首页 > 最新文献

2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)最新文献

英文 中文
How is your event Wi-Fi doing? Performance measurements of large-scale and dense IEEE 802.11n/ac networks 你的活动Wi-Fi怎么样了?大规模和密集IEEE 802.11n/ac网络的性能测量
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987362
Patrick Bosch, Jeroen Wyffels, B. Braem, Steven Latré
The popularity of the IEEE 802.11 (Wi-Fi) standard has resulted in a plethora of hotspot deployments. While home hotspots offer high and consistent performance, at large-scale events such as conferences and festivals, Wi-Fi performance is often poor and highly fluctuating. There are several factors explaining this increased difficulty: the required scale, the complexity of backhaul network topologies, the density of devices connected to the access point (AP), and the interference caused by both people and radio frequency (RF) equipment. While these factors are all known to degrade the performance of public hotspots, little is known about the actual performance of IEEE 802.11 at large-scale events. In this paper, we present the results of quantitative Wi-Fi performance measurement study undertaken at a music festival with 80,000 visitors over a geographical area of 0.3 square kilometres. Two separate networks were constructed for this study. The first was an IEEE 802.11n-based wireless mesh consisting of 37 devices in 15 nodes working as a network backhaul and the second an IEEE 802.11n/ac-based public hotspot that was accessible by the festival goers. We characterise the performance of the wireless spectrum and illustrate the impact of interference factors such as crowds and RF equipment. Finally, we report on the results of the deployment of a public hotspot at the festival, focusing more on application-layer metrics parameters such as user experience and session statistics. The results show that the interference at such events is so high that adaptations to the protocol configuration are needed to improve performance.
IEEE 802.11 (Wi-Fi)标准的普及导致了大量的热点部署。虽然家庭热点提供高且稳定的性能,但在会议和节日等大型活动中,Wi-Fi性能通常很差且波动很大。有几个因素可以解释这种增加的难度:所需的规模、回程网络拓扑的复杂性、连接到接入点(AP)的设备的密度,以及由人和射频(RF)设备引起的干扰。虽然已知这些因素都会降低公共热点的性能,但对于IEEE 802.11在大型活动中的实际性能知之甚少。在本文中,我们介绍了在一个地理面积为0.3平方公里的音乐节上进行的定量Wi-Fi性能测量研究的结果,该音乐节有80,000名游客。本研究构建了两个独立的网络。第一个是基于IEEE 802.11n的无线网络,由15个节点中的37个设备组成,作为网络回程;第二个是基于IEEE 802.11n/ac的公共热点,供节日观众访问。我们描述了无线频谱的性能,并说明了干扰因素(如人群和射频设备)的影响。最后,我们报告了在节日上部署公共热点的结果,更多地关注应用层指标参数,如用户体验和会话统计。结果表明,在这些事件中的干扰是如此之高,以至于需要调整协议配置来提高性能。
{"title":"How is your event Wi-Fi doing? Performance measurements of large-scale and dense IEEE 802.11n/ac networks","authors":"Patrick Bosch, Jeroen Wyffels, B. Braem, Steven Latré","doi":"10.23919/INM.2017.7987362","DOIUrl":"https://doi.org/10.23919/INM.2017.7987362","url":null,"abstract":"The popularity of the IEEE 802.11 (Wi-Fi) standard has resulted in a plethora of hotspot deployments. While home hotspots offer high and consistent performance, at large-scale events such as conferences and festivals, Wi-Fi performance is often poor and highly fluctuating. There are several factors explaining this increased difficulty: the required scale, the complexity of backhaul network topologies, the density of devices connected to the access point (AP), and the interference caused by both people and radio frequency (RF) equipment. While these factors are all known to degrade the performance of public hotspots, little is known about the actual performance of IEEE 802.11 at large-scale events. In this paper, we present the results of quantitative Wi-Fi performance measurement study undertaken at a music festival with 80,000 visitors over a geographical area of 0.3 square kilometres. Two separate networks were constructed for this study. The first was an IEEE 802.11n-based wireless mesh consisting of 37 devices in 15 nodes working as a network backhaul and the second an IEEE 802.11n/ac-based public hotspot that was accessible by the festival goers. We characterise the performance of the wireless spectrum and illustrate the impact of interference factors such as crowds and RF equipment. Finally, we report on the results of the deployment of a public hotspot at the festival, focusing more on application-layer metrics parameters such as user experience and session statistics. The results show that the interference at such events is so high that adaptations to the protocol configuration are needed to improve performance.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132573363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Attacking SCADA systems: A practical perspective 攻击SCADA系统:一个实用的视角
