首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
Learning-driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things 学习驱动的泛在移动边缘计算:未来一代物联网的网络管理挑战
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-03 DOI: 10.1002/nem.2250
Praveen Kumar Donta, Edmundo Monteiro, Chinmaya Kumar Dehury, Ilir Murturi

Ubiquitous edge computing facilitates efficient cloud services near mobile devices, enabling mobile edge computing (MEC) to offer services more efficiently by presenting storage and processing capability within the proximity of mobile devices and in general IoT domains. However, compared with conventional mobile cloud computing, ubiquitous MEC introduces numerous complex challenges due to the heterogeneous smart devices, network infrastructures, and limited transmission bandwidth. Processing and managing such massive volumes of data generated from these devices is complex and challenging in edge infrastructures. On the other side, time-critical applications have stringent requirements such as ultra-low-latency, energy cost, mobility, resource, and security issues that cannot be neglected. For example, smart healthcare or industrial networks generate emergency information very frequently (i.e., often in terms of milliseconds), which needs to be processed near the sensing devices with minimal processing delay. In this context, future generation IoT requires robust and intelligent network management approaches that can handle the system complexity (e.g., scalability and orchestration) with little or no little human intervention and offer a better service to end-users. More precisely, AI/ML approaches designed explicitly for networks under high traffic volume of data help overcome several management challenges, such as (i) improving performance by balancing load and traffic, (ii) distributing the bandwidth spectrum based on demand, and (iii) traffic predictions. Moreover, this need also opens several new research directions such as new MEC architecture, service provisioning technique, security mechanisms, advanced 5G or beyond communication technology, ambient intelligence, and AI/ML-based solutions.

This issue collect surveys and contribution articles on emerging trends and technologies in ubiquitous MEC for future generation IoT networks and their managements. The papers related to machine learning, deep learning, optimization, blockchain, 5G, or beyond solutions, especially for domain-specific IoT network management, which use MEC environments, are collected after evaluating the review process. Each paper submitted to this special issue was reviewed by three to seven experts during the assessment process. At the end we consider one survey paper and four research contributions.

The first paper Ravi et al. proposed a survey on “Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks.” This survey presents recently published stochastic modeling-based algorithms for VANETs. This article briefly covers various queueing models for the reader's convenience. This paper discusses a variety of VANET issues such as mobility, routing, data dissemination, cooperative communication, congestion control, and traffic load balancing issues addressed by stochastic modeling techniques. The authors

无处不在的边缘计算促进了移动设备附近的高效云服务,使移动边缘计算(MEC)能够通过在移动设备附近和一般物联网领域提供存储和处理能力来更高效地提供服务。然而,与传统的移动云计算相比,由于异构的智能设备、网络基础设施和有限的传输带宽,无处不在的MEC带来了许多复杂的挑战。在边缘基础设施中,处理和管理这些设备生成的大量数据既复杂又具有挑战性。另一方面,时间关键型应用程序有着严格的要求,如超低延迟、能源成本、移动性、资源和安全问题,这些都不容忽视。例如,智能医疗保健或工业网络非常频繁地生成紧急信息(即,通常以毫秒为单位),这些信息需要在传感设备附近以最小的处理延迟进行处理。在这种情况下,未来一代物联网需要稳健和智能的网络管理方法,这些方法可以在很少或根本不需要人工干预的情况下处理系统复杂性(例如,可扩展性和协调性),并为最终用户提供更好的服务。更准确地说,专门为高流量数据下的网络设计的AI/ML方法有助于克服一些管理挑战,例如(i)通过平衡负载和流量来提高性能,(ii)根据需求分配带宽频谱,以及(iii)流量预测。此外,这一需求还开辟了几个新的研究方向,如新的MEC架构、服务提供技术、安全机制、先进的5G或超越通信技术、环境智能和基于AI/ML的解决方案。本期收集了关于未来一代物联网网络及其管理的无处不在的MEC新兴趋势和技术的调查和贡献文章。与机器学习、深度学习、优化、区块链、5G或其他解决方案相关的论文,特别是针对使用MEC环境的特定领域物联网网络管理的论文,是在评估审查过程后收集的。在评估过程中,三至七名专家对提交给本特刊的每份论文进行了审查。最后我们
{"title":"Learning-driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things","authors":"Praveen Kumar Donta,&nbsp;Edmundo Monteiro,&nbsp;Chinmaya Kumar Dehury,&nbsp;Ilir Murturi","doi":"10.1002/nem.2250","DOIUrl":"10.1002/nem.2250","url":null,"abstract":"<p>Ubiquitous edge computing facilitates efficient cloud services near mobile devices, enabling mobile edge computing (MEC) to offer services more efficiently by presenting storage and processing capability within the proximity of mobile devices and in general IoT domains. However, compared with conventional mobile cloud computing, ubiquitous MEC introduces numerous complex challenges due to the heterogeneous smart devices, network infrastructures, and limited transmission bandwidth. Processing and managing such massive volumes of data generated from these devices is complex and challenging in edge infrastructures. On the other side, time-critical applications have stringent requirements such as ultra-low-latency, energy cost, mobility, resource, and security issues that cannot be neglected. For example, smart healthcare or industrial networks generate emergency information very frequently (i.e., often in terms of milliseconds), which needs to be processed near the sensing devices with minimal processing delay. In this context, future generation IoT requires robust and intelligent network management approaches that can handle the system complexity (e.g., scalability and orchestration) with little or no little human intervention and offer a better service to end-users. More precisely, AI/ML approaches designed explicitly for networks under high traffic volume of data help overcome several management challenges, such as (i) improving performance by balancing load and traffic, (ii) distributing the bandwidth spectrum based on demand, and (iii) traffic predictions. Moreover, this need also opens several new research directions such as new MEC architecture, service provisioning technique, security mechanisms, advanced 5G or beyond communication technology, ambient intelligence, and AI/ML-based solutions.</p><p>This issue collect surveys and contribution articles on emerging trends and technologies in ubiquitous MEC for future generation IoT networks and their managements. The papers related to machine learning, deep learning, optimization, blockchain, 5G, or beyond solutions, especially for domain-specific IoT network management, which use MEC environments, are collected after evaluating the review process. Each paper submitted to this special issue was reviewed by three to seven experts during the assessment process. At the end we consider one survey paper and four research contributions.</p><p>The first paper <i>Ravi et al.</i> proposed a survey on “Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks.” This survey presents recently published stochastic modeling-based algorithms for VANETs. This article briefly covers various queueing models for the reader's convenience. This paper discusses a variety of VANET issues such as mobility, routing, data dissemination, cooperative communication, congestion control, and traffic load balancing issues addressed by stochastic modeling techniques. The authors","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2250","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49500545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain-based data deduplication using novel content-defined chunking algorithm in cloud environment 基于区块链的数据重复删除,在云环境中使用新颖的内容定义分块算法
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-08-31 DOI: 10.1002/nem.2249
Jabin Prakash J, Ramesh K, Saravanan K, Lakshmi Prabha G

