首页 > 最新文献

2017 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
On-demand cache placement protocol for content delivery sensor networks 用于内容传递传感器网络的按需缓存放置协议
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876128
Minkeun Ha, Daeyoung Kim
A significant number of promising wireless sensor applications for the Internet of Things (IoT) are becoming a reality. Most of these applications require a variety of heterogeneous and geographical sensor data to be delivered to users such as mobile devices, vehicles, and cloud systems for big data analysis to extract maximum value from the physical world. Data caching of popular data items in a network can significantly improve efficiency and reliability of content delivery by contributing the reduction of data access delay, bandwidth usage, and packet losses in resource-limited low-rate wireless sensor networks. In this paper, we propose an efficient cache placement protocol (BCDA) that minimizes data access cost and guarantees cache consistency in a lightweight manner. The BCDA decides where to store a copy of data content in a network using a distributed approach according to clients' access patterns, memory capacity, data size, and so on. To evaluate the feasibility and effectiveness, we implemented the BCDA in ns-2 and compared its performance with existing caching strategies. The simulation results highlight that the BCDA significantly reduces data access cost with minimizing cache management cost.
大量有前途的无线传感器应用于物联网(IoT)正在成为现实。这些应用中的大多数都需要将各种异构和地理传感器数据交付给移动设备、车辆和云系统等用户,以便进行大数据分析,从物理世界中提取最大价值。在资源有限的低速率无线传感器网络中,网络中流行数据项的数据缓存可以通过减少数据访问延迟、带宽使用和数据包丢失来显著提高内容交付的效率和可靠性。在本文中,我们提出了一种高效的缓存放置协议(BCDA),该协议以轻量级的方式最小化数据访问成本并保证缓存一致性。BCDA根据客户机的访问模式、内存容量、数据大小等,使用分布式方法决定在网络中存储数据内容副本的位置。为了评估其可行性和有效性,我们在ns-2中实现了BCDA,并将其性能与现有缓存策略进行了比较。仿真结果表明,BCDA在最小化缓存管理成本的同时显著降低了数据访问成本。
{"title":"On-demand cache placement protocol for content delivery sensor networks","authors":"Minkeun Ha, Daeyoung Kim","doi":"10.1109/ICCNC.2017.7876128","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876128","url":null,"abstract":"A significant number of promising wireless sensor applications for the Internet of Things (IoT) are becoming a reality. Most of these applications require a variety of heterogeneous and geographical sensor data to be delivered to users such as mobile devices, vehicles, and cloud systems for big data analysis to extract maximum value from the physical world. Data caching of popular data items in a network can significantly improve efficiency and reliability of content delivery by contributing the reduction of data access delay, bandwidth usage, and packet losses in resource-limited low-rate wireless sensor networks. In this paper, we propose an efficient cache placement protocol (BCDA) that minimizes data access cost and guarantees cache consistency in a lightweight manner. The BCDA decides where to store a copy of data content in a network using a distributed approach according to clients' access patterns, memory capacity, data size, and so on. To evaluate the feasibility and effectiveness, we implemented the BCDA in ns-2 and compared its performance with existing caching strategies. The simulation results highlight that the BCDA significantly reduces data access cost with minimizing cache management cost.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Towards proactive SDN-controller attack and failure resilience 主动sdn控制器攻击与故障恢复
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876169
M. Azab, J. Fortes
SDN networks rely mainly on a set of software defined modules, running on generic hardware platforms, and managed by a central SDN controller. The tight coupling and lack of isolation between the controller and the underlying host limit the controller resilience against host-based attacks and failures. That controller is a single point of failure and a target for attackers. “Linux-containers” is a successful thin virtualization technique that enables encapsulated, host-isolated execution-environments for running applications. In this paper we present PAFR, a controller sandboxing mechanism based on Linux-containers. PAFR enables controller/host isolation, plug-and-play operation, failure-and-attack-resilient execution, and fast recovery. PAFR employs and manages live remote checkpointing and migration between different hosts to evade failures and attacks. Experiments and simulations show that the frequent employment of PAFR's live-migration minimizes the chance of successful attack/failure with limited to no impact on network performance.
