首页 > 最新文献

2017 13th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
Traffic optimization in anonymous networks 匿名网络流量优化
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255976
Patrik Kristel, Jan Lucansky, I. Kotuliak
Anonymous communication networks, such as Tor, are facing big challenge how to deliver content to users in low latency and with no interruption. The latency issues were caused by increased amount of transferred data and low-bandwidth nodes in Tor network. Those are limiting overall circuit capacity providing to users. Conflux, the Tor plugin, is improving effort and decreasing latency time by creating multipath within Tor circuits. Conflux is doing dynamic traffic-splitting and load-balancing through multipath to improve throughput and avoid bottlenecks in Tor circuits. Our solution is focusing to analyze and modification network flows and sessions in Tor network. As an output of problem's analysis we're proposing possibilities to improve Conflux's performance by its modification and deploy to the Tor network. The paper describes solution implementation, setup and configuration Tor client and Tor exit node. We're explaining necessary modifications that need to be provided on Tor components. Our solution achieved average improvement versus Conflux more than 20% decrease of download time in various file size.
匿名通信网络,如Tor,正面临着如何在低延迟和无中断的情况下向用户传递内容的巨大挑战。延迟问题是由于传输数据量增加和Tor网络中的低带宽节点造成的。这些限制了提供给用户的整体电路容量。Conflux, Tor插件,通过在Tor电路中创建多路径来提高工作效率并减少延迟时间。Conflux通过多路径进行动态流量分流和负载均衡,以提高Tor电路的吞吐量,避免瓶颈。我们的解决方案是对Tor网络中的网络流和会话进行分析和修改。作为问题分析的输出,我们提出了通过修改和部署到Tor网络来提高Conflux性能的可能性。本文描述了解决方案的实现、Tor客户端和Tor出口节点的设置和配置。我们正在解释需要在Tor组件上提供的必要修改。与Conflux相比,我们的解决方案实现了平均改进,不同文件大小的下载时间减少了20%以上。
{"title":"Traffic optimization in anonymous networks","authors":"Patrik Kristel, Jan Lucansky, I. Kotuliak","doi":"10.23919/CNSM.2017.8255976","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255976","url":null,"abstract":"Anonymous communication networks, such as Tor, are facing big challenge how to deliver content to users in low latency and with no interruption. The latency issues were caused by increased amount of transferred data and low-bandwidth nodes in Tor network. Those are limiting overall circuit capacity providing to users. Conflux, the Tor plugin, is improving effort and decreasing latency time by creating multipath within Tor circuits. Conflux is doing dynamic traffic-splitting and load-balancing through multipath to improve throughput and avoid bottlenecks in Tor circuits. Our solution is focusing to analyze and modification network flows and sessions in Tor network. As an output of problem's analysis we're proposing possibilities to improve Conflux's performance by its modification and deploy to the Tor network. The paper describes solution implementation, setup and configuration Tor client and Tor exit node. We're explaining necessary modifications that need to be provided on Tor components. Our solution achieved average improvement versus Conflux more than 20% decrease of download time in various file size.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User association for load balancing in cellular network with hybrid cognitive radio relays 混合认知无线电中继蜂窝网络中负载平衡的用户关联
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256007
Hongfu Guo, F. Zhou, Lei Feng, Peng Yu, Wenjing Li
Hybrid cognitive radio (CR) relays serve cellular users in a two-hop fashion, which jointly utilize both licensed and unlicensed radio spectrums to significantly increase the system capacity. User equipments (UEs) need to be actively associated with the macro-cell BS or CR relays having a more lightly loaded spectrum if the quality of services (QoS) can be guaranteed. To this end, this paper investigates optimal user association for load balancing problem in cellular network with hybrid cognitive radio relays. Firstly, we propose a multi-objective user association optimization model to balance the loads among different tiers while reducing the total resource occupancy. Then, this multiobjective problem is converted into a single one by the linear weighing-sum method and a genetic algorithm is introduced to solve it. The numerical simulation results show that our proposed scheme can obtain more balanced resources occupation, better throughput performance, and lower blocking rate compared with the heuristic and max-power strategies.
