首页 > 最新文献

2017 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
Energy efficiency benefits of introducing optical switching in Data Center Networks 在数据中心网络中引入光交换的能效效益
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876250
Artur Pilimon, Alexandra Zeimpeki, A. M. Fagertun, S. Ruepp
In this paper we analyze the impact of WDM-enhanced optical circuit switching on the power consumption of multiple Data Center Network (DCN) architectures. Traditional three-tier Tree, Fat-Tree and a ring-based structure are evaluated and optical switching is selectively introduced on different layers of the network topology. The analysis is based on network-level simulations using a transport network planning tool applied to small-scale setups of the considered DCNs. The obtained results show that introducing all-optical switching within the DCN leads to reduced power consumption in all architectures, except the traditional Tree. This is caused by the inability to perform efficient traffic grooming and smaller average nodal degree of this architecture. Enabling optical switching only at the aggregation layer results in the highest energy savings in Fat-Tree and traditional Tree, while an optically switched core benefits most the ring-based network. For the latter, the core ring nodes need fewer long-reach transponders at the trunk interfaces and benefit from more efficient traffic grooming in the access part.
本文分析了wdm增强光电路交换对多数据中心网络(DCN)体系结构功耗的影响。评估了传统的三层树结构、胖树结构和环结构,并在网络拓扑的不同层选择性地引入光交换。该分析基于网络级模拟,使用传输网络规划工具应用于所考虑的dcn的小规模设置。结果表明,在DCN中引入全光交换可以降低除传统Tree外的所有架构的功耗。这是由于该架构无法执行有效的流量疏导和较小的平均节点度造成的。在Fat-Tree和传统Tree中,仅在汇聚层启用光交换的节能效果最高,而在环网中,光交换核心的效益最大。对于后者,核心环节点在中继接口上需要更少的长程转发器,并且在接入部分受益于更有效的流量疏导。
{"title":"Energy efficiency benefits of introducing optical switching in Data Center Networks","authors":"Artur Pilimon, Alexandra Zeimpeki, A. M. Fagertun, S. Ruepp","doi":"10.1109/ICCNC.2017.7876250","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876250","url":null,"abstract":"In this paper we analyze the impact of WDM-enhanced optical circuit switching on the power consumption of multiple Data Center Network (DCN) architectures. Traditional three-tier Tree, Fat-Tree and a ring-based structure are evaluated and optical switching is selectively introduced on different layers of the network topology. The analysis is based on network-level simulations using a transport network planning tool applied to small-scale setups of the considered DCNs. The obtained results show that introducing all-optical switching within the DCN leads to reduced power consumption in all architectures, except the traditional Tree. This is caused by the inability to perform efficient traffic grooming and smaller average nodal degree of this architecture. Enabling optical switching only at the aggregation layer results in the highest energy savings in Fat-Tree and traditional Tree, while an optically switched core benefits most the ring-based network. For the latter, the core ring nodes need fewer long-reach transponders at the trunk interfaces and benefit from more efficient traffic grooming in the access part.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Does bad news spread faster? 坏消息传播得更快吗?
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876232
Anna Fang, Zina Ben-Miled
Bad news travels fast. Although this concept may be intuitively accepted, there has been little evidence to confirm that the propagation of bad news differs from that of good news. In this paper, we examine the effect of user perspective on his or her sharing of a controversial news story. Social media not only offers insight into human behavior but has also developed as a source of news. In this paper, we define the spreading of news by tracking selected tweets in Twitter as they are shared over time to create models of user sharing behavior. Many news events can be viewed as positive or negative. In this paper, we compare and contrast tweets about these news events among general users, while monitoring the tweet frequency for each event over time to ensure that news events are comparable with respect to user interest. In addition, we track the tweets of a controversial event between two different groups of users (i.e., those who view the event as positive and those who view it as negative). As a result, we are able to make assessments based on a single event from two different perspectives.
