IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications最新文献

筛选
英文 中文
Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks 多通道单无线传感器网络的近最优数据传播策略
D. Starobinski, Weiyao Xiao, Xiangping Qin, A. Trachtenberg
{"title":"Near-Optimal Data Dissemination Policies for Multi-Channel, Single Radio Wireless Sensor Networks","authors":"D. Starobinski, Weiyao Xiao, Xiangping Qin, A. Trachtenberg","doi":"10.1109/INFCOM.2007.116","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.116","url":null,"abstract":"We analyze the performance limits of data dissemination with multi-channel, single radio sensors. We formulate the problem of minimizing the average delay of data dissemination as a stochastic shortest path problem and show that, for an arbitrary topology network, an optimal control policy can be found in a finite number of steps, using value iteration or Dijsktra's algorithm. However, the computational complexity of this solution is generally prohibitive. We thus focus on two special classes of network topologies of practical interest, namely single-hop clusters and multi-hop cluster trees. For these topologies, we derive the structure of policies that achieve an average delay within a factor 1 + e of the optimal average delay, in networks with large number of nodes. Through simulation, we show that these policies perform close to optimal even for networks with small and moderate numbers of nodes. Our analysis and simulations reveal that multichannel data dissemination policies lead to a drastic reduction in the average delay, up to a factor as large as the total number of channels available, even though each node can communicate over only one channel at any point of time. Finally, we present the foundations of a methodology, based on extreme value theory, allowing the implementation of our near-optimal dissemination policies with minimal overhead.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115414798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Malicious Users in Unstructured Networks 非结构化网络中的恶意用户
George Theodorakopoulos, J. Baras
{"title":"Malicious Users in Unstructured Networks","authors":"George Theodorakopoulos, J. Baras","doi":"10.1109/INFCOM.2007.108","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.108","url":null,"abstract":"Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow the network protocol or not. While providing scalability benefits, this degrades the performance, which is compounded by the potential presence of Malicious Users. In general, these users are trying to disrupt the operation of the network, and prevent the legitimate users from achieving their objectives. More specifically, they could try to break the connectivity of the network, or waste the resources of the legitimate users. In this work we use game theory to examine the effect of malicious users. All users are modeled as payoff-maximizing strategic agents. A simple model, fictitious play, is used for the legitimate user behavior, but no limits are imposed on the Malicious Users strategies. We look for the worst case equilibrium: the one that gives Malicious Users the highest payoff. We identify the importance of the network topology.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Randomized k-Coverage Algorithms For Dense Sensor Networks 密集传感器网络的随机k-覆盖算法
M. Hefeeda, M. Bagheri
{"title":"Randomized k-Coverage Algorithms For Dense Sensor Networks","authors":"M. Hefeeda, M. Bagheri","doi":"10.1109/INFCOM.2007.284","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.284","url":null,"abstract":"We propose new algorithms to achieve k-coverage in dense sensor networks. In such networks, covering sensor locations approximates covering the whole area. However, it has been shown before that selecting the minimum set of sensors to activate from an already deployed set of sensors is NP-hard. We propose an efficient approximation algorithm which achieves a solution of size within a logarithmic factor of the optimal. We prove that our algorithm is correct and analyze its complexity. We implement our algorithm and compare it against two others in the literature. Our results show that the logarithmic factor is only a worst-case upper bound and the solution size is close to the optimal in most cases. A key feature of our algorithm is that it can be implemented in a distributed manner with local information and low message complexity. We design and implement a fully distributed version of our algorithm. Our distributed algorithm does not require that sensors know their locations. Comparison with two other distributed algorithms in the literature indicates that our algorithm: (i) converges much faster than the others, (ii) activates near-optimal number of sensors, and (iii) significantly prolongs (almost doubles) the network lifetime because it consumes much less energy than the other algorithms.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 151
Optimizing File Availability in Peer-to-Peer Content Distribution 优化点对点内容分发中的文件可用性
J. Kangasharju, K. Ross, David A. Turner
