首页 > 最新文献

2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)最新文献

英文 中文
Attack-aware Lightpath Provisioning in Elastic Optical Networks with Traffic Demand Variations 具有流量需求变化的弹性光网络中攻击感知的光路配置
Pub Date : 2019-10-01 DOI: 10.1109/RNDM48015.2019.8949121
K. Manousakis, T. Panayiotou, P. Kolios, Ioannis Tomkos, G. Ellinas
This work considers lightpath provisioning in elastic optical networks with traffic demand variations while accounting for the impact of jamming attacks. Traffic requests are modeled based on their variation in traffic and a number of network traffic scenarios are pre-computed. Variations in traffic are used in order to design the network with improved resilience to jamming attacks in the general case, without considering a specific traffic matrix. The mathematical formulation and heuristic algorithms proposed in this work jointly consider the routing and spectrum allocation problem for the pre-computed network scenarios, aiming to minimize the required lightpath reallocations and the number of wavelength selective switches (WSSs) placed at specific network nodes/ports so as to minimize the impact of jamming attacks. Performance results demonstrate the benefits of this approach in terms of required lightpath reallocations, number of WSSs, as well as computational time required for dynamically reconfiguring the network when considering traffic demand variations.
这项工作考虑了弹性光网络中具有流量需求变化的光路配置,同时考虑了干扰攻击的影响。基于流量的变化对流量请求进行建模,并预先计算了许多网络流量场景。在不考虑特定流量矩阵的情况下,使用流量变化来设计网络,以提高对一般情况下干扰攻击的弹性。本文提出的数学公式和启发式算法共同考虑了预先计算的网络场景的路由和频谱分配问题,旨在最大限度地减少所需的光路重新分配和放置在特定网络节点/端口的波长选择交换机(wss)的数量,从而最大限度地减少干扰攻击的影响。性能结果表明,在考虑流量需求变化时,这种方法在所需的光路重新分配、wss数量以及动态重新配置网络所需的计算时间方面具有优势。
{"title":"Attack-aware Lightpath Provisioning in Elastic Optical Networks with Traffic Demand Variations","authors":"K. Manousakis, T. Panayiotou, P. Kolios, Ioannis Tomkos, G. Ellinas","doi":"10.1109/RNDM48015.2019.8949121","DOIUrl":"https://doi.org/10.1109/RNDM48015.2019.8949121","url":null,"abstract":"This work considers lightpath provisioning in elastic optical networks with traffic demand variations while accounting for the impact of jamming attacks. Traffic requests are modeled based on their variation in traffic and a number of network traffic scenarios are pre-computed. Variations in traffic are used in order to design the network with improved resilience to jamming attacks in the general case, without considering a specific traffic matrix. The mathematical formulation and heuristic algorithms proposed in this work jointly consider the routing and spectrum allocation problem for the pre-computed network scenarios, aiming to minimize the required lightpath reallocations and the number of wavelength selective switches (WSSs) placed at specific network nodes/ports so as to minimize the impact of jamming attacks. Performance results demonstrate the benefits of this approach in terms of required lightpath reallocations, number of WSSs, as well as computational time required for dynamically reconfiguring the network when considering traffic demand variations.","PeriodicalId":120852,"journal":{"name":"2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128420580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spare Capacity Dimensioning for different Re-Routing Strategies in Transport Networks 传输网络中不同重路由策略的备用容量维度
Pub Date : 2019-10-01 DOI: 10.1109/RNDM48015.2019.8949156
H. Saeed, R. Reyes, T. Bauschert, M. Gunkel, Felix Wissel
Bandwidth variable transponders (BVTs) have the capability to adjust the line-rates of lightpaths in optical transport networks. This feature is relevant for the restoration of IP over optical networks where the capacity of the IP links is provisioned by lightpaths. When a fibre cut occurs, the affected IP links are restored by re-routing the disrupted lightpaths over usually longer protection paths. In most cases, to adapt to the physical limitations of these paths, the BVTs that implement the affected lightpaths have to reduce their line-rates. This results in IP links with reduced capacities which may cause congestion in the IP layer. Today, due to the lack of information exchange between the IP and the optical control planes, the IP layer is not aware of the capacity reduction and cannot trigger automatic traffic re-routing so as to avoid congestion. Therefore, the policy applied today is to shut-off all IP links affected by a line-rate reduction. In this paper we study alternatives to this policy by investigating re-routing strategies in the IP layer that avoid shutting-off all IP links affected. The assumption is made that in future a software defined network (SDN) control plane enables coordination between the IP and optical layers. The efficiency of the strategies is assessed by calculating their spare capacity requirements, i.e. the extra capacity required in the optical layer to carry the IP traffic in case of single link fibre cuts. In our case study we consider a network scenario from Deutsche Telekom. The results show that the rerouting strategies lead to significant capacity savings compared to the traditional shut-off approach.
