首页 > 最新文献

2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)最新文献

英文 中文
Predictive modeling and scalability analysis for large graph analytics 大型图形分析的预测建模和可扩展性分析
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987265
Sourav Medya, L. Cherkasova, Ambuj K. Singh
Many HPC and modern large graph processing applications belong to a class of scale-out applications, where the application dataset is partitioned and processed by a cluster of machines. Assessing the application scalability is one of the primary goals during such application implementation. Typically, in the design phase, programmers are limited by a small size cluster available for their experiments. Therefore, predictive modeling is required for the analysis of the application scalability and its performance in a larger cluster. While in an increased size cluster, each node will process a smaller portion of the original dataset, a higher communication volume between a larger number of nodes may cripple the application scalability and provide diminishing performance benefits. One of the main challenges is the analysis of bandwidth demands due to an increased communication volume in a larger size cluster. In this paper1, we introduce a novel regression-based approach to assess the scalability and performance of a distributed memory program for execution in a large-scale cluster. Our solution involves 1) a limited set of traditional experiments performed in a small size cluster and 2) an additional set of similar experiments performed with an “interconnect bandwidth throttling” tool, which exposes the bandwidth impact on the application performance. These measurements are used in creating an ensemble of analytical models for performance and scalability analysis. Using a linear regression approach, step by step, we incorporate into the model the following important parameters: i) the number of cluster nodes and application processes, ii) the dataset size, and iii) interconnect bandwidth. We demonstrate our solution, its power, and accuracy using a popular Graph500 benchmark, which implements a Breadth First Search algorithm on large, synthetically generated graphs. By utilizing measurements collected in a 32-node cluster, we are able to project the program performance in a large size cluster with hundreds of nodes. The proposed approach and derived models help to provide an early feedback to programmers on the scalability and efficiency of their solution.
许多HPC和现代大型图形处理应用程序属于横向扩展应用程序的一类,其中应用程序数据集由机器集群进行分区和处理。评估应用程序的可伸缩性是此类应用程序实现期间的主要目标之一。通常,在设计阶段,程序员受限于可用于实验的小型集群。因此,在更大的集群中,需要对应用程序的可伸缩性及其性能进行预测建模分析。虽然在规模增加的集群中,每个节点将处理原始数据集的较小部分,但大量节点之间较高的通信量可能会削弱应用程序的可伸缩性,并减少性能优势。其中一个主要挑战是分析由于更大规模集群中通信量增加而导致的带宽需求。在本文中,我们介绍了一种新的基于回归的方法来评估分布式内存程序在大规模集群中执行的可伸缩性和性能。我们的解决方案包括:1)在小型集群中执行一组有限的传统实验;2)使用“互连带宽节流”工具执行一组额外的类似实验,该工具暴露了带宽对应用程序性能的影响。这些度量用于创建用于性能和可伸缩性分析的分析模型集合。使用线性回归方法,我们一步一步地将以下重要参数纳入模型:i)集群节点和应用程序进程的数量,ii)数据集大小,以及iii)互连带宽。我们使用流行的Graph500基准来演示我们的解决方案,它的功能和准确性,该基准在大型合成图上实现了广度优先搜索算法。通过利用在32个节点集群中收集的测量数据,我们能够在具有数百个节点的大型集群中预测程序性能。建议的方法和派生的模型有助于向程序员提供关于其解决方案的可伸缩性和效率的早期反馈。
{"title":"Predictive modeling and scalability analysis for large graph analytics","authors":"Sourav Medya, L. Cherkasova, Ambuj K. Singh","doi":"10.23919/INM.2017.7987265","DOIUrl":"https://doi.org/10.23919/INM.2017.7987265","url":null,"abstract":"Many HPC and modern large graph processing applications belong to a class of scale-out applications, where the application dataset is partitioned and processed by a cluster of machines. Assessing the application scalability is one of the primary goals during such application implementation. Typically, in the design phase, programmers are limited by a small size cluster available for their experiments. Therefore, predictive modeling is required for the analysis of the application scalability and its performance in a larger cluster. While in an increased size cluster, each node will process a smaller portion of the original dataset, a higher communication volume between a larger number of nodes may cripple the application scalability and provide diminishing