SDN网络主要依赖于一组软件定义的模块,运行在通用的硬件平台上,由中央SDN控制器进行管理。控制器和底层主机之间的紧密耦合和缺乏隔离限制了控制器抵御基于主机的攻击和故障的弹性。该控制器是单点故障,也是攻击者的目标。“linux -容器”是一种成功的瘦虚拟化技术,它为运行的应用程序提供了封装的、主机隔离的执行环境。本文提出了一种基于linux容器的控制器沙箱机制PAFR。PAFR支持控制器/主机隔离、即插即用操作、故障和攻击弹性执行以及快速恢复。PAFR采用并管理实时远程检查点和不同主机之间的迁移,以避免故障和攻击。实验和模拟表明,频繁使用PAFR的实时迁移可以最大限度地减少成功攻击/失败的机会,而对网络性能的影响有限或没有影响。
{"title":"Towards proactive SDN-controller attack and failure resilience","authors":"M. Azab, J. Fortes","doi":"10.1109/ICCNC.2017.7876169","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876169","url":null,"abstract":"SDN networks rely mainly on a set of software defined modules, running on generic hardware platforms, and managed by a central SDN controller. The tight coupling and lack of isolation between the controller and the underlying host limit the controller resilience against host-based attacks and failures. That controller is a single point of failure and a target for attackers. “Linux-containers” is a successful thin virtualization technique that enables encapsulated, host-isolated execution-environments for running applications. In this paper we present PAFR, a controller sandboxing mechanism based on Linux-containers. PAFR enables controller/host isolation, plug-and-play operation, failure-and-attack-resilient execution, and fast recovery. PAFR employs and manages live remote checkpointing and migration between different hosts to evade failures and attacks. Experiments and simulations show that the frequent employment of PAFR's live-migration minimizes the chance of successful attack/failure with limited to no impact on network performance.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130335810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Impact of beacon coverage on clustering strategies for fingerprinting localization system 信标覆盖对指纹定位系统聚类策略的影响
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876124
P. Sadhukhan, K. Dahal, Zeeshan Pervez
Among the various indoor localization systems, received signal strength (RSS) based fingerprinting localization provides most cost-effective solution as it uses the existing wireless network infrastructure. The positioning accuracy of such localization systems can be improved by incorporating huge number of training data, which in turn, increases the searching overhead of such localization systems. Several clustering strategies for fingerprinting localization have been proposed in literature in order to reduce the searching overhead. On the other hand, placement strategy of beacon nodes within the field of localization has significant influence on the performances of clustering strategies for fingerprinting localization. Two important factors associated with some beacon placement strategy are the degree of beacon coverage and the distribution of beacon nodes. In this paper, we present an optimal beacon placement strategy that meets a k-coverage visibility requirement for beacons at every point within the field of localization. Next, we demonstrate the impact of beacon coverage on the performance of several clustering strategies suitable for a large-scale fingerprinting localization system.
在各种室内定位系统中,基于接收信号强度(RSS)的指纹定位系统是最经济有效的解决方案,因为它利用了现有的无线网络基础设施。这种定位系统的定位精度可以通过纳入大量的训练数据来提高,但这反过来又增加了这种定位系统的搜索开销。为了减少搜索开销,文献中提出了几种用于指纹定位的聚类策略。另一方面,信标节点在定位区域内的放置策略对指纹定位聚类策略的性能有显著影响。与信标放置策略相关的两个重要因素是信标覆盖的程度和信标节点的分布。在本文中,我们提出了一种最优信标放置策略,该策略满足定位区域内每个点信标的k覆盖可见性要求。接下来,我们展示了信标覆盖对适合大规模指纹定位系统的几种聚类策略性能的影响。
{"title":"Impact of beacon coverage on clustering strategies for fingerprinting localization system","authors":"P. Sadhukhan, K. Dahal, Zeeshan Pervez","doi":"10.1109/ICCNC.2017.7876124","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876124","url":null,"abstract":"Among the various indoor localization systems, received signal strength (RSS) based fingerprinting localization provides most cost-effective solution as it uses the existing wireless network infrastructure. The positioning accuracy of such localization systems can be improved by incorporating huge number of training data, which in turn, increases the searching overhead of such localization systems. Several clustering strategies for fingerprinting localization have been proposed in literature in order to reduce the searching overhead. On the other hand, placement strategy of beacon nodes within the field of localization has significant influence on the performances of clustering strategies for fingerprinting localization. Two important factors associated with some beacon placement strategy are the degree of beacon coverage and the distribution of beacon nodes. In this paper, we present an optimal beacon placement strategy that meets a k-coverage visibility requirement for beacons at every point within the field of localization. Next, we demonstrate the impact of beacon coverage on the performance of several clustering strategies suitable for a large-scale fingerprinting localization system.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Distributed cache for efficient content sharing in heterogeneous networks 有效的内容共享的分布式缓存异构网络
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876174
Jianbin Chuan, Li Wang, Shuangshuang Ma
Distributed cache at mobile user devices and small base stations (SBSs) can improve the efficiency and reduce the delay for content dissemination in heterogeneous cellular networks (HetNets). One major challenge lies in the limited storage capacity of the participating mobile devices and SBSs. This paper investigates the design of an effective distributed content cache policy with heterogeneity (DCP-H) based on erasure code in terms of SBSs and mobile devices by considering sociality characteristics and physical communication conditions. The key feature of our proposed scheme lies in the PageRank algorithm based design, in which the transmit power and delivery delay is optimized through optimizing the cache states of content items to maximize cache hit ratio. Numerical results demonstrate the performance and advantage of our proposed scheme.
