首页 > 最新文献

2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)最新文献

英文 中文
Software-defined traffic load balancing for cost-effective data center interconnection service 软件定义流量负载均衡,实现经济高效的数据中心互连服务
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987287
Young-Jin Kim, J. Simsarian, M. Thottan
For interconnection between geographically-separated data centers, network carriers typically implement multiple optical paths in a wide-area network. For example, when transmission wavelengths have 100 Gb/s granularity, three 100 Gb/s wavelength paths are provisioned to satisfy a customer demand of 300 Gb/s. Over the multiple provisioned paths, interconnection traffic is typically distributed using per-flow hashing, which results in an uneven distribution of traffic caused by hash collisions. For a relatively-few number of high-bandwidth traffic flows (> 1 Gb/s) between data center locations, per-flow hashing can perform poorly in terms of bandwidth utilization and availability. We propose new software-defined traffic load balancer, SD-TLB, that performs measurement-based flow distribution over multiple optical paths, with an implicit impairment detection method using per-port statistics on available paths and a flow redistributor that is immediately adjusted to the current network state. While our approach does not provide the same level of protection as 1+1 optical protection, it can provide the necessary redundancy for data center inter-connection at a lower cost. We experimentally implement the SD-TLB using ASIC-based switches and open virtual switches interconnected by wavelength-division multiplexed transport network test-bed. The experimental results show that SD-TLB outperforms today's hashing-based alternatives in balancing, throughput, and restoration in the presence of outages and impairments and as a result achieves improved cost-efficiency.
为了实现地理位置分散的数据中心之间的互连,网络运营商通常在广域网中实现多条光路。例如,当传输波长粒度为100gb /s时,提供3条100gb /s波长路径,以满足客户300gb /s的需求。在多个提供的路径上,互连流量通常使用逐流散列进行分布,这将导致由于散列冲突导致的流量分布不均匀。对于数据中心位置之间数量相对较少的高带宽流量(> 1 Gb/s),每个流散列在带宽利用率和可用性方面表现不佳。我们提出了新的软件定义的流量负载均衡器SD-TLB,它在多条光路上执行基于测量的流量分配,并使用可用路径上的每个端口统计数据和立即调整到当前网络状态的流量重新分配器来进行隐式损伤检测方法。虽然我们的方法不能提供与1+1光保护相同级别的保护,但它可以以较低的成本为数据中心互连提供必要的冗余。我们利用基于asic的交换机和通过波分复用传输网络连接的开放式虚拟交换机进行SD-TLB的实验实现。实验结果表明,SD-TLB在存在中断和损坏的情况下,在平衡、吞吐量和恢复方面优于目前基于散列的替代方案,从而实现了更高的成本效益。
{"title":"Software-defined traffic load balancing for cost-effective data center interconnection service","authors":"Young-Jin Kim, J. Simsarian, M. Thottan","doi":"10.23919/INM.2017.7987287","DOIUrl":"https://doi.org/10.23919/INM.2017.7987287","url":null,"abstract":"For interconnection between geographically-separated data centers, network carriers typically implement multiple optical paths in a wide-area network. For example, when transmission wavelengths have 100 Gb/s granularity, three 100 Gb/s wavelength paths are provisioned to satisfy a customer demand of 300 Gb/s. Over the multiple provisioned paths, interconnection traffic is typically distributed using per-flow hashing, which results in an uneven distribution of traffic caused by hash collisions. For a relatively-few number of high-bandwidth traffic flows (> 1 Gb/s) between data center locations, per-flow hashing can perform poorly in terms of bandwidth utilization and availability. We propose new software-defined traffic load balancer, SD-TLB, that performs measurement-based flow distribution over multiple optical paths, with an implicit impairment detection method using per-port statistics on available paths and a flow redistributor that is immediately adjusted to the current network state. While our approach does not provide the same level of protection as 1+1 optical protection, it can provide the necessary redundancy for data center inter-connection at a lower cost. We experimentally implement the SD-TLB using ASIC-based switches and open virtual switches interconnected by wavelength-division multiplexed transport network test-bed. The experimental results show that SD-TLB outperforms today's hashing-based alternatives in balancing, throughput, and restoration in the presence of outages and impairments and as a result achieves improved cost-efficiency.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130780847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mining causes of network events in log data with causal inference 利用因果推理挖掘日志数据中网络事件的原因
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987263
Satoru Kobayashi, K. Fukuda, H. Esaki
Network log message (e.g., syslog) is valuable information to detect unexpected or anomalous behavior in a large scale network. However, pinpointing failures and their causes is not an easy problem because of a huge amount of system log data in daily operation. In this study, we propose a method extracting failures and their causes from network syslog data. The main idea of the method relies on causal inference that reconstructs causality of network events from a set of the time series of events. Causal inference allows us to reduce the number of correlated events by chance, thus it outputs more plausible causal events than a traditional cross-correlation based approach. We apply our method to 15 months network syslog data obtained in a nation-wide academic network in Japan. Our method significantly reduces the number of pseudo correlated events compared with the traditional method. Also, through two case studies and comparison with trouble ticket data, we demonstrate the effectiveness of our method for network operation.