performance benefits. One of the main challenges is the analysis of bandwidth demands due to an increased communication volume in a larger size cluster. In this paper1, we introduce a novel regression-based approach to assess the scalability and performance of a distributed memory program for execution in a large-scale cluster. Our solution involves 1) a limited set of traditional experiments performed in a small size cluster and 2) an additional set of similar experiments performed with an “interconnect bandwidth throttling” tool, which exposes the bandwidth impact on the application performance. These measurements are used in creating an ensemble of analytical models for performance and scalability analysis. Using a linear regression approach, step by step, we incorporate into the model the following important parameters: i) the number of cluster nodes and application processes, ii) the dataset size, and iii) interconnect bandwidth. We demonstrate our solution, its power, and accuracy using a popular Graph500 benchmark, which implements a Breadth First Search algorithm on large, synthetically generated graphs. By utilizing measurements collected in a 32-node cluster, we are able to project the program performance in a large size cluster with hundreds of nodes. The proposed approach and derived models help to provide an early feedback to programmers on the scalability and efficiency of their solution.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115902421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of self-managing applications on cloud using overlay networks 使用覆盖网络在云上实现自管理应用程序
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987389
Nasim Beigi Mohammadi, Hamzeh Khazaei, Mark Shtern, C. Barna, Marin Litoiu
In this paper, we present an architecture and implementation for self-managing cloud application using overlay networks and software defined networking (SDN). Through real world experiments on Amazon EC2 and Smart Applications on Virtual Infrastructure (SAVI) cloud, we demonstrate how our management mechanism autonomously maintains SLAs of application scenarios without provisioning extra resources.
在本文中,我们提出了一种使用覆盖网络和软件定义网络(SDN)的自管理云应用程序的架构和实现。通过在Amazon EC2和虚拟基础设施(SAVI)云上的智能应用程序上的实际实验,我们演示了我们的管理机制如何在不提供额外资源的情况下自主维护应用程序场景的sla。
{"title":"Implementation of self-managing applications on cloud using overlay networks","authors":"Nasim Beigi Mohammadi, Hamzeh Khazaei, Mark Shtern, C. Barna, Marin Litoiu","doi":"10.23919/INM.2017.7987389","DOIUrl":"https://doi.org/10.23919/INM.2017.7987389","url":null,"abstract":"In this paper, we present an architecture and implementation for self-managing cloud application using overlay networks and software defined networking (SDN). Through real world experiments on Amazon EC2 and Smart Applications on Virtual Infrastructure (SAVI) cloud, we demonstrate how our management mechanism autonomously maintains SLAs of application scenarios without provisioning extra resources.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"346 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124265403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring the network monitoring system: Anomaly Detection using pattern recognition 监控网络监控系统:利用模式识别进行异常检测
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987418
Maha Mdini, Alberto Blanc, G. Simon, Jerome Barotin, Julien Lecoeuvre
For a successful and efficient network supervision, an Anomaly Detection System is essential. In this paper, our goal is to develop a simple, practical, and application-domain specific approach to identify anomalies in the input/output data of network probes. Since data are periodic and continuously evolving, it is not possible to use threshold-based approaches. We propose an algorithm based on pattern recognition to help mobile operators detect anomalies in real time. The algorithm is unsupervised and easily configurable with a small number of tuning parameters. After weeks of deployment in a production network monitoring system, we obtain satisfactory results: we detect major anomalies with low error rate.
