6,517 research outputs found
Flowtable-Free Routing for Data Center Networks: A Software-Defined Approach
The paradigm shift toward SDN has exhibited the following trends: (1) relying on a centralized and more powerful controller to make intelligent decisions, and (2) allowing a set of relatively dumb switches to route packets. Therefore, efficiently looking up the flowtables in forwarding switches to guarantee low latency becomes a critical issue. In this paper, following the similar paradigm, we propose a new routing scheme called KeySet which is flowtable-free and enables constant-time switching at the forwarding switches. Instead of looking up long flowtables, KeySet relies on a residual system to quickly calculate routing paths. A switch only needs to do simple modular arithmetics to obtain a packet's forwarding output port. Moreover, KeySet has a nice fault- tolerant capability because in many cases the controller does not need to update flowtables at switches when a failure occurs. We validate KeySet through extensive simulations by using general as well as Facebook fat-tree topologies. The results show that the KeySet outperforms the KeyFlow scheme [1] by at least 25% in terms of the length of the forwarding label. Moreover, we show that KeySet is very efficient when applied to fat-trees
How to Reduce Unexpected eMBMS Session Disconnection: Design and Performance Analysis
In 3GPP eMBMS, sometimes sessions will be disconnected unexpectedly due to the miss of session keys. Although rekeying can prevent old users from getting multicast data, it also causes authorized users to miss subsequent data if they miss the key update messages. Thus, re-authentication is needed to obtain lost keys from KMM. We point out this problem in our previous work 1. In this paper, we further propose a new KeySet algorithm, which can pre-issue a number of keys to users when they join eMBMS. The advantage is that a user can still decode multicast data even if it misses some key updates tentatively. However, the cost is that allowing some old users to freely enjoying multicast for some time. In this paper, we quantify the tradeoff and derive the optimal case
Multi-Slot Allocation Protocols for Massive IoT Devices with Small-Size Uploading Data
The emergence of Internet of Things applications introduces new challenges such as massive connectivity and small data transmission. In traditional data transmission protocols, an ID (i.e., IP address or MAC address) is usually included in a packet so that its receiver is able to know who sent the packet. However, this introduces the big head-small body problem for light payload. To address this problem, the Hint protocols have been proposed. The main idea is to 'encode' information in a tiny broadcast Hint message that allows devices to 'decode' their transmission slots. Thus, it can significantly reduce transmission and contention overheads. In this letter, we extend eHint to support multi-slot data transmissions. Several efficient protocols are proposed. Our simulation results validate that the protocols can significantly increase the number of successfully transmitted devices, channel utilization, and payload of transmitted devices compared with eHint
Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service
3GPP introduced the key management mechanism (KMM) in evolved multimedia broadcast/multicast service (eMBMS) to provide forward security and backward security for multicast contents. In this paper, we point out that KMM may lead to frequent rekeying and re-authentication issues due to eMBMS's characteristics: 1) massive group members; 2) dynamic group topology; and 3) unexpected wireless disconnections. Such issues expose extra load for both user equipment (UE) terminals and mobile operators. It seems prolonging the rekeying interval is an intuitive solution to minimizing the impact of the issues. However, a long rekeying interval is not considered the best operational solution due to revenue loss of content providers. This paper quantifies the tradeoff between the load of the UEs and the operators as well as the revenue loss of the content providers. Moreover, we emphasize how essential this rekeying interval has impacts on the problems. Using our proposed tradeoff model, the operators can specify a suitable rekeying interval to best balance the interest between the above three parties. The tradeoff model is validated by extensive simulations and is demonstrated to be an effective approach for the tradeoff analysis and optimization on eMBMS
In vivo sub-femtoliter resolution photoacoustic microscopy with higher frame rates
Microscopy based on non-fluorescent absorption dye staining is widely used in various fields of biomedicine for 400 years. Unlike its fluorescent counterpart, non-fluorescent absorption microscopy lacks proper methodologies to realize its in vivo applications with a sub-femtoliter 3D resolution. Regardless of the most advanced high-resolution photoacoustic microscopy, sub-femtoliter spatial resolution is still unattainable, and the imaging speed is relatively slow. In this paper, based on the two-photon photoacoustic mechanism, we demonstrated a in vivo label free laser-scanning photoacoustic imaging modality featuring high frame rates and sub-femtoliter 3D resolution simultaneously, which stands as a perfect solution to 3D high resolution non-fluorescent absorption microscopy. Furthermore, we first demonstrated in vivo label-free two-photon acoustic microscopy on the observation of non-fluorescent melanin distribution within mouse skin
eHint: An Efficient Protocol for Uploading Small-Size IoT Data
IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements. When a large number of devices contend to send small packets, the signaling overhead is not cost-effective. To address this problem, our previous work [1] proposes the Hint protocol, which is slot-based and schedule- oriented for uploading IoT devices' data. In this work, we extend [1] to support data transmissions for multiple resource blocks. We assume that the uplink payloads from IoT devices are small, each taking very few slots (or resource blocks), but devices are massive. The main idea is to "encode" information in a tiny broadcast that allows each device to "decode" its transmission slots, thus significantly reducing transmission overheads and contention overheads. Our simulation results verify that the protocol can significantly increase channel utilization compared with traditional schemes
iToy: A LEGO-like solution for small scale IoT applications
We can find various Internet of Things (IoT) products available in the market to accommodate users needs. Current IoT applications, however, built delicately for their usage with their own sensor devices and Apps. This limitation thus prevents users from handling flexible situations. In this paper, we propose iToy, an LEGO-like solution to integrate various off-the-shelf sensors for different IoT applications. In iToy, the off-the-shelf sensors are like LEGO plastic bricks, which can be assembled and connected to construct IoT applications. Any sensors constructed in an IoT application can be taken apart again and then used to make other IoT applications. We demonstrate through proof-of-concept prototype that iToy is user-friendly and suitable for forming different small scale IoT applications
- …