网络日志信息(例如,syslog)是检测大规模网络中意外或异常行为的宝贵信息。然而,由于在日常运行中存在大量的系统日志数据,要准确定位故障及其原因并非易事。在这项研究中,我们提出了一种从网络syslog数据中提取故障及其原因的方法。该方法的主要思想依赖于因果推理,即从一组时间序列事件中重构网络事件的因果关系。因果推理允许我们偶然地减少相关事件的数量,因此它比传统的基于相互关联的方法输出更多可信的因果事件。我们将该方法应用于日本一个全国性学术网络15个月的网络syslog数据。与传统方法相比,我们的方法显著减少了伪相关事件的数量。通过两个案例分析和故障单数据对比,验证了该方法在网络运行中的有效性。
{"title":"Mining causes of network events in log data with causal inference","authors":"Satoru Kobayashi, K. Fukuda, H. Esaki","doi":"10.23919/INM.2017.7987263","DOIUrl":"https://doi.org/10.23919/INM.2017.7987263","url":null,"abstract":"Network log message (e.g., syslog) is valuable information to detect unexpected or anomalous behavior in a large scale network. However, pinpointing failures and their causes is not an easy problem because of a huge amount of system log data in daily operation. In this study, we propose a method extracting failures and their causes from network syslog data. The main idea of the method relies on causal inference that reconstructs causality of network events from a set of the time series of events. Causal inference allows us to reduce the number of correlated events by chance, thus it outputs more plausible causal events than a traditional cross-correlation based approach. We apply our method to 15 months network syslog data obtained in a nation-wide academic network in Japan. Our method significantly reduces the number of pseudo correlated events compared with the traditional method. Also, through two case studies and comparison with trouble ticket data, we demonstrate the effectiveness of our method for network operation.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130831018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
DroidVisor: An Android secure application recommendation system DroidVisor: Android安全应用推荐系统
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987440
Pulkit Rustgi, Carol J. Fung, Bahman Rashidi, Bridget T. McInnes
In current Android systems, the application recommendation function is an important feature that users can use to find a similar application to replace a targeted one. The current recommendation system provided through Google and the Google Play store presumably recommends applications similar to a target application while accounting for the popularity of each application. However, it does not take the security features of each application or users preferences into consideration when doing so. In this paper, we propose DroidVisor, an Android tool that provides users with fine-grained and customizable application recommendations. Compared to the Google store recommendation function, DroidVisor does not only use the similarity to a preselected target application, but also considers other metrics such as popularity, security, and usability. More specifically, DroidVisor provides an interface for users to configure the weight of each metric and a recommendation algorithm that generates a list of recommended applications based on the combined scores. We evaluate our proposed criteria and the quality of recommendation through use case studies. Finally, we present our findings through a discussion of accuracy as well as possible ways to improve our recommendation results.
