首页 > 最新文献

2017 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
Rapid detection of disobedient forwarding on compromised OpenFlow switches 在受损的OpenFlow交换机上快速检测不服从转发
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876210
Yen-Chun Chiu, Po-Ching Lin
Software-defined networking (SDN) allows network administrators to manage network flows easily from a centralized controller. However, it also leads to new security threats to applications, controllers, OpenFlow switches, topology management and so on. In this work, we design a method to detect disobedient forwarding in the flow table by compromising a switch. To enhance detection efficiency and minimize additional network traffic, we reduce the number of detection packets necessary by aggregating the flow entries. This method selects the flow entries whose match fields can compose a valid packet from multiple switches. The switches on which the entries are form a path that allows the packet to travel through for rapid detection. We evaluate the efficiency of this detection method for various topology types in typical data center networks by Mininet simulation. The experimental results demonstrate that this method can examine the forwarding correctness of around 3 flow entries simultaneously for each detection packet in fat-tree topology. Furthermore, the scale of the network topology does not affect the efficiency of the method significantly.
软件定义网络(SDN)允许网络管理员从集中控制器轻松管理网络流。然而,它也给应用程序、控制器、OpenFlow交换机、拓扑管理等带来了新的安全威胁。在这项工作中,我们设计了一种通过妥协开关来检测流表中不服从转发的方法。为了提高检测效率和减少额外的网络流量,我们通过聚合流条目来减少检测数据包的数量。此方法选择匹配字段可以组成来自多个交换机的有效数据包的流项。条目所在的交换机形成一条路径,允许数据包通过该路径进行快速检测。通过Mininet仿真,对典型数据中心网络中各种拓扑类型的检测方法进行了效率评估。实验结果表明,该方法可以同时检测胖树拓扑中每个检测报文的3个左右流项的转发正确性。此外,网络拓扑的规模对方法的效率没有显著影响。
{"title":"Rapid detection of disobedient forwarding on compromised OpenFlow switches","authors":"Yen-Chun Chiu, Po-Ching Lin","doi":"10.1109/ICCNC.2017.7876210","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876210","url":null,"abstract":"Software-defined networking (SDN) allows network administrators to manage network flows easily from a centralized controller. However, it also leads to new security threats to applications, controllers, OpenFlow switches, topology management and so on. In this work, we design a method to detect disobedient forwarding in the flow table by compromising a switch. To enhance detection efficiency and minimize additional network traffic, we reduce the number of detection packets necessary by aggregating the flow entries. This method selects the flow entries whose match fields can compose a valid packet from multiple switches. The switches on which the entries are form a path that allows the packet to travel through for rapid detection. We evaluate the efficiency of this detection method for various topology types in typical data center networks by Mininet simulation. The experimental results demonstrate that this method can examine the forwarding correctness of around 3 flow entries simultaneously for each detection packet in fat-tree topology. Furthermore, the scale of the network topology does not affect the efficiency of the method significantly.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126177958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An analytical study of the Primary User activity pattern effect on the performance of cooperative opportunistic networks 主要用户活动模式对合作机会网络性能影响的分析研究
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876225
Mohamed Abdelraheem, Mustafa ElNainay
Dynamic Spectrum access (DSA) is a promising solution to solve the spectrum scarcity problem by allowing unlicensed user (a.k.a Secondary User (SU)) to access the licensed spectrum in a way that does not harm the spectrum owner (a.k.a Primary User (PU)). The SU's performance can be further enhanced by utilizing cooperative transmission via an intermediate relay instead of using direct transmission. In this paper, we study the effect of the PU activity pattern on the performance of SU in cooperative opportunistic network. The interaction between the primary and secondary transmissions are modeled using discrete time Markov chain in cooperative and non-cooperative secondary transmissions modes. By using this model, we quantify the effect of the PU transmission pattern on the SU transmission performance. The results show that the cooperative transmission has a superior performance over the direct transmission. Moreover, the gap in the performance increases as the PU channel utilization level increases and/or the PU packets become more discontinuous.