The cloud environment is inherently dynamic as users are added immensely in a short duration. It is indeed difficult to manage such user profiles and associated data. Meanwhile, the cloud data expand at a twofold-to-threefold rate on average, making storage space management and data integrity maintenance a mandatory task but also risky. The main approaches for addressing these data maintenance challenges in a cloud context are deduplication and data protection. In order to manage storage space, finding and removing identical copies of the same data from the cloud are possible, resulting in a reduction in the amount of storage space needed. Furthermore, duplicate copies are considerably reduced in cloud storage owing to data deduplication. Here, a decentralized ledger public blockchain network is introduced to protect the Integrity of data stored in cloud storage. This research proposes data deduplication using speedy content-defined Chunking (SpeedyCDC) algorithm in the public blockchain. Many people and businesses outsource sensitive data to remote cloud servers because it considerably eliminates the hassle of managing software and infrastructure. However, the ownership and control rights of users data are nonetheless divided because it is outsourced to cloud storage providers (CSPs) and kept on a distant cloud. As a result, users have a great deal of difficulty in verifying the Integrity of sensitive data. Analysis using datasets from Geospatial Information Systems (GIS) revealed that the throughput increased by 5%–6% over that of the fastCDC technique, which offered Integrity since a blockchain network secured it.

云环境本质上是动态的,因为用户会在短时间内大量增加。管理这样的用户配置文件和相关数据确实很困难。与此同时,云数据以平均两到三倍的速度增长,使得存储空间管理和数据完整性维护成为一项强制性任务,但也存在风险。在云环境中解决这些数据维护挑战的主要方法是重复数据删除和数据保护。为了管理存储空间,可以从云中查找和删除相同数据的相同副本,从而减少所需的存储空间量。此外,由于重复数据删除,云存储中的重复副本大大减少。在这里,我们引入了一个去中心化的账本公共区块链网络来保护存储在云存储中的数据的完整性。本研究提出在公共bb0中使用快速内容定义分块(SpeedyCDC)算法进行数据重复删除。许多人和企业将敏感数据外包给远程云服务器,因为它大大消除了管理软件和基础设施的麻烦。然而,用户数据的所有权和控制权仍然是分开的,因为它被外包给云存储提供商(csp)并保存在远程云上。因此,用户在验证敏感数据的完整性方面存在很大的困难。使用地理空间信息系统(GIS)数据集进行的分析显示,吞吐量比fastCDC技术提高了5%-6%,fastCDC技术提供了完整性,因为区块链网络保护了它。
{"title":"Blockchain-based data deduplication using novel content-defined chunking algorithm in cloud environment","authors":"Jabin Prakash J,&nbsp;Ramesh K,&nbsp;Saravanan K,&nbsp;Lakshmi Prabha G","doi":"10.1002/nem.2249","DOIUrl":"10.1002/nem.2249","url":null,"abstract":"<p>The cloud environment is inherently dynamic as users are added immensely in a short duration. It is indeed difficult to manage such user profiles and associated data. Meanwhile, the cloud data expand at a twofold-to-threefold rate on average, making storage space management and data integrity maintenance a mandatory task but also risky. The main approaches for addressing these data maintenance challenges in a cloud context are deduplication and data protection. In order to manage storage space, finding and removing identical copies of the same data from the cloud are possible, resulting in a reduction in the amount of storage space needed. Furthermore, duplicate copies are considerably reduced in cloud storage owing to data deduplication. Here, a decentralized ledger public blockchain network is introduced to protect the Integrity of data stored in cloud storage. This research proposes data deduplication using speedy content-defined Chunking (SpeedyCDC) algorithm in the public blockchain. Many people and businesses outsource sensitive data to remote cloud servers because it considerably eliminates the hassle of managing software and infrastructure. However, the ownership and control rights of users data are nonetheless divided because it is outsourced to cloud storage providers (CSPs) and kept on a distant cloud. As a result, users have a great deal of difficulty in verifying the Integrity of sensitive data. Analysis using datasets from Geospatial Information Systems (GIS) revealed that the throughput increased by 5%–6% over that of the fastCDC technique, which offered Integrity since a blockchain network secured it.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46600210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system Fog‐Sec:使用许可的区块链系统在启用Fog的物联网网络中进行安全的端到端通信
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-08-28 DOI: 10.1002/nem.2248
Erukala Suresh Babu, Mekala Srinivasa Rao, Gandharba Swain, A. Kousar Nikhath, Rajesh Kaluri

