首页 > 最新文献

NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium最新文献

英文 中文
Research on lifetime prediction-based recharging scheme in rechargeable WSNs 基于寿命预测的可充电无线传感器网络充电方案研究
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406304
Yang Yang, He Li, Xue-song Qiu, Shaoyong Guo, XiaoXiao Zeng, Kangting Zhao, Haoran Xin
In order to reduce the cost and energy consumption in wireless sensor network's charging process, this paper proposes a Recharging Scheme based on Lifetime Prediction (RSLP) for wireless rechargeable sensor networks. First of all, based on the historical quantity of electricity variation sequence of the sensor nodes, the lifetime prediction scheme of the sensor nodes is established; and then, considering the sensor nodes need to be recharged and the Sink nodes chosen by the mobile charger (MC) according to the charging value to establish an undirected complete diagram. A Hamilton charging circuit is established by using the Gene-Expressive cuckoo algorithm to solve the charging problem of the rechargeable sensor networks. The simulation experiments show that the proposed algorithm can improve charging efficiency and reduce the mobile energy consumption.
为了降低无线传感器网络充电过程中的成本和能耗,提出了一种基于寿命预测(RSLP)的无线可充电传感器网络充电方案。首先,根据传感器节点的历史电量变化序列,建立传感器节点的寿命预测方案;然后,考虑需要充电的传感器节点和移动充电器(MC)根据充电值选择的Sink节点,建立无向完全图。利用基因表达布谷鸟算法建立了Hamilton充电电路,解决了可充电传感器网络的充电问题。仿真实验表明,该算法可以提高充电效率,降低移动能耗。
{"title":"Research on lifetime prediction-based recharging scheme in rechargeable WSNs","authors":"Yang Yang, He Li, Xue-song Qiu, Shaoyong Guo, XiaoXiao Zeng, Kangting Zhao, Haoran Xin","doi":"10.1109/NOMS.2018.8406304","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406304","url":null,"abstract":"In order to reduce the cost and energy consumption in wireless sensor network's charging process, this paper proposes a Recharging Scheme based on Lifetime Prediction (RSLP) for wireless rechargeable sensor networks. First of all, based on the historical quantity of electricity variation sequence of the sensor nodes, the lifetime prediction scheme of the sensor nodes is established; and then, considering the sensor nodes need to be recharged and the Sink nodes chosen by the mobile charger (MC) according to the charging value to establish an undirected complete diagram. A Hamilton charging circuit is established by using the Gene-Expressive cuckoo algorithm to solve the charging problem of the rechargeable sensor networks. The simulation experiments show that the proposed algorithm can improve charging efficiency and reduce the mobile energy consumption.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83323924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantifying security and privacy in Internet of Things solutions 量化物联网解决方案中的安全和隐私
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406318
Faisal S. Alsubaei, Abdullah Abuhussein, S. Shiva
As the Internet of things continues to mature, there has been a wide and rapid adoption of Internet of things solutions in many domains. However, the security and privacy of these solutions are often underrated. The lack of security and privacy in the solutions can lead to catastrophic results, especially in sensitive domains like healthcare. Therefore, it is imperative to ensure their security and privacy. Stakeholders often find themselves unguided when assessing the security and privacy of the solutions. This paper proposes a framework to quantitatively assess and compare the security and privacy in Internet of things solutions using Analytic Hierarchy Process. It also provides in-depth security and privacy assessment criteria to enhance security and privacy in the Internet of things solutions. This work aims to fill the gap between consumers and providers by promoting transparency and increasing the security awareness.