带宽可变转发器(bvt)具有调节光传输网络中光路的线速的能力。该特性与通过光网络恢复IP有关,其中IP链路的容量由光路提供。当光纤发生切割时,受影响的IP链路通过在通常较长的保护路径上重新路由中断的光路来恢复。在大多数情况下,为了适应这些路径的物理限制,实现受影响光路的bvt必须降低其线率。这将导致IP链路容量减少,从而可能导致IP层拥塞。目前,由于IP层和光控制平面之间缺乏信息交换,IP层没有意识到容量减少,无法触发流量自动重路由,从而避免拥塞。因此,今天应用的策略是关闭所有受线路速率降低影响的IP链路。在本文中,我们通过研究IP层中避免关闭所有受影响的IP链路的重路由策略来研究此策略的替代方案。假设未来软件定义网络(SDN)控制平面能够实现IP层和光层之间的协调。这些策略的效率是通过计算它们的备用容量需求来评估的,即在单链路光纤中断的情况下,光层承载IP流量所需的额外容量。在我们的案例研究中,我们考虑来自德国电信的网络场景。结果表明,与传统的关闭方法相比,重新路由策略可以显著节省容量。
{"title":"Spare Capacity Dimensioning for different Re-Routing Strategies in Transport Networks","authors":"H. Saeed, R. Reyes, T. Bauschert, M. Gunkel, Felix Wissel","doi":"10.1109/RNDM48015.2019.8949156","DOIUrl":"https://doi.org/10.1109/RNDM48015.2019.8949156","url":null,"abstract":"Bandwidth variable transponders (BVTs) have the capability to adjust the line-rates of lightpaths in optical transport networks. This feature is relevant for the restoration of IP over optical networks where the capacity of the IP links is provisioned by lightpaths. When a fibre cut occurs, the affected IP links are restored by re-routing the disrupted lightpaths over usually longer protection paths. In most cases, to adapt to the physical limitations of these paths, the BVTs that implement the affected lightpaths have to reduce their line-rates. This results in IP links with reduced capacities which may cause congestion in the IP layer. Today, due to the lack of information exchange between the IP and the optical control planes, the IP layer is not aware of the capacity reduction and cannot trigger automatic traffic re-routing so as to avoid congestion. Therefore, the policy applied today is to shut-off all IP links affected by a line-rate reduction. In this paper we study alternatives to this policy by investigating re-routing strategies in the IP layer that avoid shutting-off all IP links affected. The assumption is made that in future a software defined network (SDN) control plane enables coordination between the IP and optical layers. The efficiency of the strategies is assessed by calculating their spare capacity requirements, i.e. the extra capacity required in the optical layer to carry the IP traffic in case of single link fibre cuts. In our case study we consider a network scenario from Deutsche Telekom. The results show that the rerouting strategies lead to significant capacity savings compared to the traditional shut-off approach.","PeriodicalId":120852,"journal":{"name":"2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124080603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks SEC-BlockEdge:基于区块链边缘的工业物联网网络中的安全威胁
Pub Date : 2019-10-01 DOI: 10.1109/RNDM48015.2019.8949107
T. Kumar, An Braeken, Vidhya Ramani, Ijaz Ahmad, E. Harjula, M. Ylianttila
Internet of Things (IoT), together with fifth-generation (5G) mobile systems and related enabling communication technologies, constantly contributing for the enhancement in various industrial applications and driving towards the vision of complete industrial automation. In this context, both Blockchain and Edge computing are considered as promising technologies to fulfill the vision and requirements for the future Industry 4.0. The integration of these technologies together with massive scale Industrial IoT (IIoT) applications would be vital in addressing several key challenges related to e.g. latency, scalability and security of data processing and sharing, among others. However, such complex IIoT systems are constantly exposed to security threats from various sources. This paper focuses on identifying the major security challenges in the IIoT blockchain-edge related networks. In addition, some potential security solutions are presented in order to overcome these challenges.