The technological integration of the Internet of Things (IoT)-Cloud paradigm has enabled intelligent linkages of things, data, processes, and people for efficient decision making without human intervention. However, it poses various challenges for IoT networks that cannot handle large amounts of operation technology (OT) data due to physical storage shortages, excessive latency, higher transfer costs, a lack of context awareness, impractical resiliency, and so on. As a result, the fog network emerged as a new computing model for providing computing capacity closer to IoT edge devices. The IoT-Fog-Cloud network, on the other hand, is more vulnerable to multiple security flaws, such as missing key management problems, inappropriate access control, inadequate software update mechanism, insecure configuration files and default passwords, missing communication security, and secure key exchange algorithms over unsecured channels. Therefore, these networks cannot make good security decisions, which are significantly easier to hack than to defend the fog-enabled IoT environment. This paper proposes the cooperative flow for securing edge devices in fog-enabled IoT networks using a permissioned blockchain system (pBCS). The proposed fog-enabled IoT network provides efficient security solutions for key management issues, communication security, and secure key exchange mechanism using a blockchain system. To secure the fog-based IoT network, we proposed a mechanism for identification and authentication among fog, gateway, and edge nodes that should register with the blockchain network. The fog nodes maintain the blockchain system and hold a shared smart contract for validating edge devices. The participating fog nodes serve as validators and maintain a distributed ledger/blockchain to authenticate and validate the request of the edge nodes. The network services can only be accessed by nodes that have been authenticated against the blockchain system. We implemented the proposed pBCS network using the private Ethereum 2.0 that enables secure device-to-device communication and demonstrated performance metrics such as throughput, transaction delay, block creation response time, communication, and computation overhead using state-of-the-art techniques. Finally, we conducted a security analysis of the communication network to protect the IoT edge devices from unauthorized malicious nodes without data loss.

物联网(IoT)-云模式的技术集成实现了物、数据、流程和人员的智能连接,从而实现了无需人工干预的高效决策。然而,由于物理存储短缺、延迟过大、传输成本较高、缺乏上下文感知、弹性不切实际等原因,它给无法处理大量操作技术(OT)数据的物联网网络带来了各种挑战。因此,雾网络成为了一种新的计算模型,用于提供更接近物联网边缘设备的计算能力。另一方面,IoT‐Fog‐Cloud网络更容易受到多种安全缺陷的影响,如密钥管理问题缺失、访问控制不当、软件更新机制不足、配置文件和默认密码不安全、通信安全缺失以及不安全通道上的安全密钥交换算法。因此,这些网络无法做出良好的安全决策,这比保护雾状物联网环境要容易得多。本文提出了使用许可区块链系统(pBCS)在启用雾的物联网网络中保护边缘设备的合作流程。所提出的支持雾的物联网网络使用区块链系统为密钥管理问题、通信安全和安全密钥交换机制提供了高效的安全解决方案。为了确保基于雾的物联网网络的安全,我们提出了一种在雾、网关和边缘节点之间进行识别和认证的机制,这些节点应该在区块链网络中注册。雾节点维护区块链系统,并持有用于验证边缘设备的共享智能合约。参与的雾节点充当验证器,并维护分布式账本/区块链,以验证边缘节点的请求。网络服务只能由经过区块链系统验证的节点访问。我们使用私有以太坊2.0实现了所提出的pBCS网络,该网络实现了安全的设备对设备通信,并使用最先进的技术展示了吞吐量、事务延迟、块创建响应时间、通信和计算开销等性能指标。最后,我们对通信网络进行了安全分析,以保护物联网边缘设备免受未经授权的恶意节点的攻击,而不会丢失数据。
{"title":"Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system","authors":"Erukala Suresh Babu,&nbsp;Mekala Srinivasa Rao,&nbsp;Gandharba Swain,&nbsp;A. Kousar Nikhath,&nbsp;Rajesh Kaluri","doi":"10.1002/nem.2248","DOIUrl":"10.1002/nem.2248","url":null,"abstract":"<p>The technological integration of the Internet of Things (IoT)-Cloud paradigm has enabled intelligent linkages of things, data, processes, and people for efficient decision making without human intervention. However, it poses various challenges for IoT networks that cannot handle large amounts of operation technology (OT) data due to physical storage shortages, excessive latency, higher transfer costs, a lack of context awareness, impractical resiliency, and so on. As a result, the fog network emerged as a new computing model for providing computing capacity closer to IoT edge devices. The IoT-Fog-Cloud network, on the other hand, is more vulnerable to multiple security flaws, such as missing key management problems, inappropriate access control, inadequate software update mechanism, insecure configuration files and default passwords, missing communication security, and secure key exchange algorithms over unsecured channels. Therefore, these networks cannot make good security decisions, which are significantly easier to hack than to defend the fog-enabled IoT environment. This paper proposes the cooperative flow for securing edge devices in fog-enabled IoT networks using a permissioned blockchain system (pBCS). The proposed fog-enabled IoT network provides efficient security solutions for key management issues, communication security, and secure key exchange mechanism using a blockchain system. To secure the fog-based IoT network, we proposed a mechanism for identification and authentication among fog, gateway, and edge nodes that should register with the blockchain network. The fog nodes maintain the blockchain system and hold a shared smart contract for validating edge devices. The participating fog nodes serve as validators and maintain a distributed ledger/blockchain to authenticate and validate the request of the edge nodes. The network services can only be accessed by nodes that have been authenticated against the blockchain system. We implemented the proposed pBCS network using the private Ethereum 2.0 that enables secure device-to-device communication and demonstrated performance metrics such as throughput, transaction delay, block creation response time, communication, and computation overhead using state-of-the-art techniques. Finally, we conducted a security analysis of the communication network to protect the IoT edge devices from unauthorized malicious nodes without data loss.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48696567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog computing out of the box: Dynamic deployment of fog service containers with TOSCA 雾计算开箱即用:使用TOSCA动态部署雾服务容器
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-24 DOI: 10.1002/nem.2246
Suvam Basak, Satish Narayana Srirama