坏消息传得快。虽然这一概念可能被直观地接受,但几乎没有证据证实坏消息的传播与好消息的传播不同。在本文中,我们研究了用户视角对他或她分享有争议的新闻故事的影响。社交媒体不仅提供了对人类行为的洞察,而且还发展成为新闻来源。在本文中,我们通过跟踪Twitter中随时间共享的选定tweet来定义新闻的传播,以创建用户共享行为的模型。许多新闻事件可以被看作是正面的,也可以是负面的。在本文中,我们比较和对比了普通用户关于这些新闻事件的推文,同时随着时间的推移监控每个事件的推文频率,以确保新闻事件在用户兴趣方面具有可比性。此外,我们跟踪两个不同用户组(即,那些认为该事件是积极的和那些认为它是消极的)之间的争议事件的推文。因此,我们能够从两个不同的角度对单个事件进行评估。
{"title":"Does bad news spread faster?","authors":"Anna Fang, Zina Ben-Miled","doi":"10.1109/ICCNC.2017.7876232","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876232","url":null,"abstract":"Bad news travels fast. Although this concept may be intuitively accepted, there has been little evidence to confirm that the propagation of bad news differs from that of good news. In this paper, we examine the effect of user perspective on his or her sharing of a controversial news story. Social media not only offers insight into human behavior but has also developed as a source of news. In this paper, we define the spreading of news by tracking selected tweets in Twitter as they are shared over time to create models of user sharing behavior. Many news events can be viewed as positive or negative. In this paper, we compare and contrast tweets about these news events among general users, while monitoring the tweet frequency for each event over time to ensure that news events are comparable with respect to user interest. In addition, we track the tweets of a controversial event between two different groups of users (i.e., those who view the event as positive and those who view it as negative). As a result, we are able to make assessments based on a single event from two different perspectives.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126830054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey of social-based routing protocols in Delay Tolerant Networks 时延容忍网络中基于社交的路由协议综述
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876231
Jacqueline Hom, Lauren Good, Shuhui Yang
Delay tolerant networks (DTN) require innovation in routing technology because of the intermittent connectivity of the nodes in the network. Routing must account for the delay in connection. Some recent routing protocols use the social features of the nodes to aid in this process. These protocols may be categorized based on the number of message copies they produce, the number of destinations, and further the methods by which they select a relay node. Some issues are raised that must be addressed in further research, including buffer space management, energy efficiency, and adaptability.
容忍延迟网络(Delay tolerance network, DTN)由于网络中节点的间歇性连接,需要在路由技术上进行创新。路由必须考虑到连接中的延迟。最近的一些路由协议使用节点的社交特性来帮助完成这个过程。这些协议可以根据它们产生的消息副本的数量、目的地的数量以及它们选择中继节点的方法来分类。提出了一些必须在进一步研究中解决的问题,包括缓冲空间管理、能源效率和适应性。
{"title":"A survey of social-based routing protocols in Delay Tolerant Networks","authors":"Jacqueline Hom, Lauren Good, Shuhui Yang","doi":"10.1109/ICCNC.2017.7876231","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876231","url":null,"abstract":"Delay tolerant networks (DTN) require innovation in routing technology because of the intermittent connectivity of the nodes in the network. Routing must account for the delay in connection. Some recent routing protocols use the social features of the nodes to aid in this process. These protocols may be categorized based on the number of message copies they produce, the number of destinations, and further the methods by which they select a relay node. Some issues are raised that must be addressed in further research, including buffer space management, energy efficiency, and adaptability.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"417 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Cooperative spectrum sharing with energy harvesting best secondary user selection and non-orthogonal multiple access 基于能量收集的协同频谱共享、最佳二次用户选择和非正交多址
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876100
Md. Fazlul Kader, M. Shahab, S. Shin
We propose two novel cooperative spectrum sharing (CSS) protocols by using time-switching and power-splitting based energy harvesting (EH), namely CSS-TSP and CSS-PSP, respectively. The considered system consists of a set of energy constrained secondary transmitters (STs) that cooperate with the primary user to forward its symbol. All STs rely on the harvested energy from the source signal to forward the primary symbol. In exchange of cooperation, one of the STs behaving as the best EH decode-and-forward relay (STbr) gets channel access simultaneously with the primary user according to the non-orthogonal multiple access. Two STbr selection strategies, namely STbr selection based on harvested energy in current block of time and STbr selection based on harvested energy from current plus previous blocks of time, have been proposed. The distributed nature of the STbr selection in the proposed schemes to forward the primary symbol increases the network lifetime. We have investigated the achievable sum data rate/throughput of both CSS-TSP and CSS-PSP. Moreover, the optimal EH ratio that maximizes the sum data rate of both protocols is also investigated numerically.