动态频谱接入(Dynamic Spectrum access, DSA)是一种很有前途的解决频谱短缺问题的方法,它允许未授权用户(Secondary user, SU)在不损害频谱所有者(Primary user, PU)的情况下访问已授权的频谱。利用中间中继的协同传输代替直接传输,可以进一步提高SU的性能。本文研究了合作机会网络中PU活动模式对SU性能的影响。采用离散时间马尔可夫链对合作和非合作二次传输模式下的主、次传输相互作用进行了建模。通过该模型,我们量化了PU传输模式对SU传输性能的影响。结果表明,与直接传动相比,合作传动具有更优越的性能。此外,随着PU通道利用率的增加和/或PU数据包变得更加不连续,性能差距也会增加。
{"title":"An analytical study of the Primary User activity pattern effect on the performance of cooperative opportunistic networks","authors":"Mohamed Abdelraheem, Mustafa ElNainay","doi":"10.1109/ICCNC.2017.7876225","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876225","url":null,"abstract":"Dynamic Spectrum access (DSA) is a promising solution to solve the spectrum scarcity problem by allowing unlicensed user (a.k.a Secondary User (SU)) to access the licensed spectrum in a way that does not harm the spectrum owner (a.k.a Primary User (PU)). The SU's performance can be further enhanced by utilizing cooperative transmission via an intermediate relay instead of using direct transmission. In this paper, we study the effect of the PU activity pattern on the performance of SU in cooperative opportunistic network. The interaction between the primary and secondary transmissions are modeled using discrete time Markov chain in cooperative and non-cooperative secondary transmissions modes. By using this model, we quantify the effect of the PU transmission pattern on the SU transmission performance. The results show that the cooperative transmission has a superior performance over the direct transmission. Moreover, the gap in the performance increases as the PU channel utilization level increases and/or the PU packets become more discontinuous.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124640340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Traffic Diversion in SDN: testbed vs Mininet SDN中的动态流量分流:试验台与Mininet
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876121
R. Barrett, Andre Facey, Welile Nxumalo, Joshua Rogers, Phil Vatcher, M. St-Hilaire
In this paper, we first propose a simple Dynamic Traffic Diversion (DTD) algorithm for Software Defined Networks (SDN). After implementing the algorithm inside the controller, we then compare the results obtained under two different test environments: 1) a testbed using real Cisco equipment and 2) a network emulation using Mininet. From the results, we get two key messages. First, we can clearly see that dynamically diverting important traffic on a backup path will prevent packet loss and reduce jitter. Finally, the two test environments provide relatively similar results. The small differences could be explained by the early field trial image that was used on the Cisco equipment and by the many setting parameters that are available in both environments.
在本文中,我们首先为软件定义网络(SDN)提出了一种简单的动态流量分流(DTD)算法。在控制器内部实现算法后,我们比较了两种不同测试环境下的结果:1)使用真实Cisco设备的测试平台和2)使用Mininet的网络仿真。从结果中,我们得到了两个关键信息。首先,我们可以清楚地看到,在备份路径上动态地转移重要流量将防止丢包并减少抖动。最后,这两个测试环境提供了相对相似的结果。这些微小的差异可以解释为Cisco设备上使用的早期现场试验图像,以及两种环境中可用的许多设置参数。
{"title":"Dynamic Traffic Diversion in SDN: testbed vs Mininet","authors":"R. Barrett, Andre Facey, Welile Nxumalo, Joshua Rogers, Phil Vatcher, M. St-Hilaire","doi":"10.1109/ICCNC.2017.7876121","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876121","url":null,"abstract":"In this paper, we first propose a simple Dynamic Traffic Diversion (DTD) algorithm for Software Defined Networks (SDN). After implementing the algorithm inside the controller, we then compare the results obtained under two different test environments: 1) a testbed using real Cisco equipment and 2) a network emulation using Mininet. From the results, we get two key messages. First, we can clearly see that dynamically diverting important traffic on a backup path will prevent packet loss and reduce jitter. Finally, the two test environments provide relatively similar results. The small differences could be explained by the early field trial image that was used on the Cisco equipment and by the many setting parameters that are available in both environments.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124796547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Federated Cloud computing as System of Systems 联邦云计算作为系统的系统
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876217
Yahav Biran, G. Collins, Syed Azam, J. Dubow
