首页 > 最新文献

NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium最新文献

英文 中文
Research on lifetime prediction-based recharging scheme in rechargeable WSNs 基于寿命预测的可充电无线传感器网络充电方案研究
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406304
Yang Yang, He Li, Xue-song Qiu, Shaoyong Guo, XiaoXiao Zeng, Kangting Zhao, Haoran Xin
In order to reduce the cost and energy consumption in wireless sensor network's charging process, this paper proposes a Recharging Scheme based on Lifetime Prediction (RSLP) for wireless rechargeable sensor networks. First of all, based on the historical quantity of electricity variation sequence of the sensor nodes, the lifetime prediction scheme of the sensor nodes is established; and then, considering the sensor nodes need to be recharged and the Sink nodes chosen by the mobile charger (MC) according to the charging value to establish an undirected complete diagram. A Hamilton charging circuit is established by using the Gene-Expressive cuckoo algorithm to solve the charging problem of the rechargeable sensor networks. The simulation experiments show that the proposed algorithm can improve charging efficiency and reduce the mobile energy consumption.
为了降低无线传感器网络充电过程中的成本和能耗,提出了一种基于寿命预测(RSLP)的无线可充电传感器网络充电方案。首先,根据传感器节点的历史电量变化序列,建立传感器节点的寿命预测方案;然后,考虑需要充电的传感器节点和移动充电器(MC)根据充电值选择的Sink节点,建立无向完全图。利用基因表达布谷鸟算法建立了Hamilton充电电路,解决了可充电传感器网络的充电问题。仿真实验表明,该算法可以提高充电效率,降低移动能耗。
{"title":"Research on lifetime prediction-based recharging scheme in rechargeable WSNs","authors":"Yang Yang, He Li, Xue-song Qiu, Shaoyong Guo, XiaoXiao Zeng, Kangting Zhao, Haoran Xin","doi":"10.1109/NOMS.2018.8406304","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406304","url":null,"abstract":"In order to reduce the cost and energy consumption in wireless sensor network's charging process, this paper proposes a Recharging Scheme based on Lifetime Prediction (RSLP) for wireless rechargeable sensor networks. First of all, based on the historical quantity of electricity variation sequence of the sensor nodes, the lifetime prediction scheme of the sensor nodes is established; and then, considering the sensor nodes need to be recharged and the Sink nodes chosen by the mobile charger (MC) according to the charging value to establish an undirected complete diagram. A Hamilton charging circuit is established by using the Gene-Expressive cuckoo algorithm to solve the charging problem of the rechargeable sensor networks. The simulation experiments show that the proposed algorithm can improve charging efficiency and reduce the mobile energy consumption.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83323924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantifying security and privacy in Internet of Things solutions 量化物联网解决方案中的安全和隐私
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406318
Faisal S. Alsubaei, Abdullah Abuhussein, S. Shiva
As the Internet of things continues to mature, there has been a wide and rapid adoption of Internet of things solutions in many domains. However, the security and privacy of these solutions are often underrated. The lack of security and privacy in the solutions can lead to catastrophic results, especially in sensitive domains like healthcare. Therefore, it is imperative to ensure their security and privacy. Stakeholders often find themselves unguided when assessing the security and privacy of the solutions. This paper proposes a framework to quantitatively assess and compare the security and privacy in Internet of things solutions using Analytic Hierarchy Process. It also provides in-depth security and privacy assessment criteria to enhance security and privacy in the Internet of things solutions. This work aims to fill the gap between consumers and providers by promoting transparency and increasing the security awareness.