The conventional cloud-centric Internet of Things (IoT) application fails to meet the latency requirement of time-critical applications. The idea of edge and fog computing arrived to distribute workloads across the fog devices located in the local area. However, achieving seamless interoperability, platform independence, and automatic deployment of services becomes the major challenge over heterogeneous fog devices. This paper proposes an integrated and standards-based fog computing federation framework, FogDEFT, that adapts OASIS–Topology and Orchestration Specification for Cloud Applications (TOSCA) for service deployment in fog. The framework standardizes the distributed application design with TOSCA Service Template to deploy Docker Containers in Swarm mode and manages interoperability over heterogeneous fog devices. The framework uses a lightweight TOSCA compliant orchestrator to dynamically deploy various fog applications (user-developed services) on the fly.

传统的以云为中心的物联网(IoT)应用无法满足时间关键型应用的延迟需求。边缘计算和雾计算的想法是在位于局部区域的雾设备之间分配工作负载。然而,实现无缝的互操作性、平台独立性和服务的自动部署成为异构雾设备面临的主要挑战。本文提出了一个集成的、基于标准的雾计算联合框架FogDEFT,它适应了OASIS-Topology和Orchestration Specification for Cloud Applications (TOSCA),用于雾中的服务部署。该框架使用TOSCA Service Template对分布式应用设计进行标准化,以集群模式部署Docker容器,并管理异构雾设备之间的互操作性。该框架使用轻量级的TOSCA兼容编排器动态部署各种雾应用程序(用户开发的服务)。
{"title":"Fog computing out of the box: Dynamic deployment of fog service containers with TOSCA","authors":"Suvam Basak,&nbsp;Satish Narayana Srirama","doi":"10.1002/nem.2246","DOIUrl":"10.1002/nem.2246","url":null,"abstract":"<p>The conventional cloud-centric Internet of Things (IoT) application fails to meet the latency requirement of time-critical applications. The idea of edge and fog computing arrived to distribute workloads across the fog devices located in the local area. However, achieving seamless interoperability, platform independence, and automatic deployment of services becomes the major challenge over heterogeneous fog devices. This paper proposes an integrated and standards-based fog computing federation framework, FogDEFT, that adapts OASIS–Topology and Orchestration Specification for Cloud Applications (TOSCA) for service deployment in fog. The framework standardizes the distributed application design with TOSCA Service Template to deploy Docker Containers in Swarm mode and manages interoperability over heterogeneous fog devices. The framework uses a lightweight TOSCA compliant orchestrator to dynamically deploy various fog applications (user-developed services) on the fly.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43098814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load balancing clustering and routing for IoT-enabled wireless sensor networks 支持物联网的无线传感器网络负载均衡集群和路由
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-07-24 DOI: 10.1002/nem.2244
Shashank Singh, Veena Anand

Internet of things (IoT) devices are equipped with a number of interconnected sensor nodes that relies on ubiquitous connectivity between sensor devices to optimize information automation processes. Because of the extensive deployments in adverse areas and unsupervised nature of wireless sensor networks (WSNs), energy efficiency is a significant aim in these networks. Network survival time can be extended by optimizing its energy consumption. It has been a complex struggle for researchers to develop energy-efficient routing protocols in the field of WSNs. Energy consumption, path reliability and Quality of Service (QoS) in WSNs became important factors to be focused on enforcing an efficient routing strategy. A hybrid optimization technique presented in this paper is a combination of fuzzy c-means and Grey Wolf optimization (GWO) techniques for clustering. The proposed scheme was evaluated on different parameters such as total energy consumed, packet delivery ratio, packet drop rate, throughput, delay, remaining energy and total network lifetime. According to the results of the simulation, the proposed scheme improves energy efficiency and throughput by about 30% and packet delivery ratio and latency by about 10%, compared with existing protocols such as Chemical Reaction Approach based Cluster Formation (CHRA), Hybrid Optimal Based Cluster Formation (HOBCF), GWO-based clustering (GWO-C) and Cat Swarm Optimization based Energy-Efficient Reliable sectoring Scheme with prediction algorithms (P_CSO_EERSS). The study concludes that the protocol suitable for creating IoT monitoring system network lifetime is an important criteria.