Energy and resource utilization efficiency are two of the most significant differentiators in the contemporary Cloud computing marketplace. This paper addresses both of these from system of systems architectural and optimization viewpoints. Our approach will allow multiple cloud providers to optimally utilize compute resources. It will do this by (1) lowering the datacenters deployments per provider ratio, share and (2) scheduling available energy via aggregators and (3) lastly to employ, where appropriate, more renewable and carbon free engines. This is an embodiment of a cloud-federation, and will be treated as a System of Systems. This new cloud federation SoS paradigm will develop a new control methodology that is both financially attractive and energetically and environmentally advantageous. It supports dynamic expansion and contraction of computing capabilities for handling sudden variations in service demand. As is expected, the constituent cloud services retain independent ownership, objectives, funding, and sustainability means. While individual system behavior within the SoS is independently managed, the SoS as control structure might introduce cascading effect that impacts the overall SoS behavior. This paper analyzes the core SoS requirements, concept synthesis, and functional architecture. Finally, we suggest a physical architecture that simulates some of the main SoS emergent behavior to diminish unwanted outcomes while encouraging desirable results.
能源和资源利用效率是当代云计算市场中两个最重要的区别。本文从系统的体系结构和优化的角度来解决这两个问题。我们的方法将允许多个云提供商以最佳方式利用计算资源。它将通过(1)降低每个供应商的数据中心部署比例,共享和(2)通过聚合器调度可用能源;(3)最后,在适当的情况下,使用更多的可再生和无碳引擎。这是云联盟的一个体现,将被视为系统的系统。这种新的云联盟SoS范例将开发一种新的控制方法,既具有经济吸引力,又在能源和环境方面具有优势。它支持动态扩展和收缩计算能力,以处理业务需求的突然变化。正如预期的那样,组成云服务保留独立的所有权、目标、资金和可持续性手段。虽然SoS内部的个体系统行为是独立管理的,但作为控制结构的SoS可能会引入影响整体SoS行为的级联效应。本文分析了核心SoS的需求、概念综合和功能架构。最后,我们建议一个物理架构,模拟一些主要的SoS紧急行为,以减少不想要的结果,同时鼓励理想的结果。
{"title":"Federated Cloud computing as System of Systems","authors":"Yahav Biran, G. Collins, Syed Azam, J. Dubow","doi":"10.1109/ICCNC.2017.7876217","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876217","url":null,"abstract":"Energy and resource utilization efficiency are two of the most significant differentiators in the contemporary Cloud computing marketplace. This paper addresses both of these from system of systems architectural and optimization viewpoints. Our approach will allow multiple cloud providers to optimally utilize compute resources. It will do this by (1) lowering the datacenters deployments per provider ratio, share and (2) scheduling available energy via aggregators and (3) lastly to employ, where appropriate, more renewable and carbon free engines. This is an embodiment of a cloud-federation, and will be treated as a System of Systems. This new cloud federation SoS paradigm will develop a new control methodology that is both financially attractive and energetically and environmentally advantageous. It supports dynamic expansion and contraction of computing capabilities for handling sudden variations in service demand. As is expected, the constituent cloud services retain independent ownership, objectives, funding, and sustainability means. While individual system behavior within the SoS is independently managed, the SoS as control structure might introduce cascading effect that impacts the overall SoS behavior. This paper analyzes the core SoS requirements, concept synthesis, and functional architecture. Finally, we suggest a physical architecture that simulates some of the main SoS emergent behavior to diminish unwanted outcomes while encouraging desirable results.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128215771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Resource allocation for IoT applications in cloud environments 云环境下物联网应用的资源分配
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876218
Anandeshwar Singh, Y. Viniotis
In an IoT cloud, the message broker service offered to customers allows customer's devices and applications to connect and interact with cloud applications and other devices. The service is governed by Service Level Agreements (SLA) that specify, among other requirements, the volume of messages served during an enforcement period. For simplicity, SLAs do not take into account detailed information about message arrival patterns or service times, making enforcement of the SLA a challenging problem for the providers. In this paper, we propose a resource allocation mechanism (that uses buffering, scheduling and rate limiting) to meet the SLA. We verify that the solution achieves conformance, analyze the tradeoffs of the solution and evaluate via simulation the effects of system parameters such as capacity and enforcement period.