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987369
Luís Rosa, T. Cruz, P. Simões, E. Monteiro, Leonid Lev
As Supervisory Control and Data Acquisition (SCADA) and Industrial and Automation Control System (IACS) architectures became more open and interconnected, some of their remotely controlled processes also became more exposed to cyber threats. Aspects such as the use of mature technologies and legacy equipment or even the unforeseen consequences of bridging IACS with external networks have contributed to this situation. This situation prompted the involvement of governmental, industrial and research organizations, as well as standardization entities, in order to create and promote a series of recommendations and standards for IACS cyber-security. Despite those efforts, which are mostly focused on prevention and mitigation, existing literature still lacks attack descriptions that can be reused to reproduce and further research specific use cases and scenarios of security incidents, useful for improving and developing new security detection strategies. In this paper, we describe the implementation of a set of attacks targeting a SCADA hybrid testbed that reproduces an electrical grid for energy distribution (medium and high voltage). This environment makes use of real SCADA equipment to faithfully reproduce a real operational deployment, providing a better insight into less evident SCADA- and device-specificities.
随着监控和数据采集(SCADA)以及工业和自动化控制系统(IACS)体系结构变得更加开放和互联,它们的一些远程控制过程也更容易受到网络威胁。诸如使用成熟技术和遗留设备,甚至连接IACS与外部网络的不可预见的后果等方面都造成了这种情况。这种情况促使政府、工业和研究组织以及标准化实体参与进来,以创建和推广IACS网络安全的一系列建议和标准。尽管这些努力主要集中在预防和缓解上,但现有文献仍然缺乏可重复使用的攻击描述,以再现和进一步研究安全事件的具体用例和场景,有助于改进和开发新的安全检测策略。在本文中,我们描述了一组针对SCADA混合试验台的攻击的实现,该试验台再现了用于能量分配(中高压)的电网。该环境利用真实的SCADA设备忠实地再现真实的操作部署,从而更好地了解不太明显的SCADA和设备特性。
{"title":"Attacking SCADA systems: A practical perspective","authors":"Luís Rosa, T. Cruz, P. Simões, E. Monteiro, Leonid Lev","doi":"10.23919/INM.2017.7987369","DOIUrl":"https://doi.org/10.23919/INM.2017.7987369","url":null,"abstract":"As Supervisory Control and Data Acquisition (SCADA) and Industrial and Automation Control System (IACS) architectures became more open and interconnected, some of their remotely controlled processes also became more exposed to cyber threats. Aspects such as the use of mature technologies and legacy equipment or even the unforeseen consequences of bridging IACS with external networks have contributed to this situation. This situation prompted the involvement of governmental, industrial and research organizations, as well as standardization entities, in order to create and promote a series of recommendations and standards for IACS cyber-security. Despite those efforts, which are mostly focused on prevention and mitigation, existing literature still lacks attack descriptions that can be reused to reproduce and further research specific use cases and scenarios of security incidents, useful for improving and developing new security detection strategies. In this paper, we describe the implementation of a set of attacks targeting a SCADA hybrid testbed that reproduces an electrical grid for energy distribution (medium and high voltage). This environment makes use of real SCADA equipment to faithfully reproduce a real operational deployment, providing a better insight into less evident SCADA- and device-specificities.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121410005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The application of Neural Networks to predicting the root cause of service failures 神经网络在服务故障根本原因预测中的应用
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987422
R. Harper, P. Tee
The principal objective when monitoring compute and communications infrastructure is to minimize the Mean Time To Resolution of service-impacting incidents. Key to achieving that goal is determining which of the many alerts that are presented to an operator are likely to be the root cause of an incident. In turn this is critical in identifying which alerts should be investigated with the highest priority.