物联网(IoT)与第五代(5G)移动系统及相关使能通信技术一起,不断为各种工业应用的增强做出贡献,并推动实现完全工业自动化的愿景。在这种情况下,区块链和边缘计算都被认为是有前途的技术,可以满足未来工业4.0的愿景和要求。这些技术与大规模工业物联网(IIoT)应用的集成对于解决与数据处理和共享的延迟、可扩展性和安全性等相关的几个关键挑战至关重要。然而,这种复杂的工业物联网系统不断面临来自各种来源的安全威胁。本文侧重于确定工业物联网区块链边缘相关网络中的主要安全挑战。此外,为了克服这些挑战,提出了一些潜在的安全解决方案。
{"title":"SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks","authors":"T. Kumar, An Braeken, Vidhya Ramani, Ijaz Ahmad, E. Harjula, M. Ylianttila","doi":"10.1109/RNDM48015.2019.8949107","DOIUrl":"https://doi.org/10.1109/RNDM48015.2019.8949107","url":null,"abstract":"Internet of Things (IoT), together with fifth-generation (5G) mobile systems and related enabling communication technologies, constantly contributing for the enhancement in various industrial applications and driving towards the vision of complete industrial automation. In this context, both Blockchain and Edge computing are considered as promising technologies to fulfill the vision and requirements for the future Industry 4.0. The integration of these technologies together with massive scale Industrial IoT (IIoT) applications would be vital in addressing several key challenges related to e.g. latency, scalability and security of data processing and sharing, among others. However, such complex IIoT systems are constantly exposed to security threats from various sources. This paper focuses on identifying the major security challenges in the IIoT blockchain-edge related networks. In addition, some potential security solutions are presented in order to overcome these challenges.","PeriodicalId":120852,"journal":{"name":"2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134303827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Challenges in Stochastic Binary Systems 随机二元系统中的挑战
Pub Date : 2019-10-01 DOI: 10.1109/RNDM48015.2019.8949084
P. Romero
Stochastic Binary Systems (SBS) are mathematical models of multi-component on-off systems subject to random failures on its components. In this abstract setting, an SBS can model a network, an information system or the operation of an industrial automatic process, among many others. Given the importance of its applications, recent works from the literature aim to understand the system reliability and combinatorics of some distinguished sub-classes of SBS. In this paper we revisit the progress in this field. The most challenging problems in the analysis and practice of SBS are also discussed.