在移动用户设备和小型基站(SBSs)上的分布式缓存可以提高异构蜂窝网络(HetNets)中内容分发的效率和减少延迟。一个主要挑战是参与的移动设备和sbs的存储容量有限。本文在考虑社交特性和物理通信条件的基础上,研究了一种基于擦除码的高效异构分布式内容缓存策略(DCP-H)的设计。该方案的关键特点在于基于PageRank算法的设计,通过优化内容项的缓存状态来优化发送功率和传递延迟,使缓存命中率最大化。数值结果验证了所提方案的性能和优越性。
{"title":"Distributed cache for efficient content sharing in heterogeneous networks","authors":"Jianbin Chuan, Li Wang, Shuangshuang Ma","doi":"10.1109/ICCNC.2017.7876174","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876174","url":null,"abstract":"Distributed cache at mobile user devices and small base stations (SBSs) can improve the efficiency and reduce the delay for content dissemination in heterogeneous cellular networks (HetNets). One major challenge lies in the limited storage capacity of the participating mobile devices and SBSs. This paper investigates the design of an effective distributed content cache policy with heterogeneity (DCP-H) based on erasure code in terms of SBSs and mobile devices by considering sociality characteristics and physical communication conditions. The key feature of our proposed scheme lies in the PageRank algorithm based design, in which the transmit power and delivery delay is optimized through optimizing the cache states of content items to maximize cache hit ratio. Numerical results demonstrate the performance and advantage of our proposed scheme.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Duet: An adaptive algorithm for the coexistence of LTE-U and WiFi in Unlicensed spectrum Duet:一种LTE-U和WiFi在免授权频谱中共存的自适应算法
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876095
Yubing Jian, U. Moravapalle, Chao-Fang Shih, Raghupathy Sivakumar
LTE in Unlicensed band (LTE-U) has gained intensive attention recently due to its capability to offload mobile data to unlicensed bands. In order to use unlicensed band, LTE-U has to coexist with WiFi - another wireless technology that operates in unlicensed bands. This coexistence is riddled with several challenges as these technologies use different core networks, backhauls and deployment plans. Within this broad paradigm, we present Duet, a Medium Access Control (MAC) layer solution that enables both LTE-U and WiFi nodes to operate fairly and efficiently, with the following properties: (1) no changes in WiFi framework, (2) high performance of LTE-U and WiFi networks within static and dynamic load scenarios, and (3) robustness to fully and partially connected networks. Using ns-3, we simulate Duet in various scenarios and show that Duet can improve the overall network throughput by up to 74%.