异常检测系统是一个成功、高效的网络监控系统。在本文中,我们的目标是开发一种简单、实用和特定于应用领域的方法来识别网络探针输入/输出数据中的异常。由于数据是周期性和不断发展的,因此不可能使用基于阈值的方法。我们提出了一种基于模式识别的算法来帮助移动运营商实时检测异常。该算法是无监督的,并且易于配置,只需少量的调优参数。经过数周的生产网络监控系统部署,我们获得了令人满意的结果:我们以低错误率检测到重大异常。
{"title":"Monitoring the network monitoring system: Anomaly Detection using pattern recognition","authors":"Maha Mdini, Alberto Blanc, G. Simon, Jerome Barotin, Julien Lecoeuvre","doi":"10.23919/INM.2017.7987418","DOIUrl":"https://doi.org/10.23919/INM.2017.7987418","url":null,"abstract":"For a successful and efficient network supervision, an Anomaly Detection System is essential. In this paper, our goal is to develop a simple, practical, and application-domain specific approach to identify anomalies in the input/output data of network probes. Since data are periodic and continuously evolving, it is not possible to use threshold-based approaches. We propose an algorithm based on pattern recognition to help mobile operators detect anomalies in real time. The algorithm is unsupervised and easily configurable with a small number of tuning parameters. After weeks of deployment in a production network monitoring system, we obtain satisfactory results: we detect major anomalies with low error rate.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124398379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adaptive auto-scaling for virtual resources in software-defined infrastructure 软件定义基础设施中虚拟资源的自适应自动缩放
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987326
Morteza Moghaddassian, H. Bannazadeh, A. Leon-Garcia
Auto-scaling is a key challenge and benefit in cloud computing infrastructures where applications are deployed on one or more virtual machines (VMs) to balance efficiency in use against delivered performance. In different scenarios, there may be a need for either horizontal or vertical scaling. Therefore, scaling is an important operation of cloud management systems. One way to enable scaling as an automated service is to use a model to predict the VM's future state as a function of time. However, this method is not completely feasible, because the performance of a VM is so dynamic and depends on many parameters. A simpler approach to enable auto-scaling is to use real-time utilization data of VM's and a set of fixed thresholds to execute scaling when thresholds are crossed. However, this method is prone to false positive decisions. Uses this paper, we propose an adaptive method that uses threshold-based mechanisms to control the auto-scaling process and leverages the accuracy and precision given by threshold-based methods to reduce the number of false positives. We present performance results, comparing the fixed threshold methods with our proposed method. We show that our method frequently correctly triggers scaling process in situations where fixed threshold based measurement methods fail.
在云计算基础设施中,应用程序部署在一个或多个虚拟机(vm)上,以平衡使用效率和交付性能,自动伸缩是一个关键的挑战和优势。在不同的场景中,可能需要水平或垂直缩放。因此,扩容是云管理系统的重要操作。将扩展作为自动化服务的一种方法是使用一个模型来预测虚拟机的未来状态作为时间的函数。但是,这种方法并不完全可行,因为虚拟机的性能是动态的,并且取决于许多参数。启用自动伸缩的一种更简单的方法是使用虚拟机的实时利用率数据和一组固定阈值,在超过阈值时执行伸缩。然而,这种方法容易产生误报。在本文中,我们提出了一种自适应方法,该方法使用基于阈值的机制来控制自动缩放过程,并利用基于阈值的方法给出的准确性和精度来减少误报的数量。我们给出了性能结果,将固定阈值方法与我们提出的方法进行了比较。我们表明,在基于固定阈值的测量方法失败的情况下,我们的方法经常正确地触发缩放过程。
{"title":"Adaptive auto-scaling for virtual resources in software-defined infrastructure","authors":"Morteza Moghaddassian, H. Bannazadeh, A. Leon-Garcia","doi":"10.23919/INM.2017.7987326","DOIUrl":"https://doi.org/10.23919/INM.2017.7987326","url":null,"abstract":"Auto-scaling is a key challenge and benefit in cloud computing infrastructures where applications are deployed on one or more virtual machines (VMs) to balance efficiency in use against delivered performance. In different scenarios, there may be a need for either horizontal or vertical scaling. Therefore, scaling is an important operation of cloud management systems. One way to enable scaling as an automated service is to use a model to predict the VM's future state as a function of time. However, this method is not completely feasible, because the performance of a VM is so dynamic and depends on many parameters. A simpler approach to enable auto-scaling is to use real-time utilization data of VM's and a set of fixed thresholds to execute scaling when thresholds are crossed. However, this method is prone to false positive decisions. Uses this paper, we propose an adaptive method that uses threshold-based mechanisms to control the auto-scaling process and leverages the accuracy and precision given by threshold-based methods to reduce the number of false positives. We present performance results, comparing the fixed threshold methods with our proposed method. We show that our method frequently correctly triggers scaling process in situations where fixed threshold based measurement methods fail.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Framework to monitor pregnant women with a high risk of premature labour using sensor networks 利用传感器网络监测高危早产孕妇的框架
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987458
Hisham Allahem, S. Sampalli
Premature birth is the leading cause of death in children under 5 years. Furthermore, surviving children can have a lifetime of disability such as hearing and vision loss or learning difficulties. Research suggests that monitoring uterine contractions can help in evaluating the health and progress of pregnancy, and also determine if the pregnant woman is in labour, and consequently mitigate the effects of premature labour. In this paper, we propose a safe, simple and low-cost system to monitor pregnant women who are at high risk of premature labour. Our system consists of a wireless body sensor network to non-invasively monitor the uterine contractions and trigger a warning via a smartphone if the readings are outside the normal thresholds. We have designed a proof-of-concept prototype and tested it for reliability, performance and power consumption.