随机二元系统(SBS)是多组分通断系统的数学模型,该系统的各组分发生随机故障。在这个抽象设置中,SBS可以对网络、信息系统或工业自动化过程的操作等进行建模。鉴于其应用的重要性,最近的文献工作旨在了解SBS的一些不同子类的系统可靠性和组合学。本文回顾了该领域的研究进展。讨论了SBS分析和实践中最具挑战性的问题。
{"title":"Challenges in Stochastic Binary Systems","authors":"P. Romero","doi":"10.1109/RNDM48015.2019.8949084","DOIUrl":"https://doi.org/10.1109/RNDM48015.2019.8949084","url":null,"abstract":"Stochastic Binary Systems (SBS) are mathematical models of multi-component on-off systems subject to random failures on its components. In this abstract setting, an SBS can model a network, an information system or the operation of an industrial automatic process, among many others. Given the importance of its applications, recent works from the literature aim to understand the system reliability and combinatorics of some distinguished sub-classes of SBS. In this paper we revisit the progress in this field. The most challenging problems in the analysis and practice of SBS are also discussed.","PeriodicalId":120852,"journal":{"name":"2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123739154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization of PMU Location and Communications in a Power Grid 电网中PMU位置和通信的优化
Pub Date : 2019-10-01 DOI: 10.1109/RNDM48015.2019.8949117
Luís Alçada-Almeida, Teresa Gomes, C. H. Antunes
Phasor Measurement Units (PMU) are specific equipment that measure phasors, magnitude and frequency of voltage and current in key points of a power grid, allowing for a more effective management of network assets. We start by presenting some formulations for the problem of determining the location to minimize the number of PMUs installed, ensuring that all buses (nodes of the power grid) are visible by at least one PMU. The formulations take also into account the existence of Zero Injection Buses (ZIBs) and the requirement of $(mathcal{N}-1)$ redundancy to ensure that critical buses (e.g. buses with a generator) can be observed by at least two PMUs. This guarantees, in case one out of $mathcal{N}$ installed PMUs fails, all critical buses are still observable. We assume that the communications network topology follows the topology of the power grid. With the goal to protect the communication infrastructure against failures and natural disasters, we propose models that minimize the number of Shared Risk Link Groups (SRLGs) and links in the path pair of each PMU to a pair of Phasor Data Concentrators (PDCs). We then modify the formulation of the PMU location problem to improve the resilience of the communication between the PMUs and the PDCs, namely by avoiding to place PMUs in buses of degree one and also by penalizing the placement of PMUs in buses that will result in path pairs to the PDCs which are not SRLG-disjoint. Results are presented to illustrate the impact of the modified PMU location model on the resilience of the communication network.
相量测量单元(PMU)是测量电网关键点电压和电流相量、幅度和频率的专用设备,可以更有效地管理网络资产。我们首先提出一些公式,用于确定位置以最小化安装的PMU数量,确保至少有一个PMU可以看到所有总线(电网节点)。这些公式还考虑到零注入总线(zbs)的存在和$(mathcal{N}-1)$冗余的要求,以确保至少两个pmu可以观察到关键总线(例如带发电机的总线)。这保证了,如果$mathcal{N}$安装的pmu中有一个出现故障,所有关键总线仍然是可观察的。我们假设通信网络拓扑结构遵循电网拓扑结构。为了保护通信基础设施免受故障和自然灾害的影响,我们提出了将共享风险链路组(SRLGs)的数量和每个PMU到一对相量数据集中器(PDCs)的路径对中的链路数量最小化的模型。然后,我们修改了PMU定位问题的公式,以提高PMU和PDCs之间通信的弹性,即避免将PMU放置在一级总线中,并且惩罚PMU在总线中的放置,这将导致通往PDCs的路径对,而这些路径对不是srlg不相交的。研究结果说明了改进的PMU定位模型对通信网络弹性的影响。
{"title":"Optimization of PMU Location and Communications in a Power Grid","authors":"Luís Alçada-Almeida, Teresa Gomes, C. H. Antunes","doi":"10.1109/RNDM48015.2019.8949117","DOIUrl":"https://doi.org/10.1109/RNDM48015.2019.8949117","url":null,"abstract":"Phasor Measurement Units (PMU) are specific equipment that measure phasors, magnitude and frequency of voltage and current in key points of a power grid, allowing for a more effective management of network assets. We start by presenting some formulations for the problem of determining the location to minimize the number of PMUs installed, ensuring that all buses (nodes of the power grid) are visible by at least one PMU. The formulations take also into account the existence of Zero Injection Buses (ZIBs) and the requirement of $(mathcal{N}-1)$ redundancy to ensure that critical buses (e.g. buses with a generator) can be observed by at least two PMUs. This guarantees, in case one out of $mathcal{N}$ installed PMUs fails, all critical buses are still observable. We assume that the communications network topology follows the topology of the power grid. With the goal to protect the communication infrastructure against failures and natural disasters, we propose models that minimize the number of Shared Risk Link Groups (SRLGs) and links in the path pair of each PMU to a pair of Phasor Data Concentrators (PDCs). We then modify the formulation of the PMU location problem to improve the resilience of the communication between the PMUs and the PDCs, namely by avoiding to place PMUs in buses of degree one and also by penalizing the placement of PMUs in buses that will result in path pairs to the PDCs which are not SRLG-disjoint. Results are presented to illustrate the impact of the modified PMU location model on the resilience of the communication network.","PeriodicalId":120852,"journal":{"name":"2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Topological Approach to Measure Network Recoverability 测量网络可恢复性的拓扑方法