{"title":"Optimizing File Availability in Peer-to-Peer Content Distribution","authors":"J. Kangasharju, K. Ross, David A. Turner","doi":"10.1109/INFCOM.2007.229","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.229","url":null,"abstract":"A fundamental paradigm in peer-to-peer (P2P) content distribution is that of a large community of intermittently-connected nodes that cooperate to share files. Because nodes are intermittently connected, the P2P community must replicate and replace files as a function of their popularity to achieve satisfactory performance. In this paper, we develop an analytical optimization theory for benchmarking the performance of replication/replacement algorithms, including algorithms that employ erasure codes. We also consider a content management algorithm, the Top-K Most Frequently Requested algorithm, and show that in most cases this algorithm converges to an optimal replica profile. Finally, we present two approaches for achieving an evenly balanced load over all the peers in the community.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Packet Loss Characterization in WiFi-Based Long Distance Networks 基于wifi的长距离网络丢包特性研究
Anmol Sheth, S. Nedevschi, Rabin K. Patra, S. Surana, E. Brewer, L. Subramanian
{"title":"Packet Loss Characterization in WiFi-Based Long Distance Networks","authors":"Anmol Sheth, S. Nedevschi, Rabin K. Patra, S. Surana, E. Brewer, L. Subramanian","doi":"10.1109/INFCOM.2007.44","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.44","url":null,"abstract":"Despite the increasing number of WiFi-based Long Distance (WiLD) network deployments, there is a lack of understanding of how WiLD networks perform in practice. In this paper, we perform a systematic study to investigate the commonly cited sources of packet loss induced by the wireless channel and by the 802.11 MAC protocol. The channel induced losses that we study are external WiFi, non-WiFi and multipath interference. The protocol induced losses that we study are protocol timeouts and the breakdown of CSMA over WiLD links. Our results are based on measurements performed on two real-world WiLD deployments and a wireless channel emulator. The two deployments allow us to compare measurements across rural and urban settings. The channel emulator allows us to study each source of packet loss in isolation in a controlled environment. Based on our experiments we observe that the presence of external WiFi interference leads to significant amount of packet loss in WiLD links. In addition to identifying the sources of packet loss, we analyze the loss variability across time. We also explore the solution space and propose a range of MAC and network layer adaptation algorithms to mitigate the channel and protocol induced losses. The key lessons from this study were also used in the design of a TDMA based MAC protocol for high performance long distance multihop wireless networks [12].","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 132
On Cooperation in Energy Limited Wireless Networks 关于能源有限公司无线网络的合作
L. Lai, H. E. Gamal
{"title":"On Cooperation in Energy Limited Wireless Networks","authors":"L. Lai, H. E. Gamal","doi":"10.1109/INFCOM.2007.66","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.66","url":null,"abstract":"This paper considers wireless networks with energy limited nodes. In this scenario, multi-hop forwarding is needed to minimize the network energy consumption. In many practical scenarios, however, nodes' selfishness raises doubts on whether each node will be willing to forward packets in order to minimize the overall energy expenditure. To analyze this problem, a non-cooperative game theoretic approach is adopted in our work. Using this framework, the critical role of altruistic nodes in encouraging cooperation is established. More specifically, we show that it is sufficient to have a vanishingly small fraction of the nodes to be altruistic, i.e., relay nodes, in order to ensure full cooperation from all the nodes in the network. This result hinges on using the appropriate forwarding policies by the altruistic nodes, as detailed in the sequel. An important aspect of our work is that only reward/punishment policies that can be realized on the physical layer are used, and hence, our results establish the achievability of full cooperation without requiring additional incentive mechanisms at the higher layer.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122938169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 无线传感器网络中最优干扰攻击与网络防御策略
Mingyan Li, I. Koutsopoulos, R. Poovendran
{"title":"Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks","authors":"Mingyan Li, I. Koutsopoulos, R. Poovendran","doi":"10.1109/INFCOM.2007.155","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.155","url":null,"abstract":"We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmission range to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by a monitoring node in the network, and a notification message is transferred out of the jamming region. The jammer is detected at a monitor node by employing an optimal detection test based on the percentage of incurred collisions. On the other hand, the network computes channel access probability in an effort to minimize the jamming detection plus notification time. In order for the jammer to optimize its benefit, it needs to know the network channel access probability and number of neighbors of the monitor node. Accordingly, the network needs to know the jamming probability of the jammer. We study the idealized case of perfect knowledge by both the jammer and the network about the strategy of one another, and the case where the jammer or the network lack this knowledge. The latter is captured by formulating and solving optimization problems, the solutions of which constitute best responses of the attacker or the network to the worst-case strategy of each other. We also take into account potential energy constraints of the jammer and the network. We extend the problem to the case of multiple observers and adaptable jamming transmission range and propose a intuitive heuristic jamming strategy for that case.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 307