随着物联网的不断成熟,物联网解决方案在许多领域得到了广泛而迅速的应用。然而,这些解决方案的安全性和隐私性往往被低估。解决方案中缺乏安全性和隐私性可能导致灾难性的结果,特别是在医疗保健等敏感领域。因此,确保他们的安全和隐私是势在必行的。涉众在评估解决方案的安全性和隐私性时经常发现自己没有指导。本文提出了一个使用层次分析法对物联网解决方案的安全性和隐私性进行定量评估和比较的框架。它还提供了深入的安全和隐私评估标准,以增强物联网解决方案的安全性和隐私性。这项工作旨在通过提高透明度和提高安全意识来填补消费者和供应商之间的差距。
{"title":"Quantifying security and privacy in Internet of Things solutions","authors":"Faisal S. Alsubaei, Abdullah Abuhussein, S. Shiva","doi":"10.1109/NOMS.2018.8406318","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406318","url":null,"abstract":"As the Internet of things continues to mature, there has been a wide and rapid adoption of Internet of things solutions in many domains. However, the security and privacy of these solutions are often underrated. The lack of security and privacy in the solutions can lead to catastrophic results, especially in sensitive domains like healthcare. Therefore, it is imperative to ensure their security and privacy. Stakeholders often find themselves unguided when assessing the security and privacy of the solutions. This paper proposes a framework to quantitatively assess and compare the security and privacy in Internet of things solutions using Analytic Hierarchy Process. It also provides in-depth security and privacy assessment criteria to enhance security and privacy in the Internet of things solutions. This work aims to fill the gap between consumers and providers by promoting transparency and increasing the security awareness.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"45 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88092594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design and implementation of a load shedding engine for solving starvation problems in Apache Kafka 为解决Apache Kafka中的饥饿问题设计并实现了一个减载引擎
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406306
Jiwon Bang, Siwoon Son, Hajin Kim, Yang-Sae Moon, Mi-Jung Choi
Real-time data stream processing technologies such as Apache Storm and Apache Spark are being actively studied to deal with large-capacity data streams that generated rapidly in real time. Because it is difficult to use most real-time processing techniques alone, it is common to use it with a messaging system that supports input and output of data streams. Apache Kafka is a representative distributed messaging system, specialized in delivering large amounts of real-time log data. However, if the production rate of data in Kafka is faster than the consumption rate, data starvation problem may arise. In order to solve the starvation problem, a load shedding technique is needed to limit the incoming data and maintain system performance when the system is under load. Thus, in this paper confirmed the starvation problem that can occur in Kafka, and we designed and implemented a load shedding engine to solve this problem and proposed a solution to the starvation problem in Kafka based on the performance experiment.
实时数据流处理技术(如Apache Storm和Apache Spark)正在积极研究,以处理实时快速生成的大容量数据流。由于很难单独使用大多数实时处理技术,因此通常将其与支持数据流输入和输出的消息传递系统一起使用。Apache Kafka是一个典型的分布式消息传递系统,专门用于交付大量实时日志数据。但是,如果Kafka中数据的生产速度快于消费速度,就可能出现数据饥饿问题。为了解决饥饿问题,需要一种减载技术来限制输入数据并在系统处于负载状态时保持系统性能。因此,本文确认了Kafka中可能出现的饥饿问题,我们设计并实现了一个减载引擎来解决这个问题,并在性能实验的基础上提出了Kafka中饥饿问题的解决方案。
{"title":"Design and implementation of a load shedding engine for solving starvation problems in Apache Kafka","authors":"Jiwon Bang, Siwoon Son, Hajin Kim, Yang-Sae Moon, Mi-Jung Choi","doi":"10.1109/NOMS.2018.8406306","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406306","url":null,"abstract":"Real-time data stream processing technologies such as Apache Storm and Apache Spark are being actively studied to deal with large-capacity data streams that generated rapidly in real time. Because it is difficult to use most real-time processing techniques alone, it is common to use it with a messaging system that supports input and output of data streams. Apache Kafka is a representative distributed messaging system, specialized in delivering large amounts of real-time log data. However, if the production rate of data in Kafka is faster than the consumption rate, data starvation problem may arise. In order to solve the starvation problem, a load shedding technique is needed to limit the incoming data and maintain system performance when the system is under load. Thus, in this paper confirmed the starvation problem that can occur in Kafka, and we designed and implemented a load shedding engine to solve this problem and proposed a solution to the starvation problem in Kafka based on the performance experiment.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"14 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76477537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Hotspot localization and prediction in wireless cellular networks via spatial traffic fitting 基于空间流量拟合的无线蜂窝网络热点定位与预测
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406292
Xiang Zhang, F. Zhou, Jiayi Ning, Peng Yu, Wenjing Li
With the proliferation of bandwidth-demanding mobile applications in the era of 5G, the aggregation of a few users may lead to extremely high load in cellular base stations, producing traffic hotspot in wireless networks. Therefore the higher requirement is imposed on the flexibility of a 5G network, namely the capability of performing rapid capacity enhancement in hotspot area, which makes hotspot localization and critical prediction functions. In this paper, we proposed to localize hotspots with Gaussian Random Field (GRF)-based spatial traffic density model deduced from load data of base stations, together with the prediction with Holt-Winters. We measured the spatial traffic in a specific area within a short time span and forecasted the spatial traffic density distribution. Numeric results show the proposed approach can localize hotspot efficiently, and during traffic peak hours, hotspot prediction is of high success rate.