在当前的Android系统中,应用程序推荐功能是一个重要的功能,用户可以使用它来寻找类似的应用程序来替代目标应用程序。目前通过Google和Google Play商店提供的推荐系统可能会推荐与目标应用程序相似的应用程序,同时考虑每个应用程序的受欢迎程度。但是,在这样做时,它不会考虑每个应用程序的安全特性或用户首选项。在本文中,我们提出了DroidVisor,一个Android工具,为用户提供细粒度和可定制的应用程序推荐。与Google商店推荐功能相比,DroidVisor不仅使用与预先选择的目标应用程序的相似性,还考虑了流行度、安全性和可用性等其他指标。更具体地说,DroidVisor为用户提供了一个界面来配置每个指标的权重,并提供了一个推荐算法,该算法根据综合得分生成推荐应用程序列表。我们通过用例研究来评估我们提出的标准和推荐的质量。最后,我们通过讨论准确性以及改进推荐结果的可能方法来展示我们的发现。
{"title":"DroidVisor: An Android secure application recommendation system","authors":"Pulkit Rustgi, Carol J. Fung, Bahman Rashidi, Bridget T. McInnes","doi":"10.23919/INM.2017.7987440","DOIUrl":"https://doi.org/10.23919/INM.2017.7987440","url":null,"abstract":"In current Android systems, the application recommendation function is an important feature that users can use to find a similar application to replace a targeted one. The current recommendation system provided through Google and the Google Play store presumably recommends applications similar to a target application while accounting for the popularity of each application. However, it does not take the security features of each application or users preferences into consideration when doing so. In this paper, we propose DroidVisor, an Android tool that provides users with fine-grained and customizable application recommendations. Compared to the Google store recommendation function, DroidVisor does not only use the similarity to a preselected target application, but also considers other metrics such as popularity, security, and usability. More specifically, DroidVisor provides an interface for users to configure the weight of each metric and a recommendation algorithm that generates a list of recommended applications based on the combined scores. We evaluate our proposed criteria and the quality of recommendation through use case studies. Finally, we present our findings through a discussion of accuracy as well as possible ways to improve our recommendation results.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123152750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
GoLCoNDa: Geo-IP Lookup for campus network NetFlow data GoLCoNDa:校园网NetFlow数据的地理ip查找
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987372
Swatesh Pakhare, D. Medhi
It is a challenging task for network administrators to properly monitor and manage an institution's incoming and outgoing network traffic patterns. While NetFlow is useful to gather flow-level data, its feature is limited to traditional flow-level information such as the source IP address, destination IP address, source port number, destination port number, and the protocol type. Thus, if we are to understand geographic dynamics of any flow connected to hosts at an institution from the outside world, it is not currently possible with NetFlow. To address the geo-location information of such flows, we developed the tool, GoLCoNDa, for use by campus network administrators. This tool allows the correlation of IP addresses with the geo-location information to visualize the geo-location of incoming and outgoing flows. Our tool handles millions of records quickly.