混合认知无线电(CR)中继以两跳方式为蜂窝用户服务,共同利用许可和非许可的无线电频谱来显着增加系统容量。如果能够保证服务质量(QoS),用户设备(ue)需要主动地与具有更轻负载频谱的宏小区BS或CR中继相关联。为此,本文研究了基于混合认知无线电中继的蜂窝网络负载平衡问题的最优用户关联。首先,我们提出了一种多目标用户关联优化模型,以平衡不同层之间的负载,同时降低总资源占用。然后,采用线性加权和方法将多目标问题转化为单目标问题,并引入遗传算法进行求解。数值仿真结果表明,与启发式策略和最大功率策略相比,所提出的方案能够获得更均衡的资源占用、更好的吞吐量性能和更低的阻塞率。
{"title":"User association for load balancing in cellular network with hybrid cognitive radio relays","authors":"Hongfu Guo, F. Zhou, Lei Feng, Peng Yu, Wenjing Li","doi":"10.23919/CNSM.2017.8256007","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256007","url":null,"abstract":"Hybrid cognitive radio (CR) relays serve cellular users in a two-hop fashion, which jointly utilize both licensed and unlicensed radio spectrums to significantly increase the system capacity. User equipments (UEs) need to be actively associated with the macro-cell BS or CR relays having a more lightly loaded spectrum if the quality of services (QoS) can be guaranteed. To this end, this paper investigates optimal user association for load balancing problem in cellular network with hybrid cognitive radio relays. Firstly, we propose a multi-objective user association optimization model to balance the loads among different tiers while reducing the total resource occupancy. Then, this multiobjective problem is converted into a single one by the linear weighing-sum method and a genetic algorithm is introduced to solve it. The numerical simulation results show that our proposed scheme can obtain more balanced resources occupation, better throughput performance, and lower blocking rate compared with the heuristic and max-power strategies.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130438026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
GML learning, a generic machine learning model for network measurements analysis GML学习,用于网络测量分析的通用机器学习模型
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255998
P. Casas, J. Vanerio, K. Fukuda
The application of machine learning models to the analysis of network measurement problems has largely increased in the last decade; however, there is still no clear best-practice or silver bullet approach to address these problems in a general context, and only adhoc and tailored approaches have been evaluated so far. While deep-learning models have provided a major breakthrough in highly-dimensional problems such as image processing, it is difficult to say today which is the best model to address the analysis of large volumes of highly-dimensional data collected in operational networks. In this paper we present a potential solution to fill this gap, exploring the application of ensemble learning models to multiple network measurement problems. We introduce GML Learning, a generic Machine Learning model for the analysis of network measurements. The GML model is a generalization of the well-known stacking approach to ensemble learning, and follows the concepts of the Super Learner model. The Super Learner performs asymptotically as well as the best input base or weak learners, providing a very powerful approach to tackle multiple problems with the same technique. In addition, it defines an approach to minimize over-fitting likelihood during training, using a variant of cross-validation. We deploy the GML model on top of Big-DAMA, a big data analytics framework for network measurement applications. We test the proposed solution in five different and assorted network measurement problems, including detection of network attacks and anomalies, QoE modeling and prediction, and Internet-paths dynamics tracking. Results confirm that the GML model provides better results than any of the single baseline models of the stack, and outperforms traditional bagging and boosting ensemble learning approaches. The GML Learning model opens the door for a generalization of a best-practice technique for the analysis of network measurements.