在物联网云中,提供给客户的消息代理服务允许客户的设备和应用程序与云应用程序和其他设备连接并交互。该服务由服务水平协议(SLA)管理,该协议除其他需求外,还指定了在实施期间服务的消息量。为简单起见,SLA不考虑有关消息到达模式或服务时间的详细信息,这使得SLA的实施对提供者来说是一个具有挑战性的问题。在本文中,我们提出了一种资源分配机制(使用缓冲、调度和速率限制)来满足SLA。我们验证了解决方案的一致性,分析了解决方案的权衡,并通过模拟评估了系统参数(如容量和执行周期)的影响。
{"title":"Resource allocation for IoT applications in cloud environments","authors":"Anandeshwar Singh, Y. Viniotis","doi":"10.1109/ICCNC.2017.7876218","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876218","url":null,"abstract":"In an IoT cloud, the message broker service offered to customers allows customer's devices and applications to connect and interact with cloud applications and other devices. The service is governed by Service Level Agreements (SLA) that specify, among other requirements, the volume of messages served during an enforcement period. For simplicity, SLAs do not take into account detailed information about message arrival patterns or service times, making enforcement of the SLA a challenging problem for the providers. In this paper, we propose a resource allocation mechanism (that uses buffering, scheduling and rate limiting) to meet the SLA. We verify that the solution achieves conformance, analyze the tradeoffs of the solution and evaluate via simulation the effects of system parameters such as capacity and enforcement period.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
IP packet header compression and user grouping for LTE Multimedia Broadcast Multicast Services LTE多媒体广播多播业务的IP包头压缩和用户分组
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876101
Chen Jiang, Wenhao Wu, Z. Ding
Multimedia Broadcast Multicast Service (MBMS)1 is an efficiency cellular strategy for shared content delivery, widely popular in Long Term Evolution (LTE) networks. Typical multimedia IP packets possess redundantly large headers, relying on Robust Header Compression (ROHC) for efficiency boost. This work investigates the adaptation of ROHC schemes for MBMS. We formulate and solve the optimization problem of transmission efficiency maximization in point-to-multipoint (P-t-M) transmission mode. Based on this solution, we propose a new MBMS scheme, namely point-to-multigroup (P-t-MG) transmission in which MBMS aim user groups. We provide a grouping and parameter optimization algorithm for P-t-MG to achieve high efficiency under total radio resource constraints. Numerical results demonstrate the advantage of the optimized P-t-M and the P-t-MG schemes over conventional MBMS.