本文提出了基于时间交换和功率分裂的能量收集(EH)两种新型的协同频谱共享(CSS)协议,即CSS- tsp和CSS- psp。所考虑的系统由一组能量受限的二次发射机(STs)组成,它们与主用户合作转发其符号。所有st都依靠从源信号中收集的能量来转发主符号。作为合作交换,其中一个STs作为最佳的EH译码转发中继(STbr),根据非正交多址,与主用户同时进行信道访问。提出了两种STbr选择策略,即基于当前时间段的收获能量进行STbr选择和基于当前和之前时间段的收获能量进行STbr选择。在所提出的转发主符号的方案中,STbr选择的分布式特性增加了网络的生存期。我们研究了CSS-TSP和CSS-PSP可实现的总数据速率/吞吐量。此外,本文还对两种协议的最优EH比进行了数值研究。
{"title":"Cooperative spectrum sharing with energy harvesting best secondary user selection and non-orthogonal multiple access","authors":"Md. Fazlul Kader, M. Shahab, S. Shin","doi":"10.1109/ICCNC.2017.7876100","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876100","url":null,"abstract":"We propose two novel cooperative spectrum sharing (CSS) protocols by using time-switching and power-splitting based energy harvesting (EH), namely CSS-TSP and CSS-PSP, respectively. The considered system consists of a set of energy constrained secondary transmitters (STs) that cooperate with the primary user to forward its symbol. All STs rely on the harvested energy from the source signal to forward the primary symbol. In exchange of cooperation, one of the STs behaving as the best EH decode-and-forward relay (STbr) gets channel access simultaneously with the primary user according to the non-orthogonal multiple access. Two STbr selection strategies, namely STbr selection based on harvested energy in current block of time and STbr selection based on harvested energy from current plus previous blocks of time, have been proposed. The distributed nature of the STbr selection in the proposed schemes to forward the primary symbol increases the network lifetime. We have investigated the achievable sum data rate/throughput of both CSS-TSP and CSS-PSP. Moreover, the optimal EH ratio that maximizes the sum data rate of both protocols is also investigated numerically.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122794747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Game theoretical analysis of coexistence in MIMO-empowered Cognitive Radio Networks mimo授权认知无线电网络共存的博弈论分析
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876119
Yantian Hou, Ming Li, Dejun Yang
In Cognitive Radio Networks (CRNs), the spectrum underlay approach enables primary and secondary networks to transmit simultaneously, as long as the interference from the secondary network to the primary network is below certain threshold. As the recent advancement of the underlay approach, the transparent coexistence exploiting MIMO interference cancellation was proposed. Previous works assume that the secondary networks will completely follow the spectrum access rules by restricting their interference towards the primary network. However, this assumption might be invalid in practice due to the selfish nature of CRN users. In this work, we study the multi-hop MIMO-empowered secondary network's incentives of following or violating this rule through compliantly canceling or non-compliantly ignoring its interferences towards the primary network. Specifically, we model the coexistence between the primary and secondary networks as a Stackelberg game. The equilibriums reveal the secondary network's non-compliant incentives. These insights help in developing the methodology to deal with such type of selfish secondary networks.
在认知无线网络(crn)中,只要从网络对主网络的干扰低于一定阈值,频谱底层方法就可以使主从网络同时传输。作为底层方法的最新进展,利用MIMO干扰抵消的透明共存被提出。以往的工作假设副网通过限制对主网的干扰,完全遵循频谱接入规则。然而,由于CRN用户的自私性,这种假设在实践中可能是无效的。在这项工作中,我们研究了多跳mimo授权的辅助网络遵循或违反这一规则的动机,通过顺从地取消或不顺从地忽略其对主网络的干扰。具体来说,我们将主要和次要网络之间的共存建模为Stackelberg游戏。该均衡揭示了二级网络的非服从激励。这些见解有助于开发处理此类自私次级网络的方法。
{"title":"Game theoretical analysis of coexistence in MIMO-empowered Cognitive Radio Networks","authors":"Yantian Hou, Ming Li, Dejun Yang","doi":"10.1109/ICCNC.2017.7876119","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876119","url":null,"abstract":"In Cognitive Radio Networks (CRNs), the spectrum underlay approach enables primary and secondary networks to transmit simultaneously, as long as the interference from the secondary network to the primary network is below certain threshold. As the recent advancement of the underlay approach, the transparent coexistence exploiting MIMO interference cancellation was proposed. Previous works assume that the secondary networks will completely follow the spectrum access rules by restricting their interference towards the primary network. However, this assumption might be invalid in practice due to the selfish nature of CRN users. In this work, we study the multi-hop MIMO-empowered secondary network's incentives of following or violating this rule through compliantly canceling or non-compliantly ignoring its interferences towards the primary network. Specifically, we model the coexistence between the primary and secondary networks as a Stackelberg game. The equilibriums reveal the secondary network's non-compliant incentives. These insights help in developing the methodology to deal with such type of selfish secondary networks.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123036493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed responder ARP: Using SDN to re-engineer ARP from within the network 分布式响应ARP:使用SDN从网络内部重新设计ARP
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876211
Mark Alan Matties
We present the architecture and partial proof of concept implementation of distributed responder ARP (DR-ARP), a software defined networking (SDN) enabled enhancement of the standard address resolution protocol (ARP). It is intended to improve network security and performance by exerting much greater control over how ARP traffic flows through the network as well as over what actually delivers the ARP service. Using SDN to centralize this service improves the security and performance of ARP in a way transparent to the end hosts.