随着物联网的不断成熟,物联网解决方案在许多领域得到了广泛而迅速的应用。然而,这些解决方案的安全性和隐私性往往被低估。解决方案中缺乏安全性和隐私性可能导致灾难性的结果,特别是在医疗保健等敏感领域。因此,确保他们的安全和隐私是势在必行的。涉众在评估解决方案的安全性和隐私性时经常发现自己没有指导。本文提出了一个使用层次分析法对物联网解决方案的安全性和隐私性进行定量评估和比较的框架。它还提供了深入的安全和隐私评估标准,以增强物联网解决方案的安全性和隐私性。这项工作旨在通过提高透明度和提高安全意识来填补消费者和供应商之间的差距。
{"title":"Quantifying security and privacy in Internet of Things solutions","authors":"Faisal S. Alsubaei, Abdullah Abuhussein, S. Shiva","doi":"10.1109/NOMS.2018.8406318","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406318","url":null,"abstract":"As the Internet of things continues to mature, there has been a wide and rapid adoption of Internet of things solutions in many domains. However, the security and privacy of these solutions are often underrated. The lack of security and privacy in the solutions can lead to catastrophic results, especially in sensitive domains like healthcare. Therefore, it is imperative to ensure their security and privacy. Stakeholders often find themselves unguided when assessing the security and privacy of the solutions. This paper proposes a framework to quantitatively assess and compare the security and privacy in Internet of things solutions using Analytic Hierarchy Process. It also provides in-depth security and privacy assessment criteria to enhance security and privacy in the Internet of things solutions. This work aims to fill the gap between consumers and providers by promoting transparency and increasing the security awareness.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"45 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88092594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design and implementation of a load shedding engine for solving starvation problems in Apache Kafka 为解决Apache Kafka中的饥饿问题设计并实现了一个减载引擎
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406306
Jiwon Bang, Siwoon Son, Hajin Kim, Yang-Sae Moon, Mi-Jung Choi
Real-time data stream processing technologies such as Apache Storm and Apache Spark are being actively studied to deal with large-capacity data streams that generated rapidly in real time. Because it is difficult to use most real-time processing techniques alone, it is common to use it with a messaging system that supports input and output of data streams. Apache Kafka is a representative distributed messaging system, specialized in delivering large amounts of real-time log data. However, if the production rate of data in Kafka is faster than the consumption rate, data starvation problem may arise. In order to solve the starvation problem, a load shedding technique is needed to limit the incoming data and maintain system performance when the system is under load. Thus, in this paper confirmed the starvation problem that can occur in Kafka, and we designed and implemented a load shedding engine to solve this problem and proposed a solution to the starvation problem in Kafka based on the performance experiment.
实时数据流处理技术(如Apache Storm和Apache Spark)正在积极研究,以处理实时快速生成的大容量数据流。由于很难单独使用大多数实时处理技术,因此通常将其与支持数据流输入和输出的消息传递系统一起使用。Apache Kafka是一个典型的分布式消息传递系统,专门用于交付大量实时日志数据。但是,如果Kafka中数据的生产速度快于消费速度,就可能出现数据饥饿问题。为了解决饥饿问题,需要一种减载技术来限制输入数据并在系统处于负载状态时保持系统性能。因此,本文确认了Kafka中可能出现的饥饿问题,我们设计并实现了一个减载引擎来解决这个问题,并在性能实验的基础上提出了Kafka中饥饿问题的解决方案。
{"title":"Design and implementation of a load shedding engine for solving starvation problems in Apache Kafka","authors":"Jiwon Bang, Siwoon Son, Hajin Kim, Yang-Sae Moon, Mi-Jung Choi","doi":"10.1109/NOMS.2018.8406306","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406306","url":null,"abstract":"Real-time data stream processing technologies such as Apache Storm and Apache Spark are being actively studied to deal with large-capacity data streams that generated rapidly in real time. Because it is difficult to use most real-time processing techniques alone, it is common to use it with a messaging system that supports input and output of data streams. Apache Kafka is a representative distributed messaging system, specialized in delivering large amounts of real-time log data. However, if the production rate of data in Kafka is faster than the consumption rate, data starvation problem may arise. In order to solve the starvation problem, a load shedding technique is needed to limit the incoming data and maintain system performance when the system is under load. Thus, in this paper confirmed the starvation problem that can occur in Kafka, and we designed and implemented a load shedding engine to solve this problem and proposed a solution to the starvation problem in Kafka based on the performance experiment.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"14 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76477537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Hotspot localization and prediction in wireless cellular networks via spatial traffic fitting 基于空间流量拟合的无线蜂窝网络热点定位与预测
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406292
Xiang Zhang, F. Zhou, Jiayi Ning, Peng Yu, Wenjing Li
With the proliferation of bandwidth-demanding mobile applications in the era of 5G, the aggregation of a few users may lead to extremely high load in cellular base stations, producing traffic hotspot in wireless networks. Therefore the higher requirement is imposed on the flexibility of a 5G network, namely the capability of performing rapid capacity enhancement in hotspot area, which makes hotspot localization and critical prediction functions. In this paper, we proposed to localize hotspots with Gaussian Random Field (GRF)-based spatial traffic density model deduced from load data of base stations, together with the prediction with Holt-Winters. We measured the spatial traffic in a specific area within a short time span and forecasted the spatial traffic density distribution. Numeric results show the proposed approach can localize hotspot efficiently, and during traffic peak hours, hotspot prediction is of high success rate.