多媒体广播多播服务(MBMS)1是一种高效的共享内容传输蜂窝策略,在长期演进(LTE)网络中广泛流行。典型的多媒体IP包具有冗余的大报头,依靠鲁棒报头压缩(ROHC)来提高效率。本研究探讨了ROHC方案对MBMS的适应性。提出并求解了点对多点(P-t-M)传输模式下传输效率最大化的优化问题。在此基础上,提出了一种新的MBMS方案,即以用户群为目标的点到多组(P-t-MG)传输方案。为了在总无线电资源约束下实现高效率,我们提出了一种P-t-MG分组和参数优化算法。数值结果表明,优化后的P-t-M和P-t-MG格式优于传统的MBMS格式。
{"title":"IP packet header compression and user grouping for LTE Multimedia Broadcast Multicast Services","authors":"Chen Jiang, Wenhao Wu, Z. Ding","doi":"10.1109/ICCNC.2017.7876101","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876101","url":null,"abstract":"Multimedia Broadcast Multicast Service (MBMS)1 is an efficiency cellular strategy for shared content delivery, widely popular in Long Term Evolution (LTE) networks. Typical multimedia IP packets possess redundantly large headers, relying on Robust Header Compression (ROHC) for efficiency boost. This work investigates the adaptation of ROHC schemes for MBMS. We formulate and solve the optimization problem of transmission efficiency maximization in point-to-multipoint (P-t-M) transmission mode. Based on this solution, we propose a new MBMS scheme, namely point-to-multigroup (P-t-MG) transmission in which MBMS aim user groups. We provide a grouping and parameter optimization algorithm for P-t-MG to achieve high efficiency under total radio resource constraints. Numerical results demonstrate the advantage of the optimized P-t-M and the P-t-MG schemes over conventional MBMS.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132382530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improving performance in industrial Internet of Things using multi-radio nodes and multiple gateways 利用多无线电节点和多网关提高工业物联网的性能
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876198
Jyotirmoy Banik, Ricardo Arjona, M. Tacca, M. Razo, A. Fumagalli, Kumaran Vijayasankar, Arvind Kandhalu
IEEE 802.15.4e is emerging as a robust standard for industrial Internet of Things. This standard is particularly effective for low power, multi-hop networks, and typically supports applications with low throughput. However, with the advances in energy harvesting, the need for supporting better performing solutions is also gaining momentum. This paper presents and analyses a modified link scheduling algorithm for IEEE 802.15.4e based solutions. Three approaches are considered. With the first approach, only the gateway node is equipped with multiple radios. With the second approach, non-gateway nodes are equipped with multiple radios as well. With the third approach, multiple single radio gateways are considered. Results from simulations have been presented to demonstrate the improvement in performance compared to the typical single radio, single gateway deployments.
IEEE 802.15.4e正在成为工业物联网的强大标准。该标准对于低功耗、多跳网络特别有效,并且通常支持低吞吐量的应用程序。然而,随着能量收集技术的进步,对支持性能更好的解决方案的需求也在增加。本文提出并分析了一种改进的基于IEEE 802.15.4e的链路调度算法。考虑了三种方法。使用第一种方法,只有网关节点配备了多个无线电。使用第二种方法,非网关节点也配备了多个无线电。对于第三种方法,考虑了多个单个无线网关。仿真结果表明,与典型的单无线电、单网关部署相比,该方案的性能有所提高。
{"title":"Improving performance in industrial Internet of Things using multi-radio nodes and multiple gateways","authors":"Jyotirmoy Banik, Ricardo Arjona, M. Tacca, M. Razo, A. Fumagalli, Kumaran Vijayasankar, Arvind Kandhalu","doi":"10.1109/ICCNC.2017.7876198","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876198","url":null,"abstract":"IEEE 802.15.4e is emerging as a robust standard for industrial Internet of Things. This standard is particularly effective for low power, multi-hop networks, and typically supports applications with low throughput. However, with the advances in energy harvesting, the need for supporting better performing solutions is also gaining momentum. This paper presents and analyses a modified link scheduling algorithm for IEEE 802.15.4e based solutions. Three approaches are considered. With the first approach, only the gateway node is equipped with multiple radios. With the second approach, non-gateway nodes are equipped with multiple radios as well. With the third approach, multiple single radio gateways are considered. Results from simulations have been presented to demonstrate the improvement in performance compared to the typical single radio, single gateway deployments.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and control in elastic optical networks: Issues, challenges, and research directions 弹性光网络的设计与控制:问题、挑战与研究方向
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876187
E. Oki, Bijoy Chand Chatterjee
The rapid growth in world-wide communications and the rapid adoption of the Internet has significantly modified our way of life. The traffic behavior is changing rapidly and the increasing mobility of traffic sources makes grooming more complex. To fulfill the needs of the future Internet, optical transmission and networking technologies are moving toward to the goals of greater efficiency, flexibility, and scalability. Recently, elastic optical networks (EONs), which adopt flexgrid technology, have been shown to be a promising candidate for future high-speed optical communication. An EON has the potential to allocate spectrum to lightpaths according to the bandwidth requirements of clients. This paper presents the EON, and provides possible scopes for the future research. Finally, the paper addresses a number of research challenges and open issues presented by elastic networks.