早产是5岁以下儿童死亡的主要原因。此外,幸存下来的儿童可能终身残疾,如听力和视力丧失或学习困难。研究表明,监测子宫收缩有助于评估妊娠的健康状况和进展情况,也有助于确定孕妇是否处于分娩状态,从而减轻早产的影响。在本文中,我们提出了一种安全、简单、低成本的监测高危孕妇早产的系统。我们的系统包括一个无线身体传感器网络,可以无创地监测子宫收缩,如果读数超出正常阈值,就会通过智能手机发出警告。我们设计了一个概念验证原型,并对其可靠性、性能和功耗进行了测试。
{"title":"Framework to monitor pregnant women with a high risk of premature labour using sensor networks","authors":"Hisham Allahem, S. Sampalli","doi":"10.23919/INM.2017.7987458","DOIUrl":"https://doi.org/10.23919/INM.2017.7987458","url":null,"abstract":"Premature birth is the leading cause of death in children under 5 years. Furthermore, surviving children can have a lifetime of disability such as hearing and vision loss or learning difficulties. Research suggests that monitoring uterine contractions can help in evaluating the health and progress of pregnancy, and also determine if the pregnant woman is in labour, and consequently mitigate the effects of premature labour. In this paper, we propose a safe, simple and low-cost system to monitor pregnant women who are at high risk of premature labour. Our system consists of a wireless body sensor network to non-invasively monitor the uterine contractions and trigger a warning via a smartphone if the readings are outside the normal thresholds. We have designed a proof-of-concept prototype and tested it for reliability, performance and power consumption.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115036964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Network virtualization for Mobile Operators in Software-Defined based LTE networks 基于软件定义的LTE网络中移动运营商的网络虚拟化
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987334
Omer Narmanlioglu, E. Zeydan
In this paper, we propose a novel cellular network architecture including network virtualization controller for mobile core and backhaul sharing. Software-Defined Networking (SDN) based network virtualization is applied into Evolved Packet System (EPS) architecture of Long Term Evolution (LTE) networks. After virtualization of all evolved Node-Bs (eNodeBs) associated with different Mobile Operators (MOs) as a consequence of mobile core and backhaul sharing, the performances of eNodeB assignment mechanisms with the use of quality-of-service (QoS)-aware and QoS-unaware scheduling algorithms are investigated and compared with currently deployed static eNodeB distributions through Monte-Carlo simulations. Jain's fairness index, Shannon capacity and satisfied-MO-ratio are considered as the key performance indicators (KPIs). The results reveal that our proposed architecture outperforms the currently deployed network architecture as depending on proper scheduler selection.