随着5G时代对带宽要求较高的移动应用的激增,少量用户的聚集可能会导致蜂窝基站的负载极高,在无线网络中产生流量热点。因此对5G网络的灵活性提出了更高的要求,即在热点区域进行快速扩容的能力,从而实现热点定位和关键预测功能。本文提出了基于高斯随机场(Gaussian Random Field, GRF)的空间交通密度模型,并结合Holt-Winters预测方法对热点区域进行定位。对某一特定区域在短时间内的空间交通流量进行测量,并对空间交通密度分布进行预测。数值结果表明,该方法能有效地定位热点,在交通高峰时段,热点预测成功率高。
{"title":"Hotspot localization and prediction in wireless cellular networks via spatial traffic fitting","authors":"Xiang Zhang, F. Zhou, Jiayi Ning, Peng Yu, Wenjing Li","doi":"10.1109/NOMS.2018.8406292","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406292","url":null,"abstract":"With the proliferation of bandwidth-demanding mobile applications in the era of 5G, the aggregation of a few users may lead to extremely high load in cellular base stations, producing traffic hotspot in wireless networks. Therefore the higher requirement is imposed on the flexibility of a 5G network, namely the capability of performing rapid capacity enhancement in hotspot area, which makes hotspot localization and critical prediction functions. In this paper, we proposed to localize hotspots with Gaussian Random Field (GRF)-based spatial traffic density model deduced from load data of base stations, together with the prediction with Holt-Winters. We measured the spatial traffic in a specific area within a short time span and forecasted the spatial traffic density distribution. Numeric results show the proposed approach can localize hotspot efficiently, and during traffic peak hours, hotspot prediction is of high success rate.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87619185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Framework for precise protocol reverse engineering based on network traces 基于网络轨迹的精确协议逆向工程框架
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406307
Young-Hoon Goo, Kyu-Seok Shim, Byeong-Min Chae, Myung-Sup Kim
Emergence of high-speed Internet and ubiquitous environment is generating massive traffic, and it has led to a rapid increase of applications and malicious behaviors with various functions. Many of the complex and diverse protocols that occur under these situations, are unknown or proprietary protocols that are at least documented. For efficient network management and network security, protocol reverse engineering that extract the specification of the protocols is very important. While various protocol reverse engineering methods have been studied, there is no single standardized method to extract protocol specification completely yet, and each of methods has some limitations. In this paper, we propose the framework for precise protocol reverse engineering based on network traces. The proposed framework can extract highly elaborative and intuitive message formats, flow formats, and protocol state machine of the unknown protocol. We demonstrate the validity of our framework through an example of HTTP protocol.
高速互联网的出现和无处不在的环境产生了海量的流量,导致各种功能的应用和恶意行为迅速增加。在这些情况下出现的许多复杂而多样的协议是未知的或专有的协议,至少有文档记录。为了实现高效的网络管理和网络安全,提取协议规范的协议逆向工程是非常重要的。虽然人们研究了各种协议逆向工程方法,但目前还没有一种标准化的方法可以完全提取协议规范,而且每种方法都有一定的局限性。本文提出了一种基于网络轨迹的精确协议逆向工程框架。该框架能够提取出高度精细化和直观的消息格式、流格式和未知协议的协议状态机。我们通过一个HTTP协议的例子来证明我们的框架的有效性。
{"title":"Framework for precise protocol reverse engineering based on network traces","authors":"Young-Hoon Goo, Kyu-Seok Shim, Byeong-Min Chae, Myung-Sup Kim","doi":"10.1109/NOMS.2018.8406307","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406307","url":null,"abstract":"Emergence of high-speed Internet and ubiquitous environment is generating massive traffic, and it has led to a rapid increase of applications and malicious behaviors with various functions. Many of the complex and diverse protocols that occur under these situations, are unknown or proprietary protocols that are at least documented. For efficient network management and network security, protocol reverse engineering that extract the specification of the protocols is very important. While various protocol reverse engineering methods have been studied, there is no single standardized method to extract protocol specification completely yet, and each of methods has some limitations. In this paper, we propose the framework for precise protocol reverse engineering based on network traces. The proposed framework can extract highly elaborative and intuitive message formats, flow formats, and protocol state machine of the unknown protocol. We demonstrate the validity of our framework through an example of HTTP protocol.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"20 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87079735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks SECOD: SDN安全控制和数据平面算法,用于检测和防御DoS攻击
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406196
Song Wang, S. Chandrasekharan, K. Gomez, K. Sithamparanathan, A. Al-Hourani, M. R. Asghar, G. Russello, Paul Zanna
Although the popularity of Software-Defined Networking (SDN) is increasing, it is also vulnerable to security attacks such as Denial of Service (DoS) attacks. Since in SDN, the control plane is isolated from the data plane, DoS attackers can easily target the control plane to impair the network infrastructure in addition to the data plane to degrade the user's Quality of Service (QoS). In our previous work, we introduced SECO, an SDN Secure Controller algorithm to detect and defend SDN against DoS attacks. Simulation results showed that SECO successfully defends SDN networks from DoS attacks. In this paper, we present SDN sEcure COntrol and Data Plane (SECOD), which is an improved version of SECO. Basically, SECOD introduces new triggers to detect and prevent DoS attacks in both control and data planes. Moreover, SECOD is implemented and tested using SDN-based hardware testbed, OpenFlow-based switch, and RYU controller to capture the dynamics of realistic hardware and software. The results show that SECOD successfully detects and effectively mitigates DoS attacks on SDN networks keeping data plane performance at 99.72% compared to a network not under attack.