物联网(IoT)设备配备了许多相互连接的传感器节点,这些节点依赖于传感器设备之间无处不在的连接来优化信息自动化过程。由于无线传感器网络(WSNs)在不利区域的广泛部署和无监督的性质,能源效率是这些网络的重要目标。通过优化网络能耗,可以延长网络生存时间。在无线传感器网络领域,开发节能路由协议一直是研究人员面临的一个复杂问题。无线传感器网络中的能量消耗、路径可靠性和服务质量(QoS)成为实施有效路由策略的重要因素。本文提出了一种混合优化技术,将模糊均值和灰狼优化(GWO)技术相结合用于聚类。根据总能耗、分组投递率、丢包率、吞吐量、延迟、剩余能量和网络总寿命等参数对该方案进行了评价。仿真结果表明,与现有的基于化学反应方法的聚类(CHRA)、基于混合最优的聚类(HOBCF)、基于GWO的聚类(GWO‐C)和基于Cat群优化的带预测算法的高效节能可靠分割线方案(P_CSO_EERSS)相比,该方案的能量效率和吞吐量提高了约30%,数据包传输率和延迟提高了约10%。研究认为,适合创建物联网监控系统网络生存期的协议是一个重要的标准。
{"title":"Load balancing clustering and routing for IoT-enabled wireless sensor networks","authors":"Shashank Singh,&nbsp;Veena Anand","doi":"10.1002/nem.2244","DOIUrl":"10.1002/nem.2244","url":null,"abstract":"<p>Internet of things (IoT) devices are equipped with a number of interconnected sensor nodes that relies on ubiquitous connectivity between sensor devices to optimize information automation processes. Because of the extensive deployments in adverse areas and unsupervised nature of wireless sensor networks (WSNs), energy efficiency is a significant aim in these networks. Network survival time can be extended by optimizing its energy consumption. It has been a complex struggle for researchers to develop energy-efficient routing protocols in the field of WSNs. Energy consumption, path reliability and Quality of Service (QoS) in WSNs became important factors to be focused on enforcing an efficient routing strategy. A hybrid optimization technique presented in this paper is a combination of fuzzy c-means and Grey Wolf optimization (GWO) techniques for clustering. The proposed scheme was evaluated on different parameters such as total energy consumed, packet delivery ratio, packet drop rate, throughput, delay, remaining energy and total network lifetime. According to the results of the simulation, the proposed scheme improves energy efficiency and throughput by about 30% and packet delivery ratio and latency by about 10%, compared with existing protocols such as Chemical Reaction Approach based Cluster Formation (CHRA), Hybrid Optimal Based Cluster Formation (HOBCF), GWO-based clustering (GWO-C) and Cat Swarm Optimization based Energy-Efficient Reliable sectoring Scheme with prediction algorithms (P_CSO_EERSS). The study concludes that the protocol suitable for creating IoT monitoring system network lifetime is an important criteria.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41802986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges 基于区块链的不可替代代币调查:历史、技术、标准和公开挑战
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-07-19 DOI: 10.1002/nem.2245
Kyungchan Ko, Taeyeol Jeong, Jongsoo Woo, James Won-Ki Hong

This paper presents a survey of non-fungible tokens (NFTs), including its history, technologies, standards, and challenges in their development. An NFT is a unique digital entity that is created and maintained using blockchain technology. Each NFT is identified using a unique smart contract and a token ID, so the whole history of the NFT can be globally identified by its address and token ID. The blockchain information indelibly identifies the current owner of any asset, previous owners, and original creator. NFTs are used to manage ownership of digital and physical assets and cryptocurrencies. The prices of popular NFTs have become very high, and the market for them has overheated in recent years. NFT technology and its ecosystem have evolved since Quantum, the first NFT, was stored in the Namecoin blockchain. Ethereum has become the main platform for NFT projects because it provides support for smart contracts. Currently, almost all NFT projects are launched on the Ethereum blockchain. NFT has two major standards called ERC-721 and ERC-1155, which have had important functions in the development of NFT. Starting with these two standards, other standards for NFT continue to emerge; they expand the functionality of NFT such as by adding utility. However, NFT is a very early technology, and it has not been long after the NFT concept was created and used. So there are several challenges for further improving NFT technology, in terms of usability, interoperability, and evolution. This paper presents a survey of NFT, including its history, technologies, standards, and challenges of NFT.