本文提出了一种新的蜂窝网络架构,包括移动核心网络虚拟化控制器和回程共享。基于软件定义网络(SDN)的网络虚拟化技术被应用到LTE (Long Term Evolution)网络的EPS (Evolved Packet System)架构中。作为移动核心和回程共享的结果,对与不同移动运营商(MOs)相关的所有进化节点b (eNodeB)进行虚拟化后,研究了使用服务质量(QoS)感知和QoS不感知调度算法的eNodeB分配机制的性能,并通过蒙特卡洛模拟与当前部署的静态eNodeB分布进行了比较。将Jain公平性指数、Shannon容量和满足mo -ratio作为关键绩效指标。结果表明,我们提出的体系结构优于当前部署的网络体系结构,这取决于适当的调度程序选择。
{"title":"Network virtualization for Mobile Operators in Software-Defined based LTE networks","authors":"Omer Narmanlioglu, E. Zeydan","doi":"10.23919/INM.2017.7987334","DOIUrl":"https://doi.org/10.23919/INM.2017.7987334","url":null,"abstract":"In this paper, we propose a novel cellular network architecture including network virtualization controller for mobile core and backhaul sharing. Software-Defined Networking (SDN) based network virtualization is applied into Evolved Packet System (EPS) architecture of Long Term Evolution (LTE) networks. After virtualization of all evolved Node-Bs (eNodeBs) associated with different Mobile Operators (MOs) as a consequence of mobile core and backhaul sharing, the performances of eNodeB assignment mechanisms with the use of quality-of-service (QoS)-aware and QoS-unaware scheduling algorithms are investigated and compared with currently deployed static eNodeB distributions through Monte-Carlo simulations. Jain's fairness index, Shannon capacity and satisfied-MO-ratio are considered as the key performance indicators (KPIs). The results reveal that our proposed architecture outperforms the currently deployed network architecture as depending on proper scheduler selection.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IP multicast in virtualized data centers: Challenges and opportunities 虚拟化数据中心中的IP多播:挑战与机遇
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987305
O. Komolafe
The increasing volume and importance of point-to-multipoint traffic in virtualized data centers means the deployment of IP multicast is increasingly attractive. However, concerns about the ability of switches and routers based on commodity hardware to support the conventional IP multicast control plane and data plane, especially when there are thousands of participants in the multicast group communication, results in the infrequent deployment of IP multicast in data centers. This paper discusses the evolution of data center architectures towards the virtualized architectures in which technologies such as VXLAN, VXLAN-GPE, GENEVE, STT and NVGRE are used to build emulated Layer 2 networks that will support multi-tenancy at scale. These technologies are described and compared in terms of a number of factors, with emphasis laid on the manner in which they support multicast. Lastly, innovative approaches that have been proposed to circumvent the obstacles to deploying multicast in the data center IP fabric are also discussed and evaluated.
虚拟化数据中心中点对多点流量的增长和重要性意味着IP组播的部署越来越有吸引力。然而,考虑到基于商用硬件的交换机和路由器是否能够支持传统的IP组播控制平面和数据平面,特别是当组播组通信中有数千个参与者时,导致IP组播在数据中心的部署很少。本文讨论了数据中心体系结构向虚拟化体系结构的演变,其中使用VXLAN、VXLAN- gpe、GENEVE、STT和NVGRE等技术构建可大规模支持多租户的模拟第二层网络。这些技术根据许多因素进行描述和比较,重点放在它们支持多播的方式上。最后,还讨论和评估了一些创新的方法,这些方法可以绕过在数据中心IP结构中部署多播的障碍。
{"title":"IP multicast in virtualized data centers: Challenges and opportunities","authors":"O. Komolafe","doi":"10.23919/INM.2017.7987305","DOIUrl":"https://doi.org/10.23919/INM.2017.7987305","url":null,"abstract":"The increasing volume and importance of point-to-multipoint traffic in virtualized data centers means the deployment of IP multicast is increasingly attractive. However, concerns about the ability of switches and routers based on commodity hardware to support the conventional IP multicast control plane and data plane, especially when there are thousands of participants in the multicast group communication, results in the infrequent deployment of IP multicast in data centers. This paper discusses the evolution of data center architectures towards the virtualized architectures in which technologies such as VXLAN, VXLAN-GPE, GENEVE, STT and NVGRE are used to build emulated Layer 2 networks that will support multi-tenancy at scale. These technologies are described and compared in terms of a number of factors, with emphasis laid on the manner in which they support multicast. Lastly, innovative approaches that have been proposed to circumvent the obstacles to deploying multicast in the data center IP fabric are also discussed and evaluated.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A scalable approach for managing access control in Information Centric Networks 一种在信息中心网络中管理访问控制的可伸缩方法
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987268
Rafael Hansen da Silva, Weverton Cordeiro, L. Gaspary
One of the main challenges in Information Centric Networks (ICN) is providing access control to content publication and retrieval. Most of the existing approaches often consider a single user acting as publisher within a group. When dealing with multiple publishers, they may lead to a combinatorial explosion of cryptographic keys. Approaches that focus on multiple publishers, on the other hand, rely on specific network architectures and/or changes to operate. In this paper we propose a novel solution, supported by attribute-based encryption, for managing content access control. In our solution, we introduce secure content distribution groups, in which any member user can publish to and retrieve from. Unlike previous work, our solution keeps the number of cryptographic keys proportional to the number of group members, and may even be adopted gradually in any ICN architecture. The proposed solution is evaluated with respect to the overhead it imposes, number of required keys, and efficiency of content dissemination. In contrast to existing approaches, it offers higher access control flexibility, while reducing key management process complexity (in some scenarios, resulting in 97% less keys and objects in the network).