尽管软件定义网络(SDN)越来越受欢迎,但它也容易受到拒绝服务(DoS)攻击等安全攻击。由于在SDN中,控制平面与数据平面是隔离的,DoS攻击者可以很容易地针对控制平面破坏网络基础设施,从而降低用户的服务质量(QoS)。在我们之前的工作中,我们介绍了SECO,一种SDN安全控制器算法,用于检测和保护SDN免受DoS攻击。仿真结果表明,SECO成功防御了SDN网络的DoS攻击。在本文中,我们提出了SDN安全控制和数据平面(SECOD),它是SECO的改进版本。基本上,SECOD引入了新的触发器来检测和防止控制平面和数据平面的DoS攻击。此外,使用基于sdn的硬件测试平台、基于openflow的交换机和RYU控制器来实现和测试SECOD,以捕获现实硬件和软件的动态。结果表明,SECOD成功检测并有效缓解了SDN网络上的DoS攻击,与未受攻击的网络相比,数据平面性能保持在99.72%。
{"title":"SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks","authors":"Song Wang, S. Chandrasekharan, K. Gomez, K. Sithamparanathan, A. Al-Hourani, M. R. Asghar, G. Russello, Paul Zanna","doi":"10.1109/NOMS.2018.8406196","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406196","url":null,"abstract":"Although the popularity of Software-Defined Networking (SDN) is increasing, it is also vulnerable to security attacks such as Denial of Service (DoS) attacks. Since in SDN, the control plane is isolated from the data plane, DoS attackers can easily target the control plane to impair the network infrastructure in addition to the data plane to degrade the user's Quality of Service (QoS). In our previous work, we introduced SECO, an SDN Secure Controller algorithm to detect and defend SDN against DoS attacks. Simulation results showed that SECO successfully defends SDN networks from DoS attacks. In this paper, we present SDN sEcure COntrol and Data Plane (SECOD), which is an improved version of SECO. Basically, SECOD introduces new triggers to detect and prevent DoS attacks in both control and data planes. Moreover, SECOD is implemented and tested using SDN-based hardware testbed, OpenFlow-based switch, and RYU controller to capture the dynamics of realistic hardware and software. The results show that SECOD successfully detects and effectively mitigates DoS attacks on SDN networks keeping data plane performance at 99.72% compared to a network not under attack.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90081568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Realizing services and slices across multiple operator domains 实现跨多个操作符域的服务和切片
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406168
I. Vaishnavi, János Czentye, M. Gharbaoui, Giovanni Giuliani, Dávid Haja, J. Harmatos, Dávid Jocha, Yoonhee Kim, B. Martini, Javier Melian, P. Monti, Balázs Németh, Wint Yi Poe, Aurora Ramos, A. Sgambelluri, Balázs Sonkoly, László Toka, F. Tusa, C. Bernardos, R. Szabó
Supporting end-to-end network slices and services across operators has become an important use case of study for 5G networks as can be seen by 5G use cases published in 3GPP, ETSI as well as NGMN. This paper presents the in- depth architecture, implementation and experiment on a multi­domain orchestration framework that is ab le to deploy such multi-operator service as well as monitor the service for SLA compliance. Our implemented architecture allows operators to abstract their sensitive details while exposing the relevant amount of information to support inter-operator slice creation. Our experiment shows that the implemented framework is capable of creating services across operators while fulfilling the respective service requirements.