监视计算和通信基础设施的主要目标是最小化影响服务的事件的平均解决时间。实现这一目标的关键是确定向操作员提供的众多警报中哪些可能是事件的根本原因。反过来,这对于确定应该以最高优先级调查哪些警报至关重要。
{"title":"The application of Neural Networks to predicting the root cause of service failures","authors":"R. Harper, P. Tee","doi":"10.23919/INM.2017.7987422","DOIUrl":"https://doi.org/10.23919/INM.2017.7987422","url":null,"abstract":"The principal objective when monitoring compute and communications infrastructure is to minimize the Mean Time To Resolution of service-impacting incidents. Key to achieving that goal is determining which of the many alerts that are presented to an operator are likely to be the root cause of an incident. In turn this is critical in identifying which alerts should be investigated with the highest priority.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124124912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ConMon: An automated container based network performance monitoring system common:基于自动化容器的网络性能监控系统
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987264
Farnaz Moradi, Christofer Flinta, A. Johnsson, C. Meirosu
The popularity of container technologies and their widespread usage for building microservices demands solutions dedicated for efficient monitoring of containers and their interactions. In this paper we present ConMon, an automated system for monitoring the network performance of container-based applications. It automatically identifies newly instantiated application containers and observes passively their traffic. Based on these observations, it configures and executes monitoring functions inside adjacent monitoring containers. The system adapts the monitoring containers to changes driven by either the application or the execution platform. The evaluation results validate the feasibility of the ConMon approach and illustrate its scalability in terms of low overhead on compute resources, moderate impact on applications, and negligible impact on the background network traffic.
容器技术的流行及其在构建微服务方面的广泛应用需要专门用于有效监控容器及其交互的解决方案。在本文中,我们介绍了common,一个用于监视基于容器的应用程序的网络性能的自动化系统。它自动识别新实例化的应用程序容器,并被动地观察它们的流量。根据这些观察结果,它在相邻的监视容器中配置和执行监视功能。系统使监视容器适应由应用程序或执行平台驱动的更改。评估结果验证了common方法的可行性,并说明了它在计算资源开销低、对应用程序的影响适中以及对后台网络流量的影响可以忽略不计方面的可扩展性。
{"title":"ConMon: An automated container based network performance monitoring system","authors":"Farnaz Moradi, Christofer Flinta, A. Johnsson, C. Meirosu","doi":"10.23919/INM.2017.7987264","DOIUrl":"https://doi.org/10.23919/INM.2017.7987264","url":null,"abstract":"The popularity of container technologies and their widespread usage for building microservices demands solutions dedicated for efficient monitoring of containers and their interactions. In this paper we present ConMon, an automated system for monitoring the network performance of container-based applications. It automatically identifies newly instantiated application containers and observes passively their traffic. Based on these observations, it configures and executes monitoring functions inside adjacent monitoring containers. The system adapts the monitoring containers to changes driven by either the application or the execution platform. The evaluation results validate the feasibility of the ConMon approach and illustrate its scalability in terms of low overhead on compute resources, moderate impact on applications, and negligible impact on the background network traffic.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123750386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
ETSO: End-To-End SFC Orchestration Framework ETSO:端到端SFC编排框架
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987405
Marouen Mechtri, Chaima Ghribi, Oussama Soualah, D. Zeghlache
This demo presents a SFC orchestrator that provides intelligent, dynamic and automated VNFs and network deployment over heterogeneous NFV and SDN enabled Cloud environments. The proposed architecture is based on the ETSI NFV reference architecture and TOSCA standards. In this demo, reliable VNF placement and chaining is ensured using the algorithm proposed in [1] “A Link Failure Recovery Algorithm For Virtual Network Function Chaining”.