随着5G时代对带宽要求较高的移动应用的激增,少量用户的聚集可能会导致蜂窝基站的负载极高,在无线网络中产生流量热点。因此对5G网络的灵活性提出了更高的要求,即在热点区域进行快速扩容的能力,从而实现热点定位和关键预测功能。本文提出了基于高斯随机场(Gaussian Random Field, GRF)的空间交通密度模型,并结合Holt-Winters预测方法对热点区域进行定位。对某一特定区域在短时间内的空间交通流量进行测量,并对空间交通密度分布进行预测。数值结果表明,该方法能有效地定位热点,在交通高峰时段,热点预测成功率高。
{"title":"Hotspot localization and prediction in wireless cellular networks via spatial traffic fitting","authors":"Xiang Zhang, F. Zhou, Jiayi Ning, Peng Yu, Wenjing Li","doi":"10.1109/NOMS.2018.8406292","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406292","url":null,"abstract":"With the proliferation of bandwidth-demanding mobile applications in the era of 5G, the aggregation of a few users may lead to extremely high load in cellular base stations, producing traffic hotspot in wireless networks. Therefore the higher requirement is imposed on the flexibility of a 5G network, namely the capability of performing rapid capacity enhancement in hotspot area, which makes hotspot localization and critical prediction functions. In this paper, we proposed to localize hotspots with Gaussian Random Field (GRF)-based spatial traffic density model deduced from load data of base stations, together with the prediction with Holt-Winters. We measured the spatial traffic in a specific area within a short time span and forecasted the spatial traffic density distribution. Numeric results show the proposed approach can localize hotspot efficiently, and during traffic peak hours, hotspot prediction is of high success rate.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87619185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Framework for precise protocol reverse engineering based on network traces 基于网络轨迹的精确协议逆向工程框架
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406307
Young-Hoon Goo, Kyu-Seok Shim, Byeong-Min Chae, Myung-Sup Kim
Emergence of high-speed Internet and ubiquitous environment is generating massive traffic, and it has led to a rapid increase of applications and malicious behaviors with various functions. Many of the complex and diverse protocols that occur under these situations, are unknown or proprietary protocols that are at least documented. For efficient network management and network security, protocol reverse engineering that extract the specification of the protocols is very important. While various protocol reverse engineering methods have been studied, there is no single standardized method to extract protocol specification completely yet, and each of methods has some limitations. In this paper, we propose the framework for precise protocol reverse engineering based on network traces. The proposed framework can extract highly elaborative and intuitive message formats, flow formats, and protocol state machine of the unknown protocol. We demonstrate the validity of our framework through an example of HTTP protocol.
