However, such CSIT is subject to quantization errors and delays of feedback channels. In this paper, we verify that interference leakage is bounded by chordal distance in the MIMO channel. Besides, a joint real Grassmannian quantization strategy is proposed to reduce chordal distance to improve CSIT quality. Meanwhile, under the noise-limited criterion, the lower bound of the codebook size of our proposed strategy is much smaller than that of the conventional complex Grassmannian quantization strategy. Simulations demonstrate that our proposed strategy provides substantial performance gains compared with the conventional strategy.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134396485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximizing charging throughput in rechargeable sensor networks","authors":"Xiaojiang Ren, W. Liang, Wenzheng Xu","doi":"10.1109/ICCCN.2014.6911792","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911792","url":null,"abstract":"Energy is one of the most critical optimization objectives in wireless sensor networks. Compared with renewable energy harvesting technology, wireless energy transfer based on magnetic resonant coupling is able to provide more reliable energy supplies for sensors in wireless rechargeable sensor networks. The adoption of wireless mobile chargers (mobile vehicles) to replenish sensors' energy has attracted much attention recently by the research community. Most existing studies assume that the energy consumption rates of sensors in the entire network lifetime are fixed or given in advance, and no constraint is imposed on the mobile charger (e.g., its travel distance per tour). In this paper, we consider the dynamic sensing and transmission behaviors of sensors, by providing a novel charging paradigm and proposing efficient sensor charging algorithms. Specifically, we first formulate a charging throughput maximization problem. Since the problem is NP-hard, we then devise an offline approximation algorithm and online heuristics for it. We finally conduct extensive experimental simulations to evaluate the performance of the proposed algorithms. Experimental results demonstrate that the proposed algorithms are efficient.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Is more P2P always bad for ISPs? An analysis of P2P and ISP business models","authors":"Qi Liao, Z. Li, A. Striegel","doi":"10.1109/ICCCN.2014.6911841","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911841","url":null,"abstract":"Internet Service Providers (ISPs) face increasing bandwidth pressure from rising access demand by users, especially P2P and VoD applications. Traditionally, P2P has been viewed as tremendously negative from the perspective of the ISP. In this paper, we question this assumption and study the impact of P2P applications on the effective ISP functionality. We perform an economic analysis to show that a higher P2P penetration rate does not necessarily lead to increased ISP bottleneck link bandwidth pressure. Our results show that the local serving rate is critical for the sustainability of the ISP business model as well as for the benefit of P2P users.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133536004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}