这个演示展示了一个SFC编排器,它在异构的NFV和SDN支持的云环境中提供智能、动态和自动化的VNFs和网络部署。提出的体系结构基于ETSI NFV参考体系结构和TOSCA标准。在本演示中,使用[1]“用于虚拟网络功能链接的链路故障恢复算法”中提出的算法来确保可靠的VNF放置和链接。
{"title":"ETSO: End-To-End SFC Orchestration Framework","authors":"Marouen Mechtri, Chaima Ghribi, Oussama Soualah, D. Zeghlache","doi":"10.23919/INM.2017.7987405","DOIUrl":"https://doi.org/10.23919/INM.2017.7987405","url":null,"abstract":"This demo presents a SFC orchestrator that provides intelligent, dynamic and automated VNFs and network deployment over heterogeneous NFV and SDN enabled Cloud environments. The proposed architecture is based on the ETSI NFV reference architecture and TOSCA standards. In this demo, reliable VNF placement and chaining is ensured using the algorithm proposed in [1] “A Link Failure Recovery Algorithm For Virtual Network Function Chaining”.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131225715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-efficient resource allocation and provisioning for in-memory database clusters 内存数据库集群的高效资源分配和供应
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987260
Karsten Molka, G. Casale
Systems for processing large scale analytical workloads are increasingly moving from on-premise setups to on-demand configurations deployed on scalable cloud infrastructures. To reduce the cost of such infrastructures, existing research focuses on developing novel methods for workload and server consolidation. In this paper, we combine analytical modeling and non-linear optimization to help cloud providers increase the energy-efficiency of in-memory database clusters in cloud environments. We model this scenario as a multi-dimensional bin-packing problem and propose a new approach based on a hybrid genetic algorithm that efficiently handles resource allocation and server assignment for a given set of in-memory databases. Our trace-driven evaluation is based on measurements from an SAP HANA in-memory system and indicates improvements between 6% and 32% over the popular best-fit decreasing heuristic.
用于处理大规模分析工作负载的系统越来越多地从本地设置转向部署在可扩展云基础设施上的按需配置。为了降低这种基础设施的成本,现有的研究集中在开发工作负载和服务器整合的新方法上。在本文中,我们结合分析建模和非线性优化来帮助云提供商提高云环境中内存数据库集群的能源效率。我们将这种情况建模为多维装箱问题,并提出了一种基于混合遗传算法的新方法,该方法可以有效地处理给定的一组内存数据库的资源分配和服务器分配。我们的跟踪驱动评估基于SAP HANA内存系统的测量结果,表明与流行的最佳拟合递减启发式方法相比,改进幅度在6%到32%之间。
{"title":"Energy-efficient resource allocation and provisioning for in-memory database clusters","authors":"Karsten Molka, G. Casale","doi":"10.23919/INM.2017.7987260","DOIUrl":"https://doi.org/10.23919/INM.2017.7987260","url":null,"abstract":"Systems for processing large scale analytical workloads are increasingly moving from on-premise setups to on-demand configurations deployed on scalable cloud infrastructures. To reduce the cost of such infrastructures, existing research focuses on developing novel methods for workload and server consolidation. In this paper, we combine analytical modeling and non-linear optimization to help cloud providers increase the energy-efficiency of in-memory database clusters in cloud environments. We model this scenario as a multi-dimensional bin-packing problem and propose a new approach based on a hybrid genetic algorithm that efficiently handles resource allocation and server assignment for a given set of in-memory databases. Our trace-driven evaluation is based on measurements from an SAP HANA in-memory system and indicates improvements between 6% and 32% over the popular best-fit decreasing heuristic.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114147296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic cloud service placement for live video streaming with a remote-controlled drone 动态云服务放置实况视频流与遥控无人机
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987400
Florian Wamser, Frank Loh, Michael Seufert, P. Tran-Gia, R. Bruschi, P. Lago
In this demonstration we will show the prospects of dynamic cloud service placement. A cloud service is implemented that manages real-time video streaming and real-time control commands for a remote controlled drone. The requirements for this cloud service are groundbreaking because the image transfer and the control commands should be transmitted in real time that the drone can be controlled smoothly by a user. The goal is to improve user QoE for streaming services and real-time control by cloud service migrations, respecting the concept of dynamic Edge Computing by means of moving computing and monitoring applications on demand close to the user and the end device.