高速互联网的出现和无处不在的环境产生了海量的流量,导致各种功能的应用和恶意行为迅速增加。在这些情况下出现的许多复杂而多样的协议是未知的或专有的协议,至少有文档记录。为了实现高效的网络管理和网络安全,提取协议规范的协议逆向工程是非常重要的。虽然人们研究了各种协议逆向工程方法,但目前还没有一种标准化的方法可以完全提取协议规范,而且每种方法都有一定的局限性。本文提出了一种基于网络轨迹的精确协议逆向工程框架。该框架能够提取出高度精细化和直观的消息格式、流格式和未知协议的协议状态机。我们通过一个HTTP协议的例子来证明我们的框架的有效性。
{"title":"Framework for precise protocol reverse engineering based on network traces","authors":"Young-Hoon Goo, Kyu-Seok Shim, Byeong-Min Chae, Myung-Sup Kim","doi":"10.1109/NOMS.2018.8406307","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406307","url":null,"abstract":"Emergence of high-speed Internet and ubiquitous environment is generating massive traffic, and it has led to a rapid increase of applications and malicious behaviors with various functions. Many of the complex and diverse protocols that occur under these situations, are unknown or proprietary protocols that are at least documented. For efficient network management and network security, protocol reverse engineering that extract the specification of the protocols is very important. While various protocol reverse engineering methods have been studied, there is no single standardized method to extract protocol specification completely yet, and each of methods has some limitations. In this paper, we propose the framework for precise protocol reverse engineering based on network traces. The proposed framework can extract highly elaborative and intuitive message formats, flow formats, and protocol state machine of the unknown protocol. We demonstrate the validity of our framework through an example of HTTP protocol.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"20 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87079735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks SECOD: SDN安全控制和数据平面算法,用于检测和防御DoS攻击
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406196
Song Wang, S. Chandrasekharan, K. Gomez, K. Sithamparanathan, A. Al-Hourani, M. R. Asghar, G. Russello, Paul Zanna
Although the popularity of Software-Defined Networking (SDN) is increasing, it is also vulnerable to security attacks such as Denial of Service (DoS) attacks. Since in SDN, the control plane is isolated from the data plane, DoS attackers can easily target the control plane to impair the network infrastructure in addition to the data plane to degrade the user's Quality of Service (QoS). In our previous work, we introduced SECO, an SDN Secure Controller algorithm to detect and defend SDN against DoS attacks. Simulation results showed that SECO successfully defends SDN networks from DoS attacks. In this paper, we present SDN sEcure COntrol and Data Plane (SECOD), which is an improved version of SECO. Basically, SECOD introduces new triggers to detect and prevent DoS attacks in both control and data planes. Moreover, SECOD is implemented and tested using SDN-based hardware testbed, OpenFlow-based switch, and RYU controller to capture the dynamics of realistic hardware and software. The results show that SECOD successfully detects and effectively mitigates DoS attacks on SDN networks keeping data plane performance at 99.72% compared to a network not under attack.
尽管软件定义网络(SDN)越来越受欢迎,但它也容易受到拒绝服务(DoS)攻击等安全攻击。由于在SDN中,控制平面与数据平面是隔离的,DoS攻击者可以很容易地针对控制平面破坏网络基础设施,从而降低用户的服务质量(QoS)。在我们之前的工作中,我们介绍了SECO,一种SDN安全控制器算法,用于检测和保护SDN免受DoS攻击。仿真结果表明,SECO成功防御了SDN网络的DoS攻击。在本文中,我们提出了SDN安全控制和数据平面(SECOD),它是SECO的改进版本。基本上,SECOD引入了新的触发器来检测和防止控制平面和数据平面的DoS攻击。此外,使用基于sdn的硬件测试平台、基于openflow的交换机和RYU控制器来实现和测试SECOD,以捕获现实硬件和软件的动态。结果表明,SECOD成功检测并有效缓解了SDN网络上的DoS攻击,与未受攻击的网络相比,数据平面性能保持在99.72%。
{"title":"SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks","authors":"Song Wang, S. Chandrasekharan, K. Gomez, K. Sithamparanathan, A. Al-Hourani, M. R. Asghar, G. Russello, Paul Zanna","doi":"10.1109/NOMS.2018.8406196","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406196","url":null,"abstract":"Although the popularity of Software-Defined Networking (SDN) is increasing, it is also vulnerable to security attacks such as Denial of Service (DoS) attacks. Since in SDN, the control plane is isolated from the data plane, DoS attackers can easily target the control plane to impair the network infrastructure in addition to the data plane to degrade the user's Quality of Service (QoS). In our previous work, we introduced SECO, an SDN Secure Controller algorithm to detect and defend SDN against DoS attacks. Simulation