本文介绍了不可篡改代币(NFT),包括其历史、技术、标准和发展中的挑战。NFT 是使用区块链技术创建和维护的唯一数字实体。每个 NFT 都使用唯一的智能合约和代币 ID 进行识别,因此 NFT 的整个历史都可以通过其地址和代币 ID 进行全球识别。区块链信息可以不可磨灭地识别任何资产的当前所有者、先前所有者和原始创建者。NFT 用于管理数字资产、实物资产和加密货币的所有权。近年来,流行的 NFT 价格变得非常高,市场已经过热。自首个 NFT 量子存储在 Namecoin 区块链中以来,NFT 技术及其生态系统不断发展。以太坊已成为 NFT 项目的主要平台,因为它提供了对智能合约的支持。目前,几乎所有的 NFT 项目都是在以太坊区块链上启动的。NFT 有两个主要标准,分别称为 ERC-721 和 ERC-1155,它们在 NFT 的发展过程中发挥了重要作用。从这两个标准开始,NFT 的其他标准不断涌现;它们扩展了 NFT 的功能,例如增加了实用性。然而,NFT 是一项非常早期的技术,NFT 概念产生和使用的时间并不长。因此,要进一步改进 NFT 技术,在可用性、互操作性和演进方面还面临着一些挑战。本文介绍了 NFT 的概况,包括 NFT 的历史、技术、标准和挑战。
{"title":"Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges","authors":"Kyungchan Ko,&nbsp;Taeyeol Jeong,&nbsp;Jongsoo Woo,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.2245","DOIUrl":"10.1002/nem.2245","url":null,"abstract":"<p>This paper presents a survey of non-fungible tokens (NFTs), including its history, technologies, standards, and challenges in their development. An NFT is a unique digital entity that is created and maintained using blockchain technology. Each NFT is identified using a unique smart contract and a token ID, so the whole history of the NFT can be globally identified by its address and token ID. The blockchain information indelibly identifies the current owner of any asset, previous owners, and original creator. NFTs are used to manage ownership of digital and physical assets and cryptocurrencies. The prices of popular NFTs have become very high, and the market for them has overheated in recent years. NFT technology and its ecosystem have evolved since Quantum, the first NFT, was stored in the Namecoin blockchain. Ethereum has become the main platform for NFT projects because it provides support for smart contracts. Currently, almost all NFT projects are launched on the Ethereum blockchain. NFT has two major standards called ERC-721 and ERC-1155, which have had important functions in the development of NFT. Starting with these two standards, other standards for NFT continue to emerge; they expand the functionality of NFT such as by adding utility. However, NFT is a very early technology, and it has not been long after the NFT concept was created and used. So there are several challenges for further improving NFT technology, in terms of usability, interoperability, and evolution. This paper presents a survey of NFT, including its history, technologies, standards, and challenges of NFT.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43978855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing 移动边缘计算中使用强化学习和马尔可夫决策过程的安全数据卸载
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-06-27 DOI: 10.1002/nem.2243
Jitendra Kumar Samriya, Mohit Kumar, Sukhpal Singh Gill

Mobile Internet services are developing rapidly for several applications based on computational ability such as augmented/virtual reality, vehicular networks, etc. The mobile terminals are enabled using mobile edge computing (MEC) for offloading the task at the edge of the cellular networks, but offloading is still a challenging issue due to the dynamism, and uncertainty of upcoming IoT requests and wireless channel state. Moreover, securing the offloading data enhanced the challenges of computational complexities and required a secure and efficient offloading technique. To tackle the mentioned issues, a reinforcement learning-based Markov decision process offloading model is proposed that optimized energy efficiency, and mobile users' time by considering the constrained computation of IoT devices, moreover guarantees efficient resource sharing among multiple users. An advanced encryption standard is employed in this work to fulfil the requirements of data security. The simulation outputs reveal that the proposed approach surpasses the existing baseline models for offloading overhead and service cost QoS parameters ensuring secure data offloading.

随着增强/虚拟现实、车载网络等基于计算能力的应用领域的发展,移动互联网业务正在迅速发展。移动终端使用移动边缘计算(MEC)来卸载蜂窝网络边缘的任务,但由于即将到来的物联网请求和无线信道状态的动态性和不确定性,卸载仍然是一个具有挑战性的问题。此外,保护卸载数据增加了计算复杂性的挑战,需要一种安全高效的卸载技术。为了解决上述问题,提出了一种基于强化学习的马尔可夫决策过程卸载模型,该模型考虑了物联网设备的约束计算,优化了能源效率和移动用户的时间,并保证了多用户之间有效的资源共享。该工作采用了先进的加密标准来满足数据安全的要求。仿真结果表明,该方法优于现有的基线模型,在卸载开销和服务成本QoS参数方面保证了数据的安全卸载。
{"title":"Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing","authors":"Jitendra Kumar Samriya,&nbsp;Mohit Kumar,&nbsp;Sukhpal Singh Gill","doi":"10.1002/nem.2243","DOIUrl":"10.1002/nem.2243","url":null,"abstract":"<p>Mobile Internet services are developing rapidly for several applications based on computational ability such as augmented/virtual reality, vehicular networks, etc. The mobile terminals are enabled using mobile edge computing (MEC) for offloading the task at the edge of the cellular networks, but offloading is still a challenging issue due to the dynamism, and uncertainty of upcoming IoT requests and wireless channel state. Moreover, securing the offloading data enhanced the challenges of computational complexities and required a secure and efficient offloading technique. To tackle the mentioned issues, a reinforcement learning-based Markov decision process offloading model is proposed that optimized energy efficiency, and mobile users' time by considering the constrained computation of IoT devices, moreover guarantees efficient resource sharing among multiple users. An advanced encryption standard is employed in this work to fulfil the requirements of data security. The simulation outputs reveal that the proposed approach surpasses the existing baseline models for offloading overhead and service cost QoS parameters ensuring secure data offloading.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45078477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning 基于物联网和深度学习的实证会计课程教学模式的思考与探索
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-06-25 DOI: 10.1002/nem.2242
Shengyi Yang, Shaoying Zhu

Empirical accounting is a relatively new course. It was first produced in the United States in the 1960s. After years of research and development, a relatively complete theoretical system has been formed. Empirical accounting teaching is a new content of accounting higher education in our country, which plays an important role in popularizing and improving the empirical study of accounting in our country. After investigating and analysing the empirical accounting teaching in most colleges in my country, this paper summarizes and analyzes the current status of empirical accounting teaching and discusses the optimization measures of its empirical accounting teaching mode based on the Internet of Things and deep learning. The experimental results show that this method can effectively improve students' learning efficiency and teachers' teaching satisfaction.