在本演示中,我们将展示动态云服务放置的前景。实现了一种云服务,用于管理远程控制无人机的实时视频流和实时控制命令。这种云服务的要求是开创性的,因为图像传输和控制命令应该实时传输,无人机可以由用户顺利控制。目标是通过云服务迁移来改善流媒体服务和实时控制的用户QoE,尊重动态边缘计算的概念,通过按需移动计算和监控应用程序,接近用户和终端设备。
{"title":"Dynamic cloud service placement for live video streaming with a remote-controlled drone","authors":"Florian Wamser, Frank Loh, Michael Seufert, P. Tran-Gia, R. Bruschi, P. Lago","doi":"10.23919/INM.2017.7987400","DOIUrl":"https://doi.org/10.23919/INM.2017.7987400","url":null,"abstract":"In this demonstration we will show the prospects of dynamic cloud service placement. A cloud service is implemented that manages real-time video streaming and real-time control commands for a remote controlled drone. The requirements for this cloud service are groundbreaking because the image transfer and the control commands should be transmitted in real time that the drone can be controlled smoothly by a user. The goal is to improve user QoE for streaming services and real-time control by cloud service migrations, respecting the concept of dynamic Edge Computing by means of moving computing and monitoring applications on demand close to the user and the end device.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133871303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Elastic, on-line and network aware Virtual Machine placement within a data center 弹性,在线和网络感知的虚拟机放置在数据中心内
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987261
Federico Larumbe, B. Sansò
This article presents a new model and a resolution algorithm, based on Tabu Search, for the assignment of Virtual Machines (VMs) to servers in a data center. We propose a Mixed Integer Programming (MIP) model that optimizes the Quality of Service (QoS) and power consumption of applications, taking into account their communication traffic and dynamic aspects. A hierarchic method and a Tabu Search heuristic that considers the network topology are developed to solve cases with realistic sizes—e.g., a data center with 1600 servers per pod, for up to 128,000 total servers—. The method specifically considers the optimal mapping of the application graph into the data center network. The proposed scheduler is compared with 1) a static method that does not consider workload variations, and 2) the first-fit policy as a sample of methods that do not consider communication traffic among VMs.
本文提出了一种基于禁忌搜索的数据中心虚拟机分配模型和求解算法。我们提出了一个混合整数规划(MIP)模型,该模型考虑到应用程序的通信流量和动态方面,优化了应用程序的服务质量(QoS)和功耗。提出了一种考虑网络拓扑结构的分层方法和禁忌搜索启发式方法来解决具有实际尺寸的情况。一个数据中心,每个pod有1600台服务器,总共多达128000台服务器。该方法特别考虑了应用程序图到数据中心网络的最佳映射。将提出的调度器与1)不考虑工作负载变化的静态方法和2)作为不考虑虚拟机之间通信流量的方法样本的首拟合策略进行比较。
{"title":"Elastic, on-line and network aware Virtual Machine placement within a data center","authors":"Federico Larumbe, B. Sansò","doi":"10.23919/INM.2017.7987261","DOIUrl":"https://doi.org/10.23919/INM.2017.7987261","url":null,"abstract":"This article presents a new model and a resolution algorithm, based on Tabu Search, for the assignment of Virtual Machines (VMs) to servers in a data center. We propose a Mixed Integer Programming (MIP) model that optimizes the Quality of Service (QoS) and power consumption of applications, taking into account their communication traffic and dynamic aspects. A hierarchic method and a Tabu Search heuristic that considers the network topology are developed to solve cases with realistic sizes—e.g., a data center with 1600 servers per pod, for up to 128,000 total servers—. The method specifically considers the optimal mapping of the application graph into the data center network. The proposed scheduler is compared with 1) a static method that does not consider workload variations, and 2) the first-fit policy as a sample of methods that do not consider communication traffic among VMs.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130370210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Blockchains everywhere - a use-case of blockchains in the pharma supply-chain 区块链无处不在——区块链在制药供应链中的一个用例
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987376
T. Bocek, B. Rodrigues, T. Strasser, B. Stiller
Blockchains are on the top of the Gartner Hype Cycle 2016 and many start-ups are integrating blockchains into their technology portfolio. While blockchains have emerged in the context of financial applications, non-financial application areas are of interest as well. In this paper, modum.io is presented, a start-up that uses IoT (Internet of Things) sensor devices leveraging blockchain technology to assert data immutability and public accessibility of temperature records, while reducing operational costs in the pharmaceutical supply-chain. The medical industry has many complex and strict environmental control process (e.g., temperature and humidity) to ensure quality control and regulatory compliance over the transport of medical products. The sensor devices monitor the temperature of each parcel during the shipment to fully ensure GDP regulations. All data is transferred to the blockchain where a smart contract assesses against the product attributes. As modum.io is not the only non-financial start-up working with blockchains, a list of areas and other start-ups is provided that aim to reduce bureaucracy, distribute the infrastructure, and saving costs using blockchains.