世界范围内通信的迅速发展和互联网的迅速采用极大地改变了我们的生活方式。交通行为正在迅速变化,交通来源的流动性日益增加,使得梳理变得更加复杂。为了满足未来互联网的需求,光传输和网络技术正朝着更高的效率、灵活性和可扩展性的目标发展。近年来,采用柔性网格技术的弹性光网络(EONs)已被证明是未来高速光通信的一个有前途的候选者。EON具有根据客户端带宽需求将频谱分配给光路的潜力。本文介绍了EON,并为未来的研究提供了可能的范围。最后,本文提出了弹性网络的一些研究挑战和有待解决的问题。
{"title":"Design and control in elastic optical networks: Issues, challenges, and research directions","authors":"E. Oki, Bijoy Chand Chatterjee","doi":"10.1109/ICCNC.2017.7876187","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876187","url":null,"abstract":"The rapid growth in world-wide communications and the rapid adoption of the Internet has significantly modified our way of life. The traffic behavior is changing rapidly and the increasing mobility of traffic sources makes grooming more complex. To fulfill the needs of the future Internet, optical transmission and networking technologies are moving toward to the goals of greater efficiency, flexibility, and scalability. Recently, elastic optical networks (EONs), which adopt flexgrid technology, have been shown to be a promising candidate for future high-speed optical communication. An EON has the potential to allocate spectrum to lightpaths according to the bandwidth requirements of clients. This paper presents the EON, and provides possible scopes for the future research. Finally, the paper addresses a number of research challenges and open issues presented by elastic networks.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A mobile ad hoc cloud for automated video surveillance system 用于自动视频监控系统的移动自组织云
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876271
Minseok Jang, Myong-Soon Park, Sayed Chhattan Shah
Mobile automated video surveillance systems deployed in mobile environments are used to monitor and analyze numerous situations and take necessary actions in real time. These systems include various mobile nodes equipped with numerous sensors and involve application of sophisticated image and video processing algorithms. The execution of these algorithms requires a vast amount of computing and storage resources. To address the issue a traditional approach is to send collected data to an application on a cloud accessible through an infrastructure-based system such as cellular network. This approach has several issues such as high transmission energy consumption and communication latency. In addition, this approach cannot be used in situations where pre-existing communication infrastructure is not available. This paper focuses on a recent approach in which multiple mobile devices interconnected through a mobile ad hoc network are combined to create a virtual supercomputing node called a mobile ad hoc cloud which is then used to support execution of automated video surveillance application. In order to fulfil real-time requirements associated with automated video surveillance application, a task allocation scheme has been proposed. Compared to existing schemes, proposed scheme focuses on deadline-oriented tasks and energy efficiency.