在过去十年中,机器学习模型在网络测量问题分析中的应用大大增加;然而,在一般情况下,仍然没有明确的最佳实践或银弹方法来解决这些问题,到目前为止,只评估了专门的和量身定制的方法。虽然深度学习模型在图像处理等高维问题上取得了重大突破,但今天很难说哪一个模型是处理在操作网络中收集的大量高维数据分析的最佳模型。在本文中,我们提出了一个潜在的解决方案来填补这一空白,探索集成学习模型在多个网络测量问题中的应用。我们介绍了GML学习,一种用于网络测量分析的通用机器学习模型。GML模型是众所周知的集成学习的叠加方法的推广,并遵循超级学习者模型的概念。超级学习器的表现与最佳输入基础或弱学习器一样好,提供了一种非常强大的方法,可以用相同的技术解决多个问题。此外,它还定义了一种在训练过程中使用交叉验证的变体来最小化过拟合可能性的方法。我们将GML模型部署在big - dama之上,big - dama是一个用于网络测量应用的大数据分析框架。我们在五个不同的网络测量问题中测试了所提出的解决方案,包括网络攻击和异常检测,QoE建模和预测,以及互联网路径动态跟踪。结果证实,GML模型提供了比任何堆栈的单一基线模型更好的结果,并且优于传统的bagging和boosting集成学习方法。GML学习模型为网络测量分析的最佳实践技术的泛化打开了大门。
{"title":"GML learning, a generic machine learning model for network measurements analysis","authors":"P. Casas, J. Vanerio, K. Fukuda","doi":"10.23919/CNSM.2017.8255998","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255998","url":null,"abstract":"The application of machine learning models to the analysis of network measurement problems has largely increased in the last decade; however, there is still no clear best-practice or silver bullet approach to address these problems in a general context, and only adhoc and tailored approaches have been evaluated so far. While deep-learning models have provided a major breakthrough in highly-dimensional problems such as image processing, it is difficult to say today which is the best model to address the analysis of large volumes of highly-dimensional data collected in operational networks. In this paper we present a potential solution to fill this gap, exploring the application of ensemble learning models to multiple network measurement problems. We introduce GML Learning, a generic Machine Learning model for the analysis of network measurements. The GML model is a generalization of the well-known stacking approach to ensemble learning, and follows the concepts of the Super Learner model. The Super Learner performs asymptotically as well as the best input base or weak learners, providing a very powerful approach to tackle multiple problems with the same technique. In addition, it defines an approach to minimize over-fitting likelihood during training, using a variant of cross-validation. We deploy the GML model on top of Big-DAMA, a big data analytics framework for network measurement applications. We test the proposed solution in five different and assorted network measurement problems, including detection of network attacks and anomalies, QoE modeling and prediction, and Internet-paths dynamics tracking. Results confirm that the GML model provides better results than any of the single baseline models of the stack, and outperforms traditional bagging and boosting ensemble learning approaches. The GML Learning model opens the door for a generalization of a best-practice technique for the analysis of network measurements.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134371055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Risk prediction of the SCADA communication network based on entropy-gray model 基于熵灰色模型的SCADA通信网络风险预测
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256004
Meng Li, Wenjing Li, Peng Yu, F. Zhou
The power SCADA system is designed to ensure the safe operation of the power system. The SCADA communication network as an information exchange carrier between remote terminal units and master stations, is the key part of the SCADA system, and it has a high requirement for security. However, due to the wide distribution of the network and the interconnected network structure, it is susceptible to risks. So there is an urgent need for accurate and real-time risk prediction. In this paper, we propose a risk prediction model based on entropy-gray model, where the gray model is used to predict the values of the network risk indexes, and the entropy method is to determine the weight of those risk indexes. Finally, the overall risk value of the network is decided with analytic hierarchy process. Simulation results show that the proposed entropy-gray method can achieve accurate and timely risk prediction.