区块链处于Gartner Hype Cycle 2016的顶端,许多初创企业正在将区块链整合到他们的技术组合中。虽然区块链已经出现在金融应用的背景下,但非金融应用领域也引起了人们的兴趣。在本文中,调制解调器。这是一家利用区块链技术使用IoT(物联网)传感器设备来断言数据不变性和温度记录的公共可访问性的初创企业,同时降低了制药供应链的运营成本。医疗行业有许多复杂而严格的环境控制过程(例如,温度和湿度),以确保医疗产品运输的质量控制和法规遵从性。传感器设备在运输过程中监测每个包裹的温度,以完全确保GDP法规。所有数据都传输到区块链,智能合约根据产品属性进行评估。modum。IO并不是唯一一家使用区块链的非金融初创企业,它提供了一系列领域和其他初创企业,旨在减少官僚主义,分配基础设施,并使用区块链节省成本。
{"title":"Blockchains everywhere - a use-case of blockchains in the pharma supply-chain","authors":"T. Bocek, B. Rodrigues, T. Strasser, B. Stiller","doi":"10.23919/INM.2017.7987376","DOIUrl":"https://doi.org/10.23919/INM.2017.7987376","url":null,"abstract":"Blockchains are on the top of the Gartner Hype Cycle 2016 and many start-ups are integrating blockchains into their technology portfolio. While blockchains have emerged in the context of financial applications, non-financial application areas are of interest as well. In this paper, modum.io is presented, a start-up that uses IoT (Internet of Things) sensor devices leveraging blockchain technology to assert data immutability and public accessibility of temperature records, while reducing operational costs in the pharmaceutical supply-chain. The medical industry has many complex and strict environmental control process (e.g., temperature and humidity) to ensure quality control and regulatory compliance over the transport of medical products. The sensor devices monitor the temperature of each parcel during the shipment to fully ensure GDP regulations. All data is transferred to the blockchain where a smart contract assesses against the product attributes. As modum.io is not the only non-financial start-up working with blockchains, a list of areas and other start-ups is provided that aim to reduce bureaucracy, distribute the infrastructure, and saving costs using blockchains.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121165551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 401
Tag-and-Forward: A source-routing enabled data plane for OpenFlow Fat-Tree Networks 标签转发:OpenFlow胖树网络的源路由数据平面
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987413
Airton Ishimori, E. Cerqueira, A. Abelém
Software-Defined Networking (SDN) has turned the Data Center Network (DCN) environment into a more flexible one by decoupling control plane from data plane, allowing an innovative and easily extensible network management solutions. Nowadays, OpenFlow is the most successful protocol for SDN. However, SDN based on OpenFlow protocol presents performance issues on forwarding table increasing and packet match cost. Our proposal named Tag-and-Forward (TF) is a data plane that reduces the number of flow table required in the Fat-Tree software-defined DCNs to optimize forwarding. The results noticebly outperformed RTT and packet transmission rate when compared to usual OpenFlow data plane.
软件定义网络(SDN)通过将控制平面与数据平面解耦,使数据中心网络(DCN)环境变得更加灵活,从而提供创新且易于扩展的网络管理解决方案。目前,OpenFlow是最成功的SDN协议。然而,基于OpenFlow协议的SDN存在转发表增加和数据包匹配成本等性能问题。我们提出的标签转发(Tag-and-Forward, TF)是一种数据平面,它减少了Fat-Tree软件定义的dcn中优化转发所需的流表数量。与通常的OpenFlow数据平面相比,结果明显优于RTT和分组传输速率。
{"title":"Tag-and-Forward: A source-routing enabled data plane for OpenFlow Fat-Tree Networks","authors":"Airton Ishimori, E. Cerqueira, A. Abelém","doi":"10.23919/INM.2017.7987413","DOIUrl":"https://doi.org/10.23919/INM.2017.7987413","url":null,"abstract":"Software-Defined Networking (SDN) has turned the Data Center Network (DCN) environment into a more flexible one by decoupling control plane from data plane, allowing an innovative and easily extensible network management solutions. Nowadays, OpenFlow is the most successful protocol for SDN. However, SDN based on OpenFlow protocol presents performance issues on forwarding table increasing and packet match cost. Our proposal named Tag-and-Forward (TF) is a data plane that reduces the number of flow table required in the Fat-Tree software-defined DCNs to optimize forwarding. The results noticebly outperformed RTT and packet transmission rate when compared to usual OpenFlow data plane.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131391729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1