信息中心网络(ICN)的主要挑战之一是提供对内容发布和检索的访问控制。大多数现有的方法通常考虑一个用户作为组中的发布者。当处理多个发布者时,它们可能导致加密密钥的组合爆炸。另一方面,专注于多个发布者的方法依赖于特定的网络架构和/或变化来运行。在本文中,我们提出了一种新的解决方案,支持基于属性的加密来管理内容访问控制。在我们的解决方案中,我们引入了安全的内容分发组,任何成员用户都可以向其中发布内容并从中检索。与以前的工作不同,我们的解决方案使加密密钥的数量与组成员的数量成正比,甚至可以在任何ICN架构中逐步采用。根据所提出的解决方案所带来的开销、所需密钥的数量和内容分发的效率对其进行评估。与现有方法相比,它提供了更高的访问控制灵活性,同时降低了密钥管理过程的复杂性(在某些情况下,网络中的密钥和对象减少了97%)。
{"title":"A scalable approach for managing access control in Information Centric Networks","authors":"Rafael Hansen da Silva, Weverton Cordeiro, L. Gaspary","doi":"10.23919/INM.2017.7987268","DOIUrl":"https://doi.org/10.23919/INM.2017.7987268","url":null,"abstract":"One of the main challenges in Information Centric Networks (ICN) is providing access control to content publication and retrieval. Most of the existing approaches often consider a single user acting as publisher within a group. When dealing with multiple publishers, they may lead to a combinatorial explosion of cryptographic keys. Approaches that focus on multiple publishers, on the other hand, rely on specific network architectures and/or changes to operate. In this paper we propose a novel solution, supported by attribute-based encryption, for managing content access control. In our solution, we introduce secure content distribution groups, in which any member user can publish to and retrieve from. Unlike previous work, our solution keeps the number of cryptographic keys proportional to the number of group members, and may even be adopted gradually in any ICN architecture. The proposed solution is evaluated with respect to the overhead it imposes, number of required keys, and efficiency of content dissemination. In contrast to existing approaches, it offers higher access control flexibility, while reducing key management process complexity (in some scenarios, resulting in 97% less keys and objects in the network).","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129365762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm 雾云计算范式中物联网应用模块的资源感知放置
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987464
Mohit Taneja, A. Davy
With the evolving IoT scenario, computing has spread to the most minuscule everyday activities, leading to a momentous shift in the way applications are developed and deployed. With the volume of impact increasing exponentially, a coherent approach of deploying these applications is critical for an efficient utilization of the network infrastructure. A typical IoT application consists of various modules running together with active interdependencies; traditionally running on the Cloud hosted in global data centres. In this paper, we present a Module Mapping Algorithm for efficient utilization of resources in the network infrastructure by efficiently deploying Application Modules in Fog-Cloud Infrastructure for IoT based applications. With Fog computing into picture, computation is dynamically distributed across the Fog and Cloud layer, and the modules of an application can thus be deployed closer to the source on devices in the Fog layer. The result of this work can serve as a Micro-benchmark in studies/research related with IoT and Fog Computing, and can be used for Quality of Service (QoS) and Service Level Objective benchmarking for IoT applications. The approach is generic, and applies to a wide range of standardized IoT applications over varied network topologies irrespective of load.