Pub Date : 2019-10-01 DOI: 10.1109/RNDM48015.2019.8949119
Zhidong He, Peng Sun, P. Mieghem
Network recoverability refers to the ability of a network to return to a desired performance level after suffering malicious attacks or random failures. This paper proposes a general topological approach and recoverability indicators to measure the network recoverability in two scenarios: 1) recovery of damaged connections and 2) any disconnected pair of nodes can be connected to each other. Our approach presents the effect of the random attack and recovery processes on the network performance by the robustness envelopes of realizations and the histograms of two recoverability indicators. By applying the effective graph resistance and the network efficiency as robustness metrics, we employ the proposed approach to assess 10 realworld communication networks. Numerical results verify that the network recoverability is coupled to the network topology, the robustness metric and the recovery strategy. We also show that a greedy recovery strategy could provide a near-optimal recovery performance for the investigated robustness metrics.
网络可恢复性是指网络在遭受恶意攻击或随机故障后恢复到预期性能水平的能力。本文提出了一种通用的拓扑方法和可恢复性指标来衡量网络在两种情况下的可恢复性:1)损坏连接的恢复和2)任何断开的节点对可以相互连接。我们的方法通过实现的鲁棒性包络和两个可恢复性指标的直方图来展示随机攻击和恢复过程对网络性能的影响。通过应用有效图阻力和网络效率作为鲁棒性指标,我们采用所提出的方法评估了10个现实世界的通信网络。数值结果验证了网络可恢复性与网络拓扑结构、鲁棒性度量和恢复策略是耦合的。我们还证明了贪婪恢复策略可以为所研究的鲁棒性指标提供接近最优的恢复性能。
{"title":"Topological Approach to Measure Network Recoverability","authors":"Zhidong He, Peng Sun, P. Mieghem","doi":"10.1109/RNDM48015.2019.8949119","DOIUrl":"https://doi.org/10.1109/RNDM48015.2019.8949119","url":null,"abstract":"Network recoverability refers to the ability of a network to return to a desired performance level after suffering malicious attacks or random failures. This paper proposes a general topological approach and recoverability indicators to measure the network recoverability in two scenarios: 1) recovery of damaged connections and 2) any disconnected pair of nodes can be connected to each other. Our approach presents the effect of the random attack and recovery processes on the network performance by the robustness envelopes of realizations and the histograms of two recoverability indicators. By applying the effective graph resistance and the network efficiency as robustness metrics, we employ the proposed approach to assess 10 realworld communication networks. Numerical results verify that the network recoverability is coupled to the network topology, the robustness metric and the recovery strategy. We also show that a greedy recovery strategy could provide a near-optimal recovery performance for the investigated robustness metrics.","PeriodicalId":120852,"journal":{"name":"2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128219532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Network Resiliency Against Earthquakes 网络抗地震弹性
Pub Date : 2019-10-01 DOI: 10.1109/RNDM48015.2019.8949088
A. Valentini, Bálazs Vass, Jorik Oostenbrink, Levente Csák, F. Kuipers, B. Pace, David Hay, János Tapolcai
Guaranteeing a high availability of network services is a crucial part of network management. In this study, we show how to compute the availability of network services under earthquakes, by using empirical data. We take a multi-disciplinary approach and create an earthquake model based on seismological research and historical data. We then show how to integrate this empirical disaster model into existing network resiliency models to obtain the vulnerability and availability of a network under earthquakes. While previous studies have applied their models to ground shaking hazard models or earthquake scenarios, we compute (1) earthquake activity rates and (2) a relation between magnitude and disaster area, and use both as input data for our modeling. This approach is more in line with existing network resiliency models: it provides better information on the correlation between link failures than ground shaking hazard models and a more comprehensive view than a fixed set of scenarios.