实证会计是一门相对较新的课程。它最早产生于 20 世纪 60 年代的美国。经过多年的研究和发展,已经形成了比较完整的理论体系。实证会计教学是我国会计高等教育的一项新内容,对普及和提高我国会计实证研究具有重要作用。本文在对我国大部分高校的实证会计教学进行调查分析后,总结分析了实证会计教学的现状,探讨了其基于物联网和深度学习的实证会计教学模式的优化措施。实验结果表明,该方法能有效提高学生的学习效率和教师的教学满意度。
{"title":"Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning","authors":"Shengyi Yang,&nbsp;Shaoying Zhu","doi":"10.1002/nem.2242","DOIUrl":"10.1002/nem.2242","url":null,"abstract":"<p>Empirical accounting is a relatively new course. It was first produced in the United States in the 1960s. After years of research and development, a relatively complete theoretical system has been formed. Empirical accounting teaching is a new content of accounting higher education in our country, which plays an important role in popularizing and improving the empirical study of accounting in our country. After investigating and analysing the empirical accounting teaching in most colleges in my country, this paper summarizes and analyzes the current status of empirical accounting teaching and discusses the optimization measures of its empirical accounting teaching mode based on the Internet of Things and deep learning. The experimental results show that this method can effectively improve students' learning efficiency and teachers' teaching satisfaction.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2242","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43731111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-enabled security management framework for mobile edge computing 一个支持区块链的移动边缘计算安全管理框架
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-05-19 DOI: 10.1002/nem.2240
Jafar A. Alzubi, Omar A. Alzubi, Ashish Singh, Tareq Mahmod Alzubi

Mobile edge computing (MEC) integrates mobile and edge computing technologies to provide efficient computing services with low latency. It includes several Internet of Things (IoT) and edge devices that process the user data at the network's edge. The architectural characteristic of MEC supports many internet-based services, which attract more number of users, including attackers. The safety and privacy of the MEC environment, especially user information is a significant concern. A lightweight accessing and sharing protocol is required because edge devices are resource constraints. This paper addresses this issue by proposing a blockchain-enabled security management framework for MEC environments. This approach provides another level of security and includes blockchain security features like temper resistance, immutable, transparent, traceable, and distributed ledger in the MEC environment. The framework guarantees secure data storage in the MEC environment. The contributions of this paper are twofold: (1) We propose a blockchain-enabled security management framework for MEC environments that address the security and privacy concerns, and (2) we demonstrate through simulations that the framework has high performance and is suitable for resource-constrained MEC devices. In addition, a smart contract-based access and sharing mechanism is proposed. Our research uses a combination of theoretical analysis and simulation experiments to demonstrate that the proposed framework offers high security, low latency, legitimate access, high throughput, and low operations cost.

移动边缘计算(MEC)将移动和边缘计算技术相结合,提供高效、低时延的计算服务。它包括几个物联网(IoT)和边缘设备,用于处理网络边缘的用户数据。MEC的架构特点支持许多基于互联网的服务,这吸引了更多的用户,包括攻击者。MEC环境的安全性和隐私性,特别是用户信息是一个值得关注的问题。由于边缘设备是资源约束,因此需要轻量级的访问和共享协议。本文通过为MEC环境提出一个启用区块链的安全管理框架来解决这个问题。这种方法提供了另一种级别的安全性,并包括区块链安全特性,如MEC环境中的耐篡改、不可变、透明、可跟踪和分布式账本。该框架保证了MEC环境下数据的安全存储。本文的贡献是双重的:(1)我们为MEC环境提出了一个支持区块链的安全管理框架,以解决安全和隐私问题;(2)我们通过模拟证明了该框架具有高性能,适用于资源受限的MEC设备。此外,提出了一种基于智能合约的访问和共享机制。我们的研究使用理论分析和仿真实验相结合的方法来证明所提出的框架具有高安全性,低延迟,合法访问,高吞吐量和低运营成本。
{"title":"A blockchain-enabled security management framework for mobile edge computing","authors":"Jafar A. Alzubi,&nbsp;Omar A. Alzubi,&nbsp;Ashish Singh,&nbsp;Tareq Mahmod Alzubi","doi":"10.1002/nem.2240","DOIUrl":"10.1002/nem.2240","url":null,"abstract":"<p>Mobile edge computing (MEC) integrates mobile and edge computing technologies to provide efficient computing services with low latency. It includes several Internet of Things (IoT) and edge devices that process the user data at the network's edge. The architectural characteristic of MEC supports many internet-based services, which attract more number of users, including attackers. The safety and privacy of the MEC environment, especially user information is a significant concern. A lightweight accessing and sharing protocol is required because edge devices are resource constraints. This paper addresses this issue by proposing a blockchain-enabled security management framework for MEC environments. This approach provides another level of security and includes blockchain security features like temper resistance, immutable, transparent, traceable, and distributed ledger in the MEC environment. The framework guarantees secure data storage in the MEC environment. The contributions of this paper are twofold: (1) We propose a blockchain-enabled security management framework for MEC environments that address the security and privacy concerns, and (2) we demonstrate through simulations that the framework has high performance and is suitable for resource-constrained MEC devices. In addition, a smart contract-based access and sharing mechanism is proposed. Our research uses a combination of theoretical analysis and simulation experiments to demonstrate that the proposed framework offers high security, low latency, legitimate access, high throughput, and low operations cost.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46445927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accelerating network softwarization in the cognitive age 认知时代加速网络软件化
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-05-15 DOI: 10.1002/nem.2241
Kohei Shiomoto, Young-Tak Kim, Christian Esteve Rothenberg, Barbara Martini, Eiji Oki

This special issue contains extended versions of three best papers from the IEEE International Conference on Network Softwarization (NetSoft 2021, https://netsoft2021.ieee-netsoft.org/). The theme of NetSoft 2021 was “Accelerating Network Softwarization in the Cognitive Age.” The General Co-Chairs were Kohei Shiomoto, Tokyo City University, Japan and Young-Tak Kim, Yeungnam University, Korea. The TPC-Co-Chairs were Christian Esteve Rothenberg, University of Campinas, Brazil; Barbara Martini, CNIT, Italy; and Eiji Oki, Kyoto University, Japan.