A Framework for Multi-Objective SLA Compliance Monitoring 多目标SLA遵从性监控框架
J. Sommers, P. Barford, N. Duffield, A. Ron
{"title":"A Framework for Multi-Objective SLA Compliance Monitoring","authors":"J. Sommers, P. Barford, N. Duffield, A. Ron","doi":"10.1109/INFCOM.2007.298","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.298","url":null,"abstract":"Service level agreements (SLAs) specify performance guarantees made by service providers, typically in terms of packet loss, delay, delay variation, and network availability. While many tools have been developed to measure individual aspects of network performance, there has been little work to directly address the issue of SLA compliance monitoring in an operational setting where accuracy, parsimony, and other related issues are of vital importance. This paper takes the following steps toward addressing this problem: (1) we introduce an architectural framework for integrating multiple discrete-time active measurement algorithms, an architecture that we call multi-objective monitoring; and (2) we introduce a new active measurement methodology to monitor the packet loss rate along a network path for determining compliance with specified performance targets which significantly improves accuracy over existing techniques. We present a prototype implementation of our monitoring framework, and demonstrate how a unified probe stream can consume lower overall bandwidth than if individual streams are used to measure different path properties. We demonstrate the accuracy and convergence properties of our new loss rate monitoring methodology in a controlled laboratory environment using a range of background traffic scenarios and examine its accuracy improvements over existing techniques.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121678307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Suite of Schemes for User-Level Network Diagnosis without Infrastructure 一套无基础设施的用户级网络诊断方案
Yao Zhao, Yan Chen
{"title":"A Suite of Schemes for User-Level Network Diagnosis without Infrastructure","authors":"Yao Zhao, Yan Chen","doi":"10.1109/INFCOM.2007.251","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.251","url":null,"abstract":"It is highly desirable and important for end users, with no special privileges, identify and pinpoint faults inside the network that degrade the performance of their applications. However, existing tools are inaccurate to infer the link-level loss rates and have large diagnosis granularity (in terms of the number of hops). To address these problems, we propose a suite of user-level diagnosis approaches in two categories: (1) only need to be deployed at the source and (2) deployed at both source and destination. For the former, we propose two fragmentation aided diagnosis approaches (FAD), Algebraic FAD and Opportunistic FAD, which uses IP fragmentation to enable accurate link-level loss rate inference. For the latter category, we propose Striped Probe Analysis (SPA) which significantly improves the diagnosis granularity over those of the source-only approaches. Internet experiments are applied to evaluate each individual schemes (including an improved version of the state-of-the-art tool, Tulip [1]) and various hybrid approaches. The results indicate that our approaches dramatically outperform existing work (especially for diagnosis granularity) and provide not only the best performance but also smooth tradeoff among deployment requirement, diagnosis accuracy and granularity.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121913101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
E-CSMA: Supporting Enhanced CSMA Performance in Experimental Sensor Networks Using Per-Neighbor Transmission Probability Thresholds E-CSMA:在实验传感器网络中使用单邻居传输概率阈值支持增强的CSMA性能
S. Eisenman, A. Campbell
{"title":"E-CSMA: Supporting Enhanced CSMA Performance in Experimental Sensor Networks Using Per-Neighbor Transmission Probability Thresholds","authors":"S. Eisenman, A. Campbell","doi":"10.1109/INFCOM.2007.144","DOIUrl":"https://doi.org/10.1109/INFCOM.2007.144","url":null,"abstract":"A transmitter in a wireless network that uses CSMA, a simple carrier sensing-based MAC protocol, to determine the likelihood of successful packet reception at the intended receiver can easily be misled. At the same time, CSMA variants and hybrid MAC protocols based at least in part on carrier sensing have become the de facto standard in wireless sensor networks, underscoring a need to improve its performance. We propose to enhance the de facto state of carrier sensing-based MACs in wireless sensor networks by using low cost channel feedback combined with a learning approach to try to better predict the probability of a successful reception, on a per-receiver basis. We show results from an experimental wireless sensor network testbed, where our proposal E-CSMA (Enhanced CSMA) provides up to a 55% improvement in network performance.","PeriodicalId":426451,"journal":{"name":"IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134443303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信