results showed that SECO successfully defends SDN networks from DoS attacks. In this paper, we present SDN sEcure COntrol and Data Plane (SECOD), which is an improved version of SECO. Basically, SECOD introduces new triggers to detect and prevent DoS attacks in both control and data planes. Moreover, SECOD is implemented and tested using SDN-based hardware testbed, OpenFlow-based switch, and RYU controller to capture the dynamics of realistic hardware and software. The results show that SECOD successfully detects and effectively mitigates DoS attacks on SDN networks keeping data plane performance at 99.72% compared to a network not under attack.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90081568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Realizing services and slices across multiple operator domains 实现跨多个操作符域的服务和切片
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406168
I. Vaishnavi, János Czentye, M. Gharbaoui, Giovanni Giuliani, Dávid Haja, J. Harmatos, Dávid Jocha, Yoonhee Kim, B. Martini, Javier Melian, P. Monti, Balázs Németh, Wint Yi Poe, Aurora Ramos, A. Sgambelluri, Balázs Sonkoly, László Toka, F. Tusa, C. Bernardos, R. Szabó
Supporting end-to-end network slices and services across operators has become an important use case of study for 5G networks as can be seen by 5G use cases published in 3GPP, ETSI as well as NGMN. This paper presents the in- depth architecture, implementation and experiment on a multi­domain orchestration framework that is ab le to deploy such multi-operator service as well as monitor the service for SLA compliance. Our implemented architecture allows operators to abstract their sensitive details while exposing the relevant amount of information to support inter-operator slice creation. Our experiment shows that the implemented framework is capable of creating services across operators while fulfilling the respective service requirements.
从3GPP、ETSI和NGMN发布的5G用例可以看出,支持跨运营商的端到端网络切片和服务已经成为5G网络研究的重要用例。本文介绍了一个多域业务流程框架的深入架构、实现和实验,该框架能够部署这种多运营商服务,并监控服务是否符合SLA。我们实现的架构允许操作员抽象他们的敏感细节,同时公开相关的信息,以支持操作员之间的切片创建。我们的实验表明,实现的框架能够跨运营商创建服务,同时满足各自的服务需求。
{"title":"Realizing services and slices across multiple operator domains","authors":"I. Vaishnavi, János Czentye, M. Gharbaoui, Giovanni Giuliani, Dávid Haja, J. Harmatos, Dávid Jocha, Yoonhee Kim, B. Martini, Javier Melian, P. Monti, Balázs Németh, Wint Yi Poe, Aurora Ramos, A. Sgambelluri, Balázs Sonkoly, László Toka, F. Tusa, C. Bernardos, R. Szabó","doi":"10.1109/NOMS.2018.8406168","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406168","url":null,"abstract":"Supporting end-to-end network slices and services across operators has become an important use case of study for 5G networks as can be seen by 5G use cases published in 3GPP, ETSI as well as NGMN. This paper presents the in- depth architecture, implementation and experiment on a multi­domain orchestration framework that is ab le to deploy such multi-operator service as well as monitor the service for SLA compliance. Our implemented architecture allows operators to abstract their sensitive details while exposing the relevant amount of information to support inter-operator slice creation. Our experiment shows that the implemented framework is capable of creating services across operators while fulfilling the respective service requirements.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90921126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Streaming scalable video sequences with media-aware network elements implemented in P4 programming language 流式可扩展的视频序列与媒体感知网络元素在P4编程语言实现
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406129
Guan-Ru Wang, Chien-Chang Chen, Chao-Wen Chen, Li-Wen Pan, Yu-Rong Wang, Ching-Ling Fan, Cheng-Hsin Hsu
We present the first Media-Aware Network Element (MANE) for intelligently streaming scalable video sequences in P4 programming language. Our MANE selectively drops queued scalable video packets when the queue occupancy exceeds a threshold. Three packet discarding logics are implemented: (i) tail, (ii) enhancement-layer, and (iii) rate-distortion optimized. Our P4-based MANE implementation is demonstrated in: (i) larger emulated networks in mininet with P4 software switches and (ii) a small real network with a physical P4 switch and multiple Raspberry Pis running P4 software switches.