我们提出了分布式响应器ARP (DR-ARP)的体系结构和部分概念实现证明,这是一种软件定义网络(SDN)对标准地址解析协议(ARP)的增强。它旨在通过对ARP流量如何流经网络以及实际提供ARP服务的内容施加更大的控制来提高网络安全性和性能。通过SDN将该业务集中起来,以对终端主机透明的方式提高ARP的安全性和性能。
{"title":"Distributed responder ARP: Using SDN to re-engineer ARP from within the network","authors":"Mark Alan Matties","doi":"10.1109/ICCNC.2017.7876211","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876211","url":null,"abstract":"We present the architecture and partial proof of concept implementation of distributed responder ARP (DR-ARP), a software defined networking (SDN) enabled enhancement of the standard address resolution protocol (ARP). It is intended to improve network security and performance by exerting much greater control over how ARP traffic flows through the network as well as over what actually delivers the ARP service. Using SDN to centralize this service improves the security and performance of ARP in a way transparent to the end hosts.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131740759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Delay and quality metrics in Voice over LTE (VoLTE) networks: An end-terminal perspective LTE语音(VoLTE)网络中的延迟和质量度量:终端-终端视角
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876205
Najmeddine Majed, S. Ragot, X. Lagrange, Alberto Blanc
In this paper we evaluate metrics specified in 3GPP to characterize trade-offs between delay and quality of Voice over LTE (VoLTE) mobile phones in various network conditions. We report test results on clock accuracy, terminal delay in uplink and downlink under error-free conditions, as well as delay and quality in the presence of packet losses and network jitter. We discuss how the underlying methodology intended for delay testing can be extended to evaluate de-jitter buffer performance using a black-box approach, and how to model VoLTE packet delay/loss characteristics in a realistic way.
在本文中,我们评估了3GPP中指定的指标,以表征各种网络条件下LTE语音(VoLTE)移动电话的延迟和质量之间的权衡。我们报告了时钟精度、无差错条件下上行和下行链路的终端延迟以及存在丢包和网络抖动的延迟和质量的测试结果。我们讨论了用于延迟测试的基础方法如何扩展到使用黑盒方法评估去抖动缓冲性能,以及如何以现实的方式建模VoLTE数据包延迟/丢失特性。
{"title":"Delay and quality metrics in Voice over LTE (VoLTE) networks: An end-terminal perspective","authors":"Najmeddine Majed, S. Ragot, X. Lagrange, Alberto Blanc","doi":"10.1109/ICCNC.2017.7876205","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876205","url":null,"abstract":"In this paper we evaluate metrics specified in 3GPP to characterize trade-offs between delay and quality of Voice over LTE (VoLTE) mobile phones in various network conditions. We report test results on clock accuracy, terminal delay in uplink and downlink under error-free conditions, as well as delay and quality in the presence of packet losses and network jitter. We discuss how the underlying methodology intended for delay testing can be extended to evaluate de-jitter buffer performance using a black-box approach, and how to model VoLTE packet delay/loss characteristics in a realistic way.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132577468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Obfuscating function call topography to test structural malware detection against evasion attacks 混淆函数调用地形以测试针对规避攻击的结构性恶意软件检测
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876235
Andrew Choliy, Feng Li, Tianchong Gao
The incredible popularity of the Android mobile operating system has resulted in a massive influx of malicious applications for the platform. This malware can come from a number of sources as Google allows the installation of Android App Packages (APKs) from third parties. Even within its own Google Play storefront, however, malicious software can be found.