保证网络服务的高可用性是网络管理的关键部分。在本研究中,我们展示了如何使用经验数据来计算地震下网络服务的可用性。我们采用多学科的方法,在地震学研究和历史数据的基础上建立了一个地震模型。然后,我们展示了如何将这种经验灾难模型整合到现有的网络弹性模型中,以获得地震下网络的脆弱性和可用性。虽然以前的研究已经将他们的模型应用于地面震动危险模型或地震情景,但我们计算了(1)地震活动率和(2)震级与灾区之间的关系,并将两者作为我们建模的输入数据。这种方法更符合现有的网络弹性模型:与地面震动危险模型相比,它提供了关于链路故障之间相关性的更好信息,并且比一组固定的情景提供了更全面的视图。
{"title":"Network Resiliency Against Earthquakes","authors":"A. Valentini, Bálazs Vass, Jorik Oostenbrink, Levente Csák, F. Kuipers, B. Pace, David Hay, János Tapolcai","doi":"10.1109/RNDM48015.2019.8949088","DOIUrl":"https://doi.org/10.1109/RNDM48015.2019.8949088","url":null,"abstract":"Guaranteeing a high availability of network services is a crucial part of network management. In this study, we show how to compute the availability of network services under earthquakes, by using empirical data. We take a multi-disciplinary approach and create an earthquake model based on seismological research and historical data. We then show how to integrate this empirical disaster model into existing network resiliency models to obtain the vulnerability and availability of a network under earthquakes. While previous studies have applied their models to ground shaking hazard models or earthquake scenarios, we compute (1) earthquake activity rates and (2) a relation between magnitude and disaster area, and use both as input data for our modeling. This approach is more in line with existing network resiliency models: it provides better information on the correlation between link failures than ground shaking hazard models and a more comprehensive view than a fixed set of scenarios.","PeriodicalId":120852,"journal":{"name":"2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128985602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Solving The Backup Controller Placement Problem In SDN Under Simultaneous Targeted Attacks 同时目标攻击下SDN备份控制器放置问题的解决
Pub Date : 2019-10-01 DOI: 10.1109/RNDM48015.2019.8949096
E. Calle, Sergio G. Cosgaya, D. Martinez, M. Pióro
Targeted attacks on software defined networks (SDN) can heavily disrupt the network connectivity and thus service continuity. One of the worst disruptions occurs when a targeted attack on network nodes is able to divide the network into different components (islands). Since the network is usually managed by a limited number of controllers, such attacks can result in isolating a significant proportion of nodes from the surviving controllers, causing major disruptions in service availability. In the paper we study the issue of adding a number of additional controllers to the network in order to increase its resilience to targeted attacks. For that we introduce an original optimization model for solving the related controller placement problem, based on a novel measure of network service availability called average network resilience (ANR). Additionally, we analyse two strategies to generate simultaneous targeted attack scenarios used in the numerical study illustrating the model effectiveness.