我们提出了第一个媒体感知网络元素(MANE),用于在P4编程语言中智能地流式传输可扩展的视频序列。当队列占用超过阈值时,我们的MANE有选择地丢弃排队的可扩展视频数据包。实现了三种包丢弃逻辑:(i)尾部,(ii)增强层和(iii)优化的速率失真。我们基于P4的MANE实现在以下方面进行了演示:(i)带有P4软件交换机的mininet中的大型仿真网络;(ii)带有物理P4交换机和多个运行P4软件交换机的Raspberry Pis的小型真实网络。
{"title":"Streaming scalable video sequences with media-aware network elements implemented in P4 programming language","authors":"Guan-Ru Wang, Chien-Chang Chen, Chao-Wen Chen, Li-Wen Pan, Yu-Rong Wang, Ching-Ling Fan, Cheng-Hsin Hsu","doi":"10.1109/NOMS.2018.8406129","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406129","url":null,"abstract":"We present the first Media-Aware Network Element (MANE) for intelligently streaming scalable video sequences in P4 programming language. Our MANE selectively drops queued scalable video packets when the queue occupancy exceeds a threshold. Three packet discarding logics are implemented: (i) tail, (ii) enhancement-layer, and (iii) rate-distortion optimized. Our P4-based MANE implementation is demonstrated in: (i) larger emulated networks in mininet with P4 software switches and (ii) a small real network with a physical P4 switch and multiple Raspberry Pis running P4 software switches.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91097078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Traffic-aware user association in heterogeneous LTE/WiFi radio access networks 异构LTE/WiFi无线接入网络中流量感知用户关联
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406258
D. Harutyunyan, Supreeth Herle, Dimitri Maradin, George Agapiu, R. Riggio
WiFi networks are known to be a cost-efficient traffic offloading solution for mobile networks. The Multi Access Packet Data Network Connectivity is a feature introduced in LTE Release 10 in order to allow users to be simultaneously connected to multiple radio access networks (RAN). Although this feature brings many advantages, such as the possibility to implement QoS-based traffic steering, it poses also many challenges, one of which is distributing traffic among the two radio access technologies. In this paper, we propose a traffic- aware user association algorithm for heterogeneous LTE/WiFi RANs. The proposed algorithm is formulated as an Integer Linear Programming (ILP) problem jointly optimizing user association and resource allocation. A heuristic is also proposed in order to address the scalability issues of the ILP-based algorithm. Numerical simulations are used in order to compare the proposed approaches. Finally, we implemented and tested the heuristic in small-scale testbed using the 5G-EmPOWER platform.
众所周知,WiFi网络是移动网络的一种经济高效的流量分流解决方案。多接入分组数据网络连接是LTE Release 10中引入的一项功能,目的是允许用户同时连接到多个无线接入网络(RAN)。尽管该特性带来了许多优点,例如实现基于qos的流量引导的可能性,但它也带来了许多挑战,其中之一是在两种无线接入技术之间分配流量。在本文中,我们提出了一种流量感知的LTE/WiFi异构局域网用户关联算法。该算法被表述为一个整数线性规划(ILP)问题,共同优化用户关联和资源分配。为了解决基于ilp算法的可扩展性问题,还提出了一种启发式算法。数值模拟是为了比较所提出的方法。最后,我们利用5G-EmPOWER平台在小型测试台上对启发式算法进行了实现和测试。
{"title":"Traffic-aware user association in heterogeneous LTE/WiFi radio access networks","authors":"D. Harutyunyan, Supreeth Herle, Dimitri Maradin, George Agapiu, R. Riggio","doi":"10.1109/NOMS.2018.8406258","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406258","url":null,"abstract":"WiFi networks are known to be a cost-efficient traffic offloading solution for mobile networks. The Multi Access Packet Data Network Connectivity is a feature introduced in LTE Release 10 in order to allow users to be simultaneously connected to multiple radio access networks (RAN). Although this feature brings many advantages, such as the possibility to implement QoS-based traffic steering, it poses also many challenges, one of which is distributing traffic among the two radio access technologies. In this paper, we propose a traffic- aware user association algorithm for heterogeneous LTE/WiFi RANs. The proposed algorithm is formulated as an Integer Linear Programming (ILP) problem jointly optimizing user association and resource allocation. A heuristic is also proposed in order to address the scalability issues of the ILP-based algorithm. Numerical simulations are used in order to compare the proposed approaches. Finally, we implemented and tested the heuristic in small-scale testbed using the 5G-EmPOWER platform.