Android移动操作系统令人难以置信的流行导致大量恶意应用程序涌入该平台。这种恶意软件可能来自多个来源,因为谷歌允许安装来自第三方的安卓应用程序包(apk)。然而,即使在它自己的Google Play商店中,也可以发现恶意软件。
{"title":"Obfuscating function call topography to test structural malware detection against evasion attacks","authors":"Andrew Choliy, Feng Li, Tianchong Gao","doi":"10.1109/ICCNC.2017.7876235","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876235","url":null,"abstract":"The incredible popularity of the Android mobile operating system has resulted in a massive influx of malicious applications for the platform. This malware can come from a number of sources as Google allows the installation of Android App Packages (APKs) from third parties. Even within its own Google Play storefront, however, malicious software can be found.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An efficient binary-search based heuristic for extended Unsplittable Flow Problem 基于二叉搜索的扩展不可分流问题启发式算法
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876239
Erdal Akin, T. Korkmaz
Routing a given set of flows with bandwidth requirements is a fundamental problem, which has been formulated as Unsplittable Flow Problem (UFP). One of the key issues in this formulation is that the bandwidth requirement is fixed for each flow. In practice, however, many applications (e.g., video-on-demand, backup and replication services) would greatly benefit from getting more bandwidths beyond the fixed minimum bandwidth requirement. To achieve this, we extended UFP such that bandwidth requirements will be given in a range. The challenge is now how to find paths and dynamically determine the allocated bandwidths such that we can provide more bandwidth to each flow while making sure that each flow gets at least the requested minimum amount. Like UFP, the extended UFP problem is also NP-Hard. Therefore, we propose two heuristics and demonstrate their efficiency using simulation.
路由一组具有带宽需求的给定流是一个基本问题,它被表述为不可分割流问题(UFP)。此公式中的一个关键问题是每个流的带宽需求是固定的。然而,在实践中,许多应用程序(例如,视频点播、备份和复制服务)将从获得比固定的最低带宽要求更多的带宽中获得极大的好处。为了实现这一点,我们扩展了UFP,使带宽需求将在一个范围内给定。现在的挑战是如何找到路径并动态地确定分配的带宽,以便我们可以为每个流提供更多的带宽,同时确保每个流至少获得请求的最小带宽。与UFP一样,扩展UFP问题也是NP-Hard问题。因此,我们提出了两种启发式方法,并通过仿真验证了它们的有效性。
{"title":"An efficient binary-search based heuristic for extended Unsplittable Flow Problem","authors":"Erdal Akin, T. Korkmaz","doi":"10.1109/ICCNC.2017.7876239","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876239","url":null,"abstract":"Routing a given set of flows with bandwidth requirements is a fundamental problem, which has been formulated as Unsplittable Flow Problem (UFP). One of the key issues in this formulation is that the bandwidth requirement is fixed for each flow. In practice, however, many applications (e.g., video-on-demand, backup and replication services) would greatly benefit from getting more bandwidths beyond the fixed minimum bandwidth requirement. To achieve this, we extended UFP such that bandwidth requirements will be given in a range. The challenge is now how to find paths and dynamically determine the allocated bandwidths such that we can provide more bandwidth to each flow while making sure that each flow gets at least the requested minimum amount. Like UFP, the extended UFP problem is also NP-Hard. Therefore, we propose two heuristics and demonstrate their efficiency using simulation.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133178915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Real-time attack and failure detection for next generation networks 下一代网络的实时攻击和故障检测
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876125
Christopher Mansour, D. Chasaki
In today's modern networks, routers rely on high-performance multi-core packet processing systems to implement a variety of applications and operations required to forward traffic. This leads to an increase in the complexity of such systems and hence the number of processing cores. Managing such processing cores and ensuring their correct operation become a difficult task. In this paper, we address this problem by proposing another novel approach to verify the correct operation of network processor and detect any attack/failure. This approach monitors the power consumption of such cores at the OS level during run-time and correlates it statistically with predetermined benchmark information. We show that based on this correlation, any failure/attack can be detected.
在当今的现代网络中,路由器依靠高性能的多核分组处理系统来实现转发流量所需的各种应用和操作。这导致了系统复杂性的增加,因此也增加了处理核心的数量。管理这些处理核心并确保其正确运行成为一项艰巨的任务。在本文中,我们提出了另一种新颖的方法来验证网络处理器的正确运行并检测任何攻击/故障,从而解决了这个问题。这种方法在运行期间在操作系统级别监视这些内核的功耗,并将其与预定的基准信息进行统计关联。我们展示了基于这种相关性,任何故障/攻击都可以被检测到。
{"title":"Real-time attack and failure detection for next generation networks","authors":"Christopher Mansour, D. Chasaki","doi":"10.1109/ICCNC.2017.7876125","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876125","url":null,"abstract":"In today's modern networks, routers rely on high-performance multi-core packet processing systems to implement a variety of applications and operations required to forward traffic. This leads to an increase in the complexity of such systems and hence the number of processing cores. Managing such processing cores and ensuring their correct operation become a difficult task. In this paper, we address this problem by proposing another novel approach to verify the correct operation of network processor and detect any attack/failure. This approach monitors the power consumption of such cores at the OS level during run-time and correlates it statistically with predetermined benchmark information. We show that based on this correlation, any failure/attack can be detected.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134059141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1