对于网络管理员来说,正确地监控和管理机构的传入和传出网络流量模式是一项具有挑战性的任务。虽然NetFlow对收集流级数据很有用,但它的功能仅限于传统的流级信息,如源IP地址、目的IP地址、源端口号、目的端口号和协议类型。因此,如果我们要了解从外部世界连接到机构主机的任何流量的地理动态,目前使用NetFlow是不可能的。为了处理这些流量的地理位置信息,我们开发了GoLCoNDa工具,供校园网络管理员使用。该工具允许将IP地址与地理位置信息相关联,以可视化进出流的地理位置。我们的工具可以快速处理数百万条记录。
{"title":"GoLCoNDa: Geo-IP Lookup for campus network NetFlow data","authors":"Swatesh Pakhare, D. Medhi","doi":"10.23919/INM.2017.7987372","DOIUrl":"https://doi.org/10.23919/INM.2017.7987372","url":null,"abstract":"It is a challenging task for network administrators to properly monitor and manage an institution's incoming and outgoing network traffic patterns. While NetFlow is useful to gather flow-level data, its feature is limited to traditional flow-level information such as the source IP address, destination IP address, source port number, destination port number, and the protocol type. Thus, if we are to understand geographic dynamics of any flow connected to hosts at an institution from the outside world, it is not currently possible with NetFlow. To address the geo-location information of such flows, we developed the tool, GoLCoNDa, for use by campus network administrators. This tool allows the correlation of IP addresses with the geo-location information to visualize the geo-location of incoming and outgoing flows. Our tool handles millions of records quickly.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Betas: Deriving quantiles from MOS-QoS relations of IQX models for QoE management beta:从IQX模型的MOS-QoS关系中导出分位数,用于QoE管理
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987430
T. Hossfeld, M. Fiedler, Jorgen Gustafsson
Most Quality of Experience (QoE) studies report only the mean opinion scores (MOS) and existing models typically map Quality of Service (QoS) parameters to the MOS. However, service providers may be interested in the share of users that are not at all satisfied, and their corresponding QoE levels. From the QoE management point of view, the circumstances leading to the QoE levels perceived by a certain percentage of users, e.g. the 10% most annoyed users, are of utmost importance. Proper metrics are the 10%-quantiles of QoE values. Knowledge of those quantiles helps service providers to estimate the need for countermeasures in order to prevent annoyed users from churning on one hand, and to avoid overprovisioning on the other hand. The contribution of this paper is the derivation of quantiles from existing MOS-QoS relations. This allows to reuse existing subjective MOS results and MOS models without rerunning the experiments. We consider exemplary the IQX model (describing the MOS-QoS relation) for the derivation of the quantile-QoS relation. A practical guideline for the computation of the quantiles is provided.
大多数体验质量(QoE)研究仅报告平均意见分数(MOS),现有模型通常将服务质量(QoS)参数映射到MOS。然而,服务提供者可能对完全不满意的用户份额及其相应的QoE水平感兴趣。从QoE管理的角度来看,导致一定比例用户感知到QoE水平的环境,例如10%最烦人的用户,是最重要的。适当的指标是QoE值的10%分位数。了解这些分位数可以帮助服务提供商估计对策的需要,一方面防止烦恼的用户流失,另一方面避免过度供应。本文的贡献在于从现有的MOS-QoS关系中推导出分位数。这允许重用现有的主观MOS结果和MOS模型,而无需重新运行实验。我们考虑用于派生分位数- qos关系的IQX模型(描述MOS-QoS关系)作为示例。给出了计算分位数的实用指南。
{"title":"Betas: Deriving quantiles from MOS-QoS relations of IQX models for QoE management","authors":"T. Hossfeld, M. Fiedler, Jorgen Gustafsson","doi":"10.23919/INM.2017.7987430","DOIUrl":"https://doi.org/10.23919/INM.2017.7987430","url":null,"abstract":"Most Quality of Experience (QoE) studies report only the mean opinion scores (MOS) and existing models typically map Quality of Service (QoS) parameters to the MOS. However, service providers may be interested in the share of users that are not at all satisfied, and their corresponding QoE levels. From the QoE management point of view, the circumstances leading to the QoE levels perceived by a certain percentage of users, e.g. the 10% most annoyed users, are of utmost importance. Proper metrics are the 10%-quantiles of QoE values. Knowledge of those quantiles helps service providers to estimate the need for countermeasures in order to prevent annoyed users from churning on one hand, and to avoid overprovisioning on the other hand. The contribution of this paper is the derivation of quantiles from existing MOS-QoS relations. This allows to reuse existing subjective MOS results and MOS models without rerunning the experiments. We consider exemplary the IQX model (describing the MOS-QoS relation) for the derivation of the quantile-QoS relation. A practical guideline for the computation of the quantiles is provided.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ADE: An ensemble approach for early Anomaly Detection 早期异常检测的集成方法
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987310
Teodora Sandra Buda, H. Assem, Lei Xu
Proactive anomaly detection refers to anticipating anomalies or abnormal patterns within a dataset in a timely manner. Discovering anomalies such as failures or degradations before their occurrence can lead to great benefits such as the ability to avoid the anomaly happening by applying some corrective measures in advance (e.g., allocating more resources for a nearly saturated system in a data centre). In this paper we address the proactive anomaly detection problem through machine learning and in particular ensemble learning. We propose an early Anomaly Detection Ensemble approach, ADE, which combines results of state-of-the-art anomaly detection techniques in order to provide more accurate results than each single technique. Moreover, we utilise a a weighted anomaly window as ground truth for training the model, which prioritises early detection in order to discover anomalies in a timely manner. Various strategies are explored for generating ground truth windows. Results show that ADE shows improvements of at least 10% in earliest detection score compared to each individual technique across all datasets considered. The technique proposed detected anomalies in advance up to ∼16h before they actually occurred.