针对软件定义网络(SDN)的针对性攻击会严重破坏网络连通性,从而影响业务的连续性。当对网络节点的目标攻击能够将网络划分为不同的组件(孤岛)时,最严重的中断之一就会发生。由于网络通常由有限数量的控制器管理,因此这种攻击可能导致很大一部分节点与幸存的控制器隔离,从而导致服务可用性的严重中断。在本文中,我们研究了在网络中添加一些额外的控制器以增加其对目标攻击的弹性的问题。为此,我们引入了一个原始的优化模型来解决相关的控制器放置问题,该模型基于一种称为平均网络弹性(ANR)的网络服务可用性的新度量。此外,我们还分析了在数值研究中使用的两种生成同步目标攻击场景的策略,以说明模型的有效性。
{"title":"Solving The Backup Controller Placement Problem In SDN Under Simultaneous Targeted Attacks","authors":"E. Calle, Sergio G. Cosgaya, D. Martinez, M. Pióro","doi":"10.1109/RNDM48015.2019.8949096","DOIUrl":"https://doi.org/10.1109/RNDM48015.2019.8949096","url":null,"abstract":"Targeted attacks on software defined networks (SDN) can heavily disrupt the network connectivity and thus service continuity. One of the worst disruptions occurs when a targeted attack on network nodes is able to divide the network into different components (islands). Since the network is usually managed by a limited number of controllers, such attacks can result in isolating a significant proportion of nodes from the surviving controllers, causing major disruptions in service availability. In the paper we study the issue of adding a number of additional controllers to the network in order to increase its resilience to targeted attacks. For that we introduce an original optimization model for solving the related controller placement problem, based on a novel measure of network service availability called average network resilience (ANR). Additionally, we analyse two strategies to generate simultaneous targeted attack scenarios used in the numerical study illustrating the model effectiveness.","PeriodicalId":120852,"journal":{"name":"2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128458008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modeling Transmission Degradation on FSO Links Caused by Weather Phenomena for WMN Optimization 天气现象下FSO链路传输退化建模与WMN优化
Pub Date : 2019-10-01 DOI: 10.1109/RNDM48015.2019.8949155
Marinela Shehaj, I. Kalesnikau, D. Nace, M. Pióro, Ermioni Qafzezi
This work deals with wireless mesh networks (WMN) composed of FSO (free space optics) links. Although FSO links realize broadband transmission at low cost, their drawback is sensitivity to adverse weather conditions causing transmission degradation on multiple links. Hence, designing such FSO networks requires an optimization model to find the cheapest configuration of link capacities that will be able to carry an acceptable level of the demanded traffic in all weather states that can be foreseen in network operation. Such a model can be achieved using robust optimization techniques, and for that it is important to find a tractable way of characterizing possible link (capacity) degradation states corresponding to weather conditions not known in advance. In the paper we show how weather records can be translated to vectors of link capacity available (after degradation) in particular weather states, and how the resulting link degradation states may be represented mathematically in a compact and tractable way to be exploited in optimization. To solve the second task we will make use of a generalization of a combinatorial problem of finding a minimum hitting set to deduce a compact set approximating a given set of link degradation states. Finally, we illustrate the effectiveness of our model by means of a numerical study.
这项工作涉及由自由空间光学链路组成的无线网状网络(WMN)。虽然FSO链路以较低的成本实现了宽带传输,但其缺点是对恶劣天气条件的敏感性,导致多链路上的传输退化。因此,设计这样的FSO网络需要一个优化模型,以找到最便宜的链路容量配置,能够在网络运行中可以预见的所有天气状态下承载可接受的所需流量水平。这样的模型可以使用鲁棒优化技术来实现,因此,找到一种易于处理的方法来表征与事先未知的天气条件相对应的可能的链路(容量)退化状态是很重要的。在本文中,我们展示了如何将天气记录转换为特定天气状态下可用链路容量(退化后)的向量,以及如何以紧凑和易于处理的方式在数学上表示由此产生的链路退化状态,以便在优化中利用。为了解决第二个任务,我们将利用寻找最小命中集的组合问题的推广来推导近似给定链路退化状态集的紧集。最后,通过数值研究说明了模型的有效性。
{"title":"Modeling Transmission Degradation on FSO Links Caused by Weather Phenomena for WMN Optimization","authors":"Marinela Shehaj, I. Kalesnikau, D. Nace, M. Pióro, Ermioni Qafzezi","doi":"10.1109/RNDM48015.2019.8949155","DOIUrl":"https://doi.org/10.1109/RNDM48015.2019.8949155","url":null,"abstract":"This work deals with wireless mesh networks (WMN) composed of FSO (free space optics) links. Although FSO links realize broadband transmission at low cost, their drawback is sensitivity to adverse weather conditions causing transmission degradation on multiple links. Hence, designing such FSO networks requires an optimization model to find the cheapest configuration of link capacities that will be able to carry an acceptable level of the