The first paper, titled “RNN-EdgeQL: An Auto-Scaling and Placement Approach for SFC,” proposes an innovative prediction-based scaling and placement algorithm for service function chains (SFCs) that improves service level agreements (SLAs) and reduces operational costs. The authors use a variant of recurrent neural networks (RNNs) called gated recurrent unit (GRU) for resource demand prediction and an algorithm that applies Q-Learning on Edge computing environment (EdgeQL) to place scaled-out virtual network functions (VNFs) in appropriate locations. The proposed algorithm is tested on realistic temporal dynamic load models and achieves the lowest overall latency, lowest SLA violations, and lowest VNFs requirement compared with existing algorithms.

The second paper, titled “SRv6-based Time-Sensitive Networks (TSN) with Low Overhead Rerouting,” proposes a software-defined network (SDN)-based approach for low-overhead TSN network updates using segment routing over IPv6 (SRv6) for path control. The authors introduce the concept of TSN subgraphs to quickly reschedule flows traversing problematic areas and propose a TSN-aware routing heuristic to minimize convergence time. The proposed approach yields faster recovery and significantly reduces the number of required reconfigurations upon failures, at the expense of a small SRv6 encoding/decoding overhead.

The third paper, titled “Analysis of Network Function Sharing in Content Delivery Network-as-a-Service Slicing Scenarios,” investigates the potential efficiencies that can be achieved when sharing a virtual cache function among Internet service providers (ISPs) that are sharing a common physical infrastructure. The authors simulate the sharing of virtualized cache functions and analyze the implications of limiting the storage capacity of the caches at the edge. The paper provides insights into the potential cost savings that can be achieved by sharing network infrastructures and virtualized cache functions among ISPs.

We believe that these three papers make significant contributions and offer valuable insights into the challenges and opportunities of managing softwarized networks. We hope that this special issue will inspire further research in this area and lead to the development of more efficient and effective network management solutions.

We would like to thank the authors for their excellent contributions and the reviewers for

网络Softwarization
{"title":"Accelerating network softwarization in the cognitive age","authors":"Kohei Shiomoto,&nbsp;Young-Tak Kim,&nbsp;Christian Esteve Rothenberg,&nbsp;Barbara Martini,&nbsp;Eiji Oki","doi":"10.1002/nem.2241","DOIUrl":"10.1002/nem.2241","url":null,"abstract":"<p>This special issue contains extended versions of three best papers from the IEEE International Conference on Network Softwarization (NetSoft 2021, https://netsoft2021.ieee-netsoft.org/). The theme of NetSoft 2021 was “Accelerating Network Softwarization in the Cognitive Age.” The General Co-Chairs were Kohei Shiomoto, Tokyo City University, Japan and Young-Tak Kim, Yeungnam University, Korea. The TPC-Co-Chairs were Christian Esteve Rothenberg, University of Campinas, Brazil; Barbara Martini, CNIT, Italy; and Eiji Oki, Kyoto University, Japan.</p><p>The first paper, titled “RNN-EdgeQL: An Auto-Scaling and Placement Approach for SFC,” proposes an innovative prediction-based scaling and placement algorithm for service function chains (SFCs) that improves service level agreements (SLAs) and reduces operational costs. The authors use a variant of recurrent neural networks (RNNs) called gated recurrent unit (GRU) for resource demand prediction and an algorithm that applies Q-Learning on Edge computing environment (EdgeQL) to place scaled-out virtual network functions (VNFs) in appropriate locations. The proposed algorithm is tested on realistic temporal dynamic load models and achieves the lowest overall latency, lowest SLA violations, and lowest VNFs requirement compared with existing algorithms.</p><p>The second paper, titled “SRv6-based Time-Sensitive Networks (TSN) with Low Overhead Rerouting,” proposes a software-defined network (SDN)-based approach for low-overhead TSN network updates using segment routing over IPv6 (SRv6) for path control. The authors introduce the concept of TSN subgraphs to quickly reschedule flows traversing problematic areas and propose a TSN-aware routing heuristic to minimize convergence time. The proposed approach yields faster recovery and significantly reduces the number of required reconfigurations upon failures, at the expense of a small SRv6 encoding/decoding overhead.</p><p>The third paper, titled “Analysis of Network Function Sharing in Content Delivery Network-as-a-Service Slicing Scenarios,” investigates the potential efficiencies that can be achieved when sharing a virtual cache function among Internet service providers (ISPs) that are sharing a common physical infrastructure. The authors simulate the sharing of virtualized cache functions and analyze the implications of limiting the storage capacity of the caches at the edge. The paper provides insights into the potential cost savings that can be achieved by sharing network infrastructures and virtualized cache functions among ISPs.</p><p>We believe that these three papers make significant contributions and offer valuable insights into the challenges and opportunities of managing softwarized networks. We hope that this special issue will inspire further research in this area and lead to the development of more efficient and effective network management solutions.</p><p>We would like to thank the authors for their excellent contributions and the reviewers for","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2241","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45535227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1