主动异常检测是指及时发现数据集中存在的异常或异常模式。在异常(如故障或降级)发生之前发现它们可以带来巨大的好处,例如通过提前应用一些纠正措施来避免异常发生的能力(例如,为数据中心中接近饱和的系统分配更多资源)。在本文中,我们通过机器学习,特别是集成学习来解决主动异常检测问题。我们提出了一种早期异常检测集成方法ADE,它结合了最先进的异常检测技术的结果,以便提供比每种技术更准确的结果。此外,我们利用加权异常窗口作为训练模型的基础真理,优先考虑早期检测,以便及时发现异常。探索了各种策略来产生地面真值窗口。结果表明,与所考虑的所有数据集的每种单独技术相比,ADE在早期检测得分方面至少提高了10%。该技术可以在异常实际发生前16小时提前检测到异常。
{"title":"ADE: An ensemble approach for early Anomaly Detection","authors":"Teodora Sandra Buda, H. Assem, Lei Xu","doi":"10.23919/INM.2017.7987310","DOIUrl":"https://doi.org/10.23919/INM.2017.7987310","url":null,"abstract":"Proactive anomaly detection refers to anticipating anomalies or abnormal patterns within a dataset in a timely manner. Discovering anomalies such as failures or degradations before their occurrence can lead to great benefits such as the ability to avoid the anomaly happening by applying some corrective measures in advance (e.g., allocating more resources for a nearly saturated system in a data centre). In this paper we address the proactive anomaly detection problem through machine learning and in particular ensemble learning. We propose an early Anomaly Detection Ensemble approach, ADE, which combines results of state-of-the-art anomaly detection techniques in order to provide more accurate results than each single technique. Moreover, we utilise a a weighted anomaly window as ground truth for training the model, which prioritises early detection in order to discover anomalies in a timely manner. Various strategies are explored for generating ground truth windows. Results show that ADE shows improvements of at least 10% in earliest detection score compared to each individual technique across all datasets considered. The technique proposed detected anomalies in advance up to ∼16h before they actually occurred.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134216404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Sharing data store and backup controllers for resilient control plane in multi-domain SDN 为多域SDN弹性控制平面共享数据存储和备份控制器
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987315
Jiacong Li, Ying Wang, Wenjing Li, Xue-song Qiu
software-defined networking (SDN) uses a centralized control plane to manage the whole network. If the scale of the network is large, it is necessary to divide it into multiple domains. Since the network scale becomes larger, the probability of failure occurrences is higher. Therefore, it is important to guarantee the control plane resilience in multi-domain SDN. However, the existing approaches cannot store the network state in real time, and do not consider the backup controllers placement problem in multi-domain SDN. In order to ensure the resilience of the control plane in multi-domain SDN, we propose a sharing data store and backup controllers based approach. Sharing data store is used to ensure that each master controller has a view of the whole network and data store can save the network state during the failure time. The sharing backup controllers are used to guarantee the resilience of control plane with minimum cost. Simulations show that our approach can use as less backup controllers as possible to ensure the resilience of control plane.