LTE in unlicensing band (LTE- u)由于能够将移动数据卸载到非授权频段而受到了广泛关注。为了使用未授权频段,LTE-U必须与另一种在未授权频段上运行的无线技术WiFi共存。由于这些技术使用不同的核心网络、回程和部署计划,这种共存充满了一些挑战。在这个广泛的范例中,我们提出了Duet,一种介质访问控制(MAC)层解决方案,使LTE-U和WiFi节点能够公平有效地运行,具有以下特性:(1)WiFi框架没有变化,(2)LTE-U和WiFi网络在静态和动态负载场景下的高性能,以及(3)对完全和部分连接网络的鲁棒性。使用ns-3,我们在各种场景中模拟了Duet,并表明Duet可以将整体网络吞吐量提高高达74%。
{"title":"Duet: An adaptive algorithm for the coexistence of LTE-U and WiFi in Unlicensed spectrum","authors":"Yubing Jian, U. Moravapalle, Chao-Fang Shih, Raghupathy Sivakumar","doi":"10.1109/ICCNC.2017.7876095","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876095","url":null,"abstract":"LTE in Unlicensed band (LTE-U) has gained intensive attention recently due to its capability to offload mobile data to unlicensed bands. In order to use unlicensed band, LTE-U has to coexist with WiFi - another wireless technology that operates in unlicensed bands. This coexistence is riddled with several challenges as these technologies use different core networks, backhauls and deployment plans. Within this broad paradigm, we present Duet, a Medium Access Control (MAC) layer solution that enables both LTE-U and WiFi nodes to operate fairly and efficiently, with the following properties: (1) no changes in WiFi framework, (2) high performance of LTE-U and WiFi networks within static and dynamic load scenarios, and (3) robustness to fully and partially connected networks. Using ns-3, we simulate Duet in various scenarios and show that Duet can improve the overall network throughput by up to 74%.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125067836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Set reconciliation with an inaccurate oracle 设置与不准确的oracle对账
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876279
Mark Bilinski, Ryan Gabrys
In this work, we consider a variant of the set reconciliation problem where the estimate for the size of the symmetric difference may be inaccurate. Given this setup, we propose a new method to reconciling sets of data and we then compare our method to the Invertible Bloom Filter approach proposed by Eppstein et al. [2].
在这项工作中,我们考虑了集合调和问题的一个变体,其中对称差的大小估计可能是不准确的。鉴于这种设置,我们提出了一种新的方法来协调数据集,然后将我们的方法与Eppstein等人提出的可逆布隆过滤器方法进行比较。
{"title":"Set reconciliation with an inaccurate oracle","authors":"Mark Bilinski, Ryan Gabrys","doi":"10.1109/ICCNC.2017.7876279","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876279","url":null,"abstract":"In this work, we consider a variant of the set reconciliation problem where the estimate for the size of the symmetric difference may be inaccurate. Given this setup, we propose a new method to reconciling sets of data and we then compare our method to the Invertible Bloom Filter approach proposed by Eppstein et al. [2].","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new index of hidden workload for firewall rule processing on virtual machine 一种用于虚拟机防火墙规则处理的隐藏工作负载索引
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876203
Dai Suzuki, Satoshi Imai, T. Katagiri
Network Functions Virtualization (NFV) is a technology for running software-based functions on commodity hardware, which can lead to cost savings and flexible functionality. However, due to the software processing of network functions, the performance of Virtualized Network Functions (VNFs) is considerably degraded in relation to the types of VNFs and the configuration of VNF applications. Therefore, for a practical NFV system, grasping the accurate workload of VNF applications and managing the VNF performance are important. This paper focuses on analysis of a virtual firewall as a representative VNF. We first reveal new insights about the performance characteristics of the virtual firewall through preliminary experiments. Furthermore, we propose a method for estimating the hidden workload of the virtual firewall by using the number of rules in an Access Control List (ACL) and the traffic volume for each rule. Finally, we show the effectiveness of the proposed methods.