demanded traffic in all weather states that can be foreseen in network operation. Such a model can be achieved using robust optimization techniques, and for that it is important to find a tractable way of characterizing possible link (capacity) degradation states corresponding to weather conditions not known in advance. In the paper we show how weather records can be translated to vectors of link capacity available (after degradation) in particular weather states, and how the resulting link degradation states may be represented mathematically in a compact and tractable way to be exploited in optimization. To solve the second task we will make use of a generalization of a combinatorial problem of finding a minimum hitting set to deduce a compact set approximating a given set of link degradation states. Finally, we illustrate the effectiveness of our model by means of a numerical study.","PeriodicalId":120852,"journal":{"name":"2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129832417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resilient Dataflow Graph Embedding for Programmable Software Switches 可编程软件交换机弹性数据流图嵌入
Pub Date : 2019-10-01 DOI: 10.1109/RNDM48015.2019.8949149
Tamás Lévai, G. Rétvári
Programmable software switches have become crucial building blocks in a wide range of applications, from (virtual) data center networking to telco clouds. Modern use-cases, such as 5G, require very low latency, large throughput, and high availability. Software switches generally realize the packet processing pipeline as a dataflow graph: graph nodes correspond to simple packet processing operations and graph edges represent the control flow. The efficiency and dependability of the software switch critically depends on the way the dataflow graph is mapped to the underlying hardware resources. In this paper, we focus on dataflow graph embedding in a software switching context. We present an embedding approach which minimizes performance loss on inter-CPU communication across packet-processing control flow chains, and is resilient against a single CPU failure. The embedding is easy to generalize to $N$ CPU failures. We formulate the dataflow graph embedding problem as a mathematical program, characterize the computational complexity, and we propose optimal and heuristic algorithms to solve it. The viability of our approach is confirmed in comprehensive numerical analysis on a 5G packet processing pipeline, taken from an industrial 5G NFV benchmark suite.
可编程软件交换机已成为从(虚拟)数据中心网络到电信云等广泛应用的重要组成部分。现代用例,如5G,需要非常低的延迟、大吞吐量和高可用性。软件交换机一般将包处理管道实现为数据流图,图节点对应简单的包处理操作,图边表示控制流。软件交换机的效率和可靠性在很大程度上取决于数据流图映射到底层硬件资源的方式。本文主要研究软件交换环境下的数据流图嵌入问题。我们提出了一种嵌入方法,它最大限度地减少了跨包处理控制流链的CPU间通信的性能损失,并且对单个CPU故障具有弹性。嵌入很容易推广到$N$ CPU故障。我们将数据流图嵌入问题表述为一个数学程序,描述了计算复杂度,并提出了最优算法和启发式算法来解决它。我们的方法的可行性在5G分组处理管道的综合数值分析中得到了证实,该管道取自工业5G NFV基准套件。
{"title":"Resilient Dataflow Graph Embedding for Programmable Software Switches","authors":"Tamás Lévai, G. Rétvári","doi":"10.1109/RNDM48015.2019.8949149","DOIUrl":"https://doi.org/10.1109/RNDM48015.2019.8949149","url":null,"abstract":"Programmable software switches have become crucial building blocks in a wide range of applications, from (virtual) data center networking to telco clouds. Modern use-cases, such as 5G, require very low latency, large throughput, and high availability. Software switches generally realize the packet processing pipeline as a dataflow graph: graph nodes correspond to simple packet processing operations and graph edges represent the control flow. The efficiency and dependability of the software switch critically depends on the way the dataflow graph is mapped to the underlying hardware resources. In this paper, we focus on dataflow graph embedding in a software switching context. We present an embedding approach which minimizes performance loss on inter-CPU communication across packet-processing control flow chains, and is resilient against a single CPU failure. The embedding is easy to generalize to $N$ CPU failures. We formulate the dataflow graph embedding problem as a mathematical program, characterize the computational complexity, and we propose optimal and heuristic algorithms to solve it. The viability of our approach is confirmed in comprehensive numerical analysis on a 5G packet processing pipeline, taken from an industrial 5G NFV benchmark suite.","PeriodicalId":120852,"journal":{"name":"2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1