SDN (software-defined networking)通过集中控制平面对整个网络进行管理。如果网络规模较大,则需要将其划分为多个域。随着网络规模的扩大,故障发生的概率也越来越高。因此,在多域SDN中保证控制平面的弹性是非常重要的。然而,现有的方法不能实时存储网络状态,也没有考虑多域SDN中备份控制器的放置问题。为了保证多域SDN控制平面的弹性,提出了一种基于共享数据存储和备份控制器的方法。共享数据存储是为了保证每个主控制器都能看到整个网络,并且数据存储可以保存故障时的网络状态。采用共享备份控制器,以最小的成本保证控制平面的弹性。仿真结果表明,该方法可以使用尽可能少的备份控制器来保证控制平面的弹性。
{"title":"Sharing data store and backup controllers for resilient control plane in multi-domain SDN","authors":"Jiacong Li, Ying Wang, Wenjing Li, Xue-song Qiu","doi":"10.23919/INM.2017.7987315","DOIUrl":"https://doi.org/10.23919/INM.2017.7987315","url":null,"abstract":"software-defined networking (SDN) uses a centralized control plane to manage the whole network. If the scale of the network is large, it is necessary to divide it into multiple domains. Since the network scale becomes larger, the probability of failure occurrences is higher. Therefore, it is important to guarantee the control plane resilience in multi-domain SDN. However, the existing approaches cannot store the network state in real time, and do not consider the backup controllers placement problem in multi-domain SDN. In order to ensure the resilience of the control plane in multi-domain SDN, we propose a sharing data store and backup controllers based approach. Sharing data store is used to ensure that each master controller has a view of the whole network and data store can save the network state during the failure time. The sharing backup controllers are used to guarantee the resilience of control plane with minimum cost. Simulations show that our approach can use as less backup controllers as possible to ensure the resilience of control plane.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114372661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Distributed Management Information Models 分布式管理信息模型
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987306
Liam Fallon, J. Keeney, S. Meer
The formal structure of information models and the controlled manner of accessing and changing such models brings both flexibility and control when managing network elements. However, keeping information models synchronized and consistent across network elements and management systems is a challenging task. Today this problem is exasperated with the advent of ephemeral network functions and elements and also by the need for distributed scalable cooperating management functions running in containerized cloud deployments.
信息模型的正式结构以及访问和更改这些模型的受控方式在管理网络元素时带来了灵活性和可控性。然而,在网络元素和管理系统之间保持信息模型的同步和一致是一项具有挑战性的任务。如今,随着昙花一现的网络功能和元素的出现,以及对在容器化云部署中运行的分布式可伸缩协作管理功能的需求,这个问题变得更加严重。
{"title":"Distributed Management Information Models","authors":"Liam Fallon, J. Keeney, S. Meer","doi":"10.23919/INM.2017.7987306","DOIUrl":"https://doi.org/10.23919/INM.2017.7987306","url":null,"abstract":"The formal structure of information models and the controlled manner of accessing and changing such models brings both flexibility and control when managing network elements. However, keeping information models synchronized and consistent across network elements and management systems is a challenging task. Today this problem is exasperated with the advent of ephemeral network functions and elements and also by the need for distributed scalable cooperating management functions running in containerized cloud deployments.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114849592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SIMECA: SDN-based IoT Mobile Edge Cloud Architecture SIMECA:基于sdn的物联网移动边缘云架构
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987319
Binh Nguyen, Nakjung Choi, M. Thottan, J. Merwe
In future mobile networks, e.g., 5G, emerging IoT services are expected to support billions of IoT devices with unique characteristics and traffic patterns. In this paper we propose an SDN-based IoT Mobile Edge Cloud Architecture (SIMECA1) which can deploy diverse IoT services at the mobile edge by leveraging distributed, lightweight control and data planes optimized for IoT communications. We prototyped our architecture using a pre-commercial mobile networking software stack to demonstrate the feasibility and utility of our approach.