网络功能虚拟化(Network Functions Virtualization, NFV)是一种在商用硬件上运行基于软件的功能的技术,它可以节省成本并提供灵活的功能。然而,由于网络功能的软件处理,虚拟网络功能的性能与虚拟网络功能的类型和虚拟网络功能应用的配置有很大的关系。因此,对于一个实用的NFV系统来说,准确掌握VNF应用的工作负载和管理VNF的性能是非常重要的。本文着重分析了一种具有代表性的虚拟防火墙。我们首先通过初步实验揭示了关于虚拟防火墙性能特征的新见解。在此基础上,提出了一种利用访问控制列表(ACL)中的规则数和每个规则的流量来估计虚拟防火墙隐藏工作负载的方法。最后,我们证明了所提出方法的有效性。
{"title":"A new index of hidden workload for firewall rule processing on virtual machine","authors":"Dai Suzuki, Satoshi Imai, T. Katagiri","doi":"10.1109/ICCNC.2017.7876203","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876203","url":null,"abstract":"Network Functions Virtualization (NFV) is a technology for running software-based functions on commodity hardware, which can lead to cost savings and flexible functionality. However, due to the software processing of network functions, the performance of Virtualized Network Functions (VNFs) is considerably degraded in relation to the types of VNFs and the configuration of VNF applications. Therefore, for a practical NFV system, grasping the accurate workload of VNF applications and managing the VNF performance are important. This paper focuses on analysis of a virtual firewall as a representative VNF. We first reveal new insights about the performance characteristics of the virtual firewall through preliminary experiments. Furthermore, we propose a method for estimating the hidden workload of the virtual firewall by using the number of rules in an Access Control List (ACL) and the traffic volume for each rule. Finally, we show the effectiveness of the proposed methods.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optical circuit granularity impact in TCP-dominant hybrid data center networks tcp主导混合数据中心网络中光电路粒度的影响
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876147
H. Rastegarfar, Kamran Keykhosravi, K. Szczerba, E. Agrell, L. LaComb, M. Glick
Hybrid networking, based on electronic packet switching and optical circuit switching, has been proposed to resolve the existing switching bottlenecks in data centers in an energy-efficient and cost-effective fashion. We consider the problem of resource provisioning in hybrid data centers in terms of optical circuit switching capacity and granularity. The number of fibers connected to server racks, the number of wavelengths per fiber, and the ratio of capacity provided by the optical circuit-switched portion of the network to that of the electronic packet-switched portion are crucial design parameters to be optimized during the data center planning phase. These parameters in conjunction with the additive-increase, multiplicative-decrease (AIMD) congestion control mechanism of the Transmission Control Protocol (TCP) pose a significant impact on data center network performance. In this paper, we examine the combined impact of optical bandwidth settings and TCP dynamics using event-driven simulations. Our analysis reveals the strong dependence of overall network throughput on channel capacity (i.e., the bit rate per wavelength channel) and points to the advantages of optical bandwidth consolidation employing higher-order modulation formats.
基于电子分组交换和光电路交换的混合网络以一种节能、经济的方式解决数据中心现有的交换瓶颈。本文从光路交换容量和粒度两个方面考虑混合数据中心的资源配置问题。连接到服务器机架的光纤数量、每根光纤的波长数量以及网络的光电路交换部分与电子分组交换部分提供的容量之比是在数据中心规划阶段需要优化的关键设计参数。这些参数与传输控制协议(TCP)的加性增加、乘性减少(AIMD)拥塞控制机制一起对数据中心网络性能产生重大影响。在本文中,我们使用事件驱动模拟研究了光带宽设置和TCP动态的综合影响。我们的分析揭示了整个网络吞吐量对信道容量(即每波长信道的比特率)的强烈依赖,并指出了采用高阶调制格式的光带宽整合的优势。
{"title":"Optical circuit granularity impact in TCP-dominant hybrid data center networks","authors":"H. Rastegarfar, Kamran Keykhosravi, K. Szczerba, E. Agrell, L. LaComb, M. Glick","doi":"10.1109/ICCNC.2017.7876147","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876147","url":null,"abstract":"Hybrid networking, based on electronic packet switching and optical circuit switching, has been proposed to resolve the existing switching bottlenecks in data centers in an energy-efficient and cost-effective fashion. We consider the problem of resource provisioning in hybrid data centers in terms of optical circuit switching capacity and granularity. The number of fibers connected to server racks, the number of wavelengths per fiber, and the ratio of capacity provided by the optical circuit-switched portion of the network to that of the electronic packet-switched portion are crucial design parameters to be optimized during the data center planning phase. These parameters in conjunction with the additive-increase, multiplicative-decrease (AIMD) congestion control mechanism of the Transmission Control Protocol (TCP) pose a significant impact on data center network performance. In this paper, we examine the combined impact of optical bandwidth settings and TCP dynamics using event-driven simulations. Our analysis reveals the strong dependence of overall network throughput on channel capacity (i.e., the bit rate per wavelength channel) and points to the advantages of optical bandwidth consolidation employing higher-order modulation formats.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125348573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Outage-based cooperative resource competition game in LTE-A small cell networks LTE-A小蜂窝网络中基于中断的合作资源竞争博弈
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876097
Chia-Lin Tsai, Pei-Rong Li, Kai-Ten Feng
To alleviate greenhouse effect, high network energy efficiency (EE) has increasingly become an important research target in wireless communication systems. In this paper, the investigation for resource blocks (RBs) and transmit power allocation to mitigate co-tier interference in small cell networks is provided. In view of the drawbacks for considerable computational loadings and the acquisition for global channel information under centralized control, this paper proposes a framework based on a cooperative game to distributively perform resource allocation with only limited information. Moreover, the outage probability analyses for both perfect and imperfect channel state information at the transmitter (CSIT) are discussed in this paper. Furthermore, a regret-based learning algorithm for the proposed outage-based cooperative resource competition game (OCRC) to reach the correlated equilibrium (CE) is adapted. Simulation results verify the convergence in proposed OCRC scheme. Additionally, the proposed OCRC scheme can maintain and provide better EE performance compared to equal power allocation (EPA) scheme with imperfect CSIT.