部署在移动环境中的移动自动视频监控系统用于监控和分析多种情况,并实时采取必要的行动。这些系统包括配备大量传感器的各种移动节点,并涉及复杂图像和视频处理算法的应用。这些算法的执行需要大量的计算和存储资源。要解决这个问题,传统的方法是将收集到的数据发送到通过基于基础设施的系统(如蜂窝网络)访问的云上的应用程序。该方法存在传输能耗高、通信延迟等问题。此外,这种方法不能用于没有现有通信基础设施的情况。本文重点介绍了一种最新的方法,其中通过移动自组织网络连接的多个移动设备组合在一起,创建一个称为移动自组织云的虚拟超级计算节点,然后用于支持自动视频监控应用程序的执行。为了满足自动化视频监控应用的实时性要求,提出了一种任务分配方案。与现有方案相比,提出的方案侧重于限期任务和能源效率。
{"title":"A mobile ad hoc cloud for automated video surveillance system","authors":"Minseok Jang, Myong-Soon Park, Sayed Chhattan Shah","doi":"10.1109/ICCNC.2017.7876271","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876271","url":null,"abstract":"Mobile automated video surveillance systems deployed in mobile environments are used to monitor and analyze numerous situations and take necessary actions in real time. These systems include various mobile nodes equipped with numerous sensors and involve application of sophisticated image and video processing algorithms. The execution of these algorithms requires a vast amount of computing and storage resources. To address the issue a traditional approach is to send collected data to an application on a cloud accessible through an infrastructure-based system such as cellular network. This approach has several issues such as high transmission energy consumption and communication latency. In addition, this approach cannot be used in situations where pre-existing communication infrastructure is not available. This paper focuses on a recent approach in which multiple mobile devices interconnected through a mobile ad hoc network are combined to create a virtual supercomputing node called a mobile ad hoc cloud which is then used to support execution of automated video surveillance application. In order to fulfil real-time requirements associated with automated video surveillance application, a task allocation scheme has been proposed. Compared to existing schemes, proposed scheme focuses on deadline-oriented tasks and energy efficiency.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121473785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An iterative FFT-based antenna subset modulation for secure millimeter wave communications 安全毫米波通信中基于fft的迭代天线子集调制
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876171
Chen Chen, Yue Dong, Xiang Cheng, Na Yi
Antenna subset modulation has been proposed as a physical layer security technique for millimeter-wave (mmWave) wireless communications. In antenna subset modulation, the transmitter selects a subset of antennas at the symbol rate to differ the sidelobes of the nonuniform arrays in undesired directions and orients the mainlobe in the target direction by steer beamforming. In this paper, we propose an optimized antenna subset selection based on an iterative fast Fourier transform (FFT) algorithm for large-scale arrays. The analysis shows that the computational complexity of our proposed algorithm is significantly reduced compared with existing algorithms. Apart from the low computational complexity, simulation results show that the proposed algorithm has smaller sidelobes than other existing algorithms. Even if an eavesdropper is sufficiently sensitive, it is impossible to recover information when the sidelobes is small. Therefore, our proposed algorithm can provide more security with low computational complexity.
天线子集调制作为毫米波(mmWave)无线通信的物理层安全技术被提出。在天线子集调制中,发射机以符号速率选择一组天线子集,使非均匀阵列的副瓣在不期望的方向上不同,并通过定向波束形成使主瓣在目标方向上定向。本文提出了一种基于迭代快速傅立叶变换(FFT)算法的天线子集优化选择方法。分析表明,与现有算法相比,本文算法的计算复杂度显著降低。仿真结果表明,该算法具有较低的计算复杂度,且副瓣比现有算法小。即使窃听者足够敏感,当副瓣很小时,也不可能恢复信息。因此,我们提出的算法能够以较低的计算复杂度提供更高的安全性。
{"title":"An iterative FFT-based antenna subset modulation for secure millimeter wave communications","authors":"Chen Chen, Yue Dong, Xiang Cheng, Na Yi","doi":"10.1109/ICCNC.2017.7876171","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876171","url":null,"abstract":"Antenna subset modulation has been proposed as a physical layer security technique for millimeter-wave (mmWave) wireless communications. In antenna subset modulation, the transmitter selects a subset of antennas at the symbol rate to differ the sidelobes of the nonuniform arrays in undesired directions and orients the mainlobe in the target direction by steer beamforming. In this paper, we propose an optimized antenna subset selection based on an iterative fast Fourier transform (FFT) algorithm for large-scale arrays. The analysis shows that the computational complexity of our proposed algorithm is significantly reduced compared with existing algorithms. Apart from the low computational complexity, simulation results show that the proposed algorithm has smaller sidelobes than other existing algorithms. Even if an eavesdropper is sufficiently sensitive, it is impossible to recover information when the sidelobes is small. Therefore, our proposed algorithm can provide more security with low computational complexity.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121553855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2017 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1