随着物联网场景的不断发展,计算已经扩展到最微小的日常活动,导致应用程序开发和部署方式的重大转变。随着影响的数量呈指数级增长,部署这些应用程序的一致方法对于有效利用网络基础设施至关重要。典型的物联网应用程序由各种模块组成,这些模块具有积极的相互依赖性;传统上运行在托管于全球数据中心的云上。在本文中,我们提出了一种模块映射算法,通过在基于物联网的应用中高效地部署雾云基础设施中的应用模块来有效利用网络基础设施中的资源。随着雾计算进入画面,计算在雾层和云层之间动态分布,应用程序的模块因此可以部署在雾层中离源更近的设备上。这项工作的结果可以作为与物联网和雾计算相关的研究/研究中的微基准,并可用于物联网应用的服务质量(QoS)和服务水平目标基准。该方法是通用的,适用于各种网络拓扑结构上的各种标准化物联网应用,无论负载如何。
{"title":"Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm","authors":"Mohit Taneja, A. Davy","doi":"10.23919/INM.2017.7987464","DOIUrl":"https://doi.org/10.23919/INM.2017.7987464","url":null,"abstract":"With the evolving IoT scenario, computing has spread to the most minuscule everyday activities, leading to a momentous shift in the way applications are developed and deployed. With the volume of impact increasing exponentially, a coherent approach of deploying these applications is critical for an efficient utilization of the network infrastructure. A typical IoT application consists of various modules running together with active interdependencies; traditionally running on the Cloud hosted in global data centres. In this paper, we present a Module Mapping Algorithm for efficient utilization of resources in the network infrastructure by efficiently deploying Application Modules in Fog-Cloud Infrastructure for IoT based applications. With Fog computing into picture, computation is dynamically distributed across the Fog and Cloud layer, and the modules of an application can thus be deployed closer to the source on devices in the Fog layer. The result of this work can serve as a Micro-benchmark in studies/research related with IoT and Fog Computing, and can be used for Quality of Service (QoS) and Service Level Objective benchmarking for IoT applications. The approach is generic, and applies to a wide range of standardized IoT applications over varied network topologies irrespective of load.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130000569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 274
SDN-based transparent flow scheduling for heterogeneous wireless LANs 基于sdn的异构无线局域网透明流调度
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987404
Tom De Schepper, Patrick Bosch, Ensar Zeljković, Koen De Schepper, Chris Hawinkel, Steven Latré, J. Famaey
The current local area networks (LANs) are occupied by a large variety of heterogeneous consumer devices, equipped with the ability to connect to the Internet using a variety of different network technologies (e.g., Ethernet, 2.4 and 5GHz Wi-Fi). Nevertheless, devices generally opt to statically connect using a single technology, based on predefined priorities. This static behaviour does not allow the network to unlock its full potential, which becomes increasingly more important as the requirements of services, in terms of latency and throughput, grow. In this paper we present a real-life SDN-based implementation of our previously proposed algorithm that addresses this problem.
当前的局域网(LANs)被各种各样的异构消费设备所占据,这些设备具有使用各种不同的网络技术(例如以太网、2.4 ghz和5GHz Wi-Fi)连接到Internet的能力。然而,设备通常选择使用基于预定义优先级的单一技术进行静态连接。这种静态行为不允许网络释放其全部潜力,随着服务需求(在延迟和吞吐量方面)的增长,这一点变得越来越重要。在本文中,我们提出了一个现实生活中基于sdn的实现,我们之前提出的算法解决了这个问题。
{"title":"SDN-based transparent flow scheduling for heterogeneous wireless LANs","authors":"Tom De Schepper, Patrick Bosch, Ensar Zeljković, Koen De Schepper, Chris Hawinkel, Steven Latré, J. Famaey","doi":"10.23919/INM.2017.7987404","DOIUrl":"https://doi.org/10.23919/INM.2017.7987404","url":null,"abstract":"The current local area networks (LANs) are occupied by a large variety of heterogeneous consumer devices, equipped with the ability to connect to the Internet using a variety of different network technologies (e.g., Ethernet, 2.4 and 5GHz Wi-Fi). Nevertheless, devices generally opt to statically connect using a single technology, based on predefined priorities. This static behaviour does not allow the network to unlock its full potential, which becomes increasingly more important as the requirements of services, in terms of latency and throughput, grow. In this paper we present a real-life SDN-based implementation of our previously proposed algorithm that addresses this problem.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129146690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1