从3GPP、ETSI和NGMN发布的5G用例可以看出,支持跨运营商的端到端网络切片和服务已经成为5G网络研究的重要用例。本文介绍了一个多域业务流程框架的深入架构、实现和实验,该框架能够部署这种多运营商服务,并监控服务是否符合SLA。我们实现的架构允许操作员抽象他们的敏感细节,同时公开相关的信息,以支持操作员之间的切片创建。我们的实验表明,实现的框架能够跨运营商创建服务,同时满足各自的服务需求。
{"title":"Realizing services and slices across multiple operator domains","authors":"I. Vaishnavi, János Czentye, M. Gharbaoui, Giovanni Giuliani, Dávid Haja, J. Harmatos, Dávid Jocha, Yoonhee Kim, B. Martini, Javier Melian, P. Monti, Balázs Németh, Wint Yi Poe, Aurora Ramos, A. Sgambelluri, Balázs Sonkoly, László Toka, F. Tusa, C. Bernardos, R. Szabó","doi":"10.1109/NOMS.2018.8406168","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406168","url":null,"abstract":"Supporting end-to-end network slices and services across operators has become an important use case of study for 5G networks as can be seen by 5G use cases published in 3GPP, ETSI as well as NGMN. This paper presents the in- depth architecture, implementation and experiment on a multi­domain orchestration framework that is ab le to deploy such multi-operator service as well as monitor the service for SLA compliance. Our implemented architecture allows operators to abstract their sensitive details while exposing the relevant amount of information to support inter-operator slice creation. Our experiment shows that the implemented framework is capable of creating services across operators while fulfilling the respective service requirements.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90921126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Streaming scalable video sequences with media-aware network elements implemented in P4 programming language 流式可扩展的视频序列与媒体感知网络元素在P4编程语言实现
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406129
Guan-Ru Wang, Chien-Chang Chen, Chao-Wen Chen, Li-Wen Pan, Yu-Rong Wang, Ching-Ling Fan, Cheng-Hsin Hsu
We present the first Media-Aware Network Element (MANE) for intelligently streaming scalable video sequences in P4 programming language. Our MANE selectively drops queued scalable video packets when the queue occupancy exceeds a threshold. Three packet discarding logics are implemented: (i) tail, (ii) enhancement-layer, and (iii) rate-distortion optimized. Our P4-based MANE implementation is demonstrated in: (i) larger emulated networks in mininet with P4 software switches and (ii) a small real network with a physical P4 switch and multiple Raspberry Pis running P4 software switches.
我们提出了第一个媒体感知网络元素(MANE),用于在P4编程语言中智能地流式传输可扩展的视频序列。当队列占用超过阈值时,我们的MANE有选择地丢弃排队的可扩展视频数据包。实现了三种包丢弃逻辑:(i)尾部,(ii)增强层和(iii)优化的速率失真。我们基于P4的MANE实现在以下方面进行了演示:(i)带有P4软件交换机的mininet中的大型仿真网络;(ii)带有物理P4交换机和多个运行P4软件交换机的Raspberry Pis的小型真实网络。
{"title":"Streaming scalable video sequences with media-aware network elements implemented in P4 programming language","authors":"Guan-Ru Wang, Chien-Chang Chen, Chao-Wen Chen, Li-Wen Pan, Yu-Rong Wang, Ching-Ling Fan, Cheng-Hsin Hsu","doi":"10.1109/NOMS.2018.8406129","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406129","url":null,"abstract":"We present the first Media-Aware Network Element (MANE) for intelligently streaming scalable video sequences in P4 programming language. Our MANE selectively drops queued scalable video packets when the queue occupancy exceeds a threshold. Three packet discarding logics are implemented: (i) tail, (ii) enhancement-layer, and (iii) rate-distortion optimized. Our P4-based MANE implementation is demonstrated in: (i) larger emulated networks in mininet with P4 software switches and (ii) a small real network with a physical P4 switch and multiple Raspberry Pis running P4 software switches.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91097078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deploying a multi-tier heterogeneous cloud: Experiences and lessons from the SAVI testbed 部署多层异构云:来自SAVI测试平台的经验和教训
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406140
Thomas Lin, Byungchul Park, H. Bannazadeh, A. Leon-Garcia
The SAVI testbed is a multi-tier SDN-enabled het-erogeneous cloud created as an application enablement platform for academic research. It was developed to investigate the hypothesis that the entire infrastructure can be virtualized and abstracted as a service. Key to this investigation was the creation of a resource management system based on the concept of Software-Defined Infrastructure (SDI), which enables integrated control and management over heterogeneous resources and exposes a programmable interface for users. In this paper, we present our experiences in designing and deploying the Canadian national SAVI testbed, and discuss the various lessons learned along the way. In addition, we describe our ongoing work to enhance the testbed management system to meet the demands and challenges of the IoT era.