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"35 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88643594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Adaptively scaled back-off (ASB) mechanism for enhanced performance of CSMA/CA in IEEE 802.11ax high efficiency WLAN 在IEEE 802.11ax高效无线局域网中增强CSMA/CA性能的自适应缩放后退(ASB)机制
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406219
N. Shahin, R. Ali, S. Kim, Young-Tak Kim
This paper proposes an adaptively scaled back-off (ASB) mechanism to mitigate the performance degradations in the Binary Exponential Back-off (BEB) of IEEE 802.11 CSMA/CA in the highly dense environment such as IEEE 802.11ax high efficiency WLAN (HEW). The proposed ASB mechanism selects the optimal CW size to achieve maximized network performance adaptively based on the measured conditional collision probability (pc) and the estimated number of contending stations. The ASB protocol can provide higher efficiency than the legacy Binary Exponential Back-off (BEB) that simply adjust the back-off contention window (CW) size by blind exponential increase at repeated collision avoidance and resetting to the minimum value (CWmin) at successful transmission. The performance analysis of the proposed ASB scheme with ns-3 network simulation shows that the proposed ASB scheme can achieve 21.14% higher throughput and take 32.45% less average interval between successful transmissions than the BEB mechanism in highly dense WLANs with saturated traffic environment.1
针对ieee802.11 CSMA/CA在高密度环境(如ieee802.11 ax高效WLAN (HEW))下二进制指数回退(BEB)的性能下降问题,提出了一种自适应缩放回退(ASB)机制。提出的ASB机制基于实测的条件碰撞概率(pc)和估计的竞争站数,自适应地选择最优的CW大小,以实现最大的网络性能。与传统的二进制指数回退(BEB)协议相比,ASB协议可以提供更高的效率。传统的二进制指数回退(BEB)协议在重复避免碰撞时通过盲目指数增加来调整回退争夺窗口(CW)的大小,在成功传输时重置为最小值(CWmin)。通过ns-3网络仿真对所提出的ASB方案进行性能分析,结果表明,在饱和流量环境下的高密度无线局域网中,所提出的ASB方案比BEB机制的吞吐量提高21.14%,平均成功传输间隔缩短32.45%
{"title":"Adaptively scaled back-off (ASB) mechanism for enhanced performance of CSMA/CA in IEEE 802.11ax high efficiency WLAN","authors":"N. Shahin, R. Ali, S. Kim, Young-Tak Kim","doi":"10.1109/NOMS.2018.8406219","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406219","url":null,"abstract":"This paper proposes an adaptively scaled back-off (ASB) mechanism to mitigate the performance degradations in the Binary Exponential Back-off (BEB) of IEEE 802.11 CSMA/CA in the highly dense environment such as IEEE 802.11ax high efficiency WLAN (HEW). The proposed ASB mechanism selects the optimal CW size to achieve maximized network performance adaptively based on the measured conditional collision probability (pc) and the estimated number of contending stations. The ASB protocol can provide higher efficiency than the legacy Binary Exponential Back-off (BEB) that simply adjust the back-off contention window (CW) size by blind exponential increase at repeated collision avoidance and resetting to the minimum value (CWmin) at successful transmission. The performance analysis of the proposed ASB scheme with ns-3 network simulation shows that the proposed ASB scheme can achieve 21.14% higher throughput and take 32.45% less average interval between successful transmissions than the BEB mechanism in highly dense WLANs with saturated traffic environment.1","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"24 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85977453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1