为了缓解温室效应,提高网络能效日益成为无线通信系统的重要研究方向。本文研究了小蜂窝网络中的资源块(RBs)和传输功率分配,以减少协同层干扰。针对集中控制下计算量大、获取全局信道信息的缺点,提出了一种基于合作博弈的框架,在有限信息下进行资源分配。此外,本文还讨论了发射机完全和不完全信道状态信息(CSIT)下的中断概率分析。在此基础上,提出了一种基于遗憾的学习算法来求解基于中断的资源竞争博弈(OCRC),以达到相关均衡(CE)。仿真结果验证了OCRC方案的收敛性。此外,与具有不完善CSIT的等功率分配(EPA)方案相比,所提出的OCRC方案能够保持并提供更好的能效性能。
{"title":"Outage-based cooperative resource competition game in LTE-A small cell networks","authors":"Chia-Lin Tsai, Pei-Rong Li, Kai-Ten Feng","doi":"10.1109/ICCNC.2017.7876097","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876097","url":null,"abstract":"To alleviate greenhouse effect, high network energy efficiency (EE) has increasingly become an important research target in wireless communication systems. In this paper, the investigation for resource blocks (RBs) and transmit power allocation to mitigate co-tier interference in small cell networks is provided. In view of the drawbacks for considerable computational loadings and the acquisition for global channel information under centralized control, this paper proposes a framework based on a cooperative game to distributively perform resource allocation with only limited information. Moreover, the outage probability analyses for both perfect and imperfect channel state information at the transmitter (CSIT) are discussed in this paper. Furthermore, a regret-based learning algorithm for the proposed outage-based cooperative resource competition game (OCRC) to reach the correlated equilibrium (CE) is adapted. Simulation results verify the convergence in proposed OCRC scheme. Additionally, the proposed OCRC scheme can maintain and provide better EE performance compared to equal power allocation (EPA) scheme with imperfect CSIT.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114561971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Entropy-based network anomaly Detection 基于熵的网络异常检测
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876150
C. Callegari, S. Giordano, M. Pagano
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to face unknown attacks and new security threats. In this paper we propose a novel intrusion detection system that performs anomaly detection by studying the variation in the entropy associated to the network traffic. To this aim, the traffic is first aggregated by means of random data structures (namely three-dimension reversible sketches) and then the entropy of different traffic descriptors is computed by using several definitions of entropy. The experimental results obtained over the MAWILab dataset validate the system and demonstrate the effectiveness of our proposal.
基于异常的入侵检测由于能够面对未知攻击和新的安全威胁而成为网络安全领域的一个重要研究课题。本文提出了一种新的入侵检测系统,该系统通过研究与网络流量相关的熵的变化来进行异常检测。为此,首先通过随机数据结构(即三维可逆草图)对流量进行聚合,然后利用熵的几种定义计算不同流量描述符的熵。在MAWILab数据集上获得的实验结果验证了系统的有效性。
{"title":"Entropy-based network anomaly Detection","authors":"C. Callegari, S. Giordano, M. Pagano","doi":"10.1109/ICCNC.2017.7876150","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876150","url":null,"abstract":"Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to face unknown attacks and new security threats. In this paper we propose a novel intrusion detection system that performs anomaly detection by studying the variation in the entropy associated to the network traffic. To this aim, the traffic is first aggregated by means of random data structures (namely three-dimension reversible sketches) and then the entropy of different traffic descriptors is computed by using several definitions of entropy. The experimental results obtained over the MAWILab dataset validate the system and demonstrate the effectiveness of our proposal.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
2017 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1