SAVI测试平台是一个支持sdn的多层异构云,是为学术研究创建的应用程序支持平台。它的开发是为了研究整个基础设施可以被虚拟化和抽象为服务的假设。该调查的关键是基于软件定义基础设施(SDI)概念的资源管理系统的创建,该系统支持对异构资源的集成控制和管理,并为用户提供可编程接口。在本文中,我们介绍了我们在设计和部署加拿大国家SAVI测试平台方面的经验,并讨论了在此过程中获得的各种经验教训。此外,我们描述了我们正在进行的工作,以增强测试平台管理系统,以满足物联网时代的需求和挑战。
{"title":"Deploying a multi-tier heterogeneous cloud: Experiences and lessons from the SAVI testbed","authors":"Thomas Lin, Byungchul Park, H. Bannazadeh, A. Leon-Garcia","doi":"10.1109/NOMS.2018.8406140","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406140","url":null,"abstract":"The SAVI testbed is a multi-tier SDN-enabled het-erogeneous cloud created as an application enablement platform for academic research. It was developed to investigate the hypothesis that the entire infrastructure can be virtualized and abstracted as a service. Key to this investigation was the creation of a resource management system based on the concept of Software-Defined Infrastructure (SDI), which enables integrated control and management over heterogeneous resources and exposes a programmable interface for users. In this paper, we present our experiences in designing and deploying the Canadian national SAVI testbed, and discuss the various lessons learned along the way. In addition, we describe our ongoing work to enhance the testbed management system to meet the demands and challenges of the IoT era.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"29 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73232180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improving network flow definition: Formalization and applicability 改进网络流定义:形式化和适用性
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406203
P. Velan
Network flow monitoring has been used for more than 20 years and has become an important part of network accounting and security. A significant effort was invested into the standardization of flow monitoring by the Internet Engineering Task Force (IETF). The flow monitoring has steadily evolved to satisfy new requirements created by the demand for increased visibility and accuracy. Therefore, it is not surprising that even the most recent flow definition created by the IETF does not consider several specifics of the flow monitoring process as it is used nowadays. This paper presents a revised flow definition that is more generic and is designed to accommodate more specific flow monitoring requirements. Moreover, we formalize our definition to avoid ambiguity and imprecision introduced by the use of natural language. One additional benefit of formalizing the flow definition is that it implicitly describes the flow creation process as well.
网络流量监控已经使用了20多年,已经成为网络会计和安全的重要组成部分。Internet工程任务组(IETF)在流量监控的标准化方面投入了大量精力。流量监测已经稳步发展,以满足增加可视性和准确性的需求所产生的新要求。因此,即使是由IETF创建的最新流量定义也没有考虑到当前使用的流量监控过程的几个细节,这并不奇怪。本文提出了一个修订的流量定义,它更通用,旨在适应更具体的流量监测要求。此外,我们将我们的定义形式化,以避免使用自然语言带来的歧义和不精确。形式化流定义的另一个好处是,它也隐式地描述了流创建过程。
{"title":"Improving network flow definition: Formalization and applicability","authors":"P. Velan","doi":"10.1109/NOMS.2018.8406203","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406203","url":null,"abstract":"Network flow monitoring has been used for more than 20 years and has become an important part of network accounting and security. A significant effort was invested into the standardization of flow monitoring by the Internet Engineering Task Force (IETF). The flow monitoring has steadily evolved to satisfy new requirements created by the demand for increased visibility and accuracy. Therefore, it is not surprising that even the most recent flow definition created by the IETF does not consider several specifics of the flow monitoring process as it is used nowadays. This paper presents a revised flow definition that is more generic and is designed to accommodate more specific flow monitoring requirements. Moreover, we formalize our definition to avoid ambiguity and imprecision introduced by the use of natural language. One additional benefit of formalizing the flow definition is that it implicitly describes the flow creation process as well.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"94 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74935426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1