在未来的移动网络中,例如5G,新兴的物联网服务预计将支持数十亿具有独特特性和流量模式的物联网设备。在本文中,我们提出了一种基于sdn的物联网移动边缘云架构(SIMECA1),它可以通过利用针对物联网通信优化的分布式轻量级控制和数据平面,在移动边缘部署各种物联网服务。我们使用预商用移动网络软件堆栈对我们的架构进行了原型设计,以展示我们方法的可行性和实用性。
{"title":"SIMECA: SDN-based IoT Mobile Edge Cloud Architecture","authors":"Binh Nguyen, Nakjung Choi, M. Thottan, J. Merwe","doi":"10.23919/INM.2017.7987319","DOIUrl":"https://doi.org/10.23919/INM.2017.7987319","url":null,"abstract":"In future mobile networks, e.g., 5G, emerging IoT services are expected to support billions of IoT devices with unique characteristics and traffic patterns. In this paper we propose an SDN-based IoT Mobile Edge Cloud Architecture (SIMECA1) which can deploy diverse IoT services at the mobile edge by leveraging distributed, lightweight control and data planes optimized for IoT communications. We prototyped our architecture using a pre-commercial mobile networking software stack to demonstrate the feasibility and utility of our approach.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Ensuring two routes connectivity in mobile ad hoc networks with Random Waypoint mobility 在具有随机路点移动性的移动自组织网络中保证两条路由的连通性
Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987348
Tareq Hayajna, Miochdel Kaldoching
To increase mobile ad hoc network reliability, virtually decrease the packets loss to zero, and to support multimedia communications multi-route is required. In order to ensure the availability of two routes, node density must be above a certain value. To the best our knowledge, this paper is the first paper that mathematically determines the required node density to ensure the availability of two routes between any randomly chosen source and destination pair in mobile ad hoc networks with random waypoint mobility model. To this end, a complete probabilistic model is provided. The obtained results reveal that the increase in the node density exponentially increases the probability of having two routes. This exponential increase is limited by a certain threshold, after this threshold the increase is negligible. An interesting conclusion from this paper is that the required node densities to ensure two routes connectivity are the same for both mobile nodes moving according to the generalized random waypoint mobility model and static nodes that are uniformly distributed in the network area. This work can be used by mobile ad hoc network designers to study the network reliability and connectivity.
为了提高移动自组网的可靠性,使丢包量几乎为零,并支持多媒体通信,需要多路由。为了保证两条路由的可用性,节点密度必须大于一定值。据我们所知,这篇论文是第一篇用数学方法确定任意随机选择的路点移动模型的移动自组织网络中任意随机选择的源和目的对之间的两条路由的可用性所需的节点密度的论文。为此,给出了一个完整的概率模型。得到的结果表明,节点密度的增加以指数方式增加具有两条路径的概率。这种指数增长受到一定阈值的限制,超过这个阈值,增长可以忽略不计。本文的一个有趣的结论是,对于根据广义随机路点移动模型移动的两个移动节点和均匀分布在网络区域的静态节点,保证两条路由连通性所需的节点密度是相同的。该工作可为移动自组网设计人员研究网络可靠性和连通性提供参考。
{"title":"Ensuring two routes connectivity in mobile ad hoc networks with Random Waypoint mobility","authors":"Tareq Hayajna, Miochdel Kaldoching","doi":"10.23919/INM.2017.7987348","DOIUrl":"https://doi.org/10.23919/INM.2017.7987348","url":null,"abstract":"To increase mobile ad hoc network reliability, virtually decrease the packets loss to zero, and to support multimedia communications multi-route is required. In order to ensure the availability of two routes, node density must be above a certain value. To the best our knowledge, this paper is the first paper that mathematically determines the required node density to ensure the availability of two routes between any randomly chosen source and destination pair in mobile ad hoc networks with random waypoint mobility model. To this end, a complete probabilistic model is provided. The obtained results reveal that the increase in the node density exponentially increases the probability of having two routes. This exponential increase is limited by a certain threshold, after this threshold the increase is negligible. An interesting conclusion from this paper is that the required node densities to ensure two routes connectivity are the same for both mobile nodes moving according to the generalized random waypoint mobility model and static nodes that are uniformly distributed in the network area. This work can be used by mobile ad hoc network designers to study the network reliability and connectivity.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1