电力SCADA系统是为了保证电力系统的安全运行而设计的。SCADA通信网络作为远程终端单元与主站之间信息交换的载体,是SCADA系统的关键部分,对安全性要求很高。然而,由于网络分布广泛,网络结构相互连接,容易受到风险的影响。因此,迫切需要准确、实时的风险预测。本文提出了一种基于熵-灰色模型的风险预测模型,其中灰色模型用于预测网络风险指标的取值,熵值法用于确定风险指标的权重。最后,运用层次分析法确定了网络的总体风险值。仿真结果表明,所提出的熵灰色方法能够实现准确、及时的风险预测。
{"title":"Risk prediction of the SCADA communication network based on entropy-gray model","authors":"Meng Li, Wenjing Li, Peng Yu, F. Zhou","doi":"10.23919/CNSM.2017.8256004","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256004","url":null,"abstract":"The power SCADA system is designed to ensure the safe operation of the power system. The SCADA communication network as an information exchange carrier between remote terminal units and master stations, is the key part of the SCADA system, and it has a high requirement for security. However, due to the wide distribution of the network and the interconnected network structure, it is susceptible to risks. So there is an urgent need for accurate and real-time risk prediction. In this paper, we propose a risk prediction model based on entropy-gray model, where the gray model is used to predict the values of the network risk indexes, and the entropy method is to determine the weight of those risk indexes. Finally, the overall risk value of the network is decided with analytic hierarchy process. Simulation results show that the proposed entropy-gray method can achieve accurate and timely risk prediction.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123728595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High-end LTE service evolution in Korea: 4 years of nationwide mobile network measurements 韩国高端LTE服务演进:4年全国移动网络测量
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256025
J. Hyun, Y. Won, Kenjiro Cho, Romain Fontugne, J. Chung, J. W. Hong
This paper provides a temporal cellular and WiFi networks analysis from a nationwide crowdsourcing measurement study. Our dataset consists of 2.98M user-initiated quality tests on 3G/LTE/WiFi involving 157K mobile devices from Nov. 2012 to July 2016 (187 weeks) in South Korea. Our analysis explains changes in QoS from the user perspective, not Mobile Network Operators (MNO). We revealed that WiFi shows twice higher compounded quarterly growth rate for download throughput against LTE. Yet, LTE and WiFi show almost no difference in absolute download throughput value as of mid 2016. Second, LTE delivers relatively low latency, less-varying loss rate, and higher throughput in overall. Finally, the result shows that the evolution for the high-end LTE services has been faster than user adoption, where the majority of the LTE users stays below 75 Mbps of throughput.
本文提供了一项全国性众包测量研究的时间蜂窝和WiFi网络分析。我们的数据集包括298万用户发起的3G/LTE/WiFi质量测试,涉及157K移动设备,从2012年11月到2016年7月(187周)在韩国。我们的分析从用户的角度解释了QoS的变化,而不是移动网络运营商(MNO)。我们发现WiFi的下载吞吐量复合季度增长率是LTE的两倍。然而,截至2016年年中,LTE和WiFi的绝对下载吞吐量几乎没有区别。其次,LTE总体上提供了相对较低的延迟、较少变化的损失率和更高的吞吐量。最后,研究结果表明,高端LTE服务的发展速度快于用户的采用速度,其中大多数LTE用户的吞吐量低于75 Mbps。
{"title":"High-end LTE service evolution in Korea: 4 years of nationwide mobile network measurements","authors":"J. Hyun, Y. Won, Kenjiro Cho, Romain Fontugne, J. Chung, J. W. Hong","doi":"10.23919/CNSM.2017.8256025","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256025","url":null,"abstract":"This paper provides a temporal cellular and WiFi networks analysis from a nationwide crowdsourcing measurement study. Our dataset consists of 2.98M user-initiated quality tests on 3G/LTE/WiFi involving 157K mobile devices from Nov. 2012 to July 2016 (187 weeks) in South Korea. Our analysis explains changes in QoS from the user perspective, not Mobile Network Operators (MNO). We revealed that WiFi shows twice higher compounded quarterly growth rate for download throughput against LTE. Yet, LTE and WiFi show almost no difference in absolute download throughput value as of mid 2016. Second, LTE delivers relatively low latency, less-varying loss rate, and higher throughput in overall. Finally, the result shows that the evolution for the high-end LTE services has been faster than user adoption, where the majority of the LTE users stays below 75 Mbps of throughput.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124654944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scheduling service function chains for ultra-low latency network services 调度业务功能链,实现超低时延网络业务
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256017
H. Alameddine, Long Qu, C. Assi
The fifth generation (5G) of cellular networks is emerging as the key enabler of killer real-time applications, such as tactile Internet, augmented and virtual reality, tele-driving, autonomous driving, etc., providing them with the much needed ultra-reliable and ultra-low latency services. Such applications are expected to take full advantages of recent developments in the areas of cloud and edge computing, and exploit emerging industrial initiatives such as Software Defined Networks (SDN) and Network Function Virtualization (NFV). Often, these 5G applications require network functions (e.g., IDSs, load balancers, etc.) to cater for their end-to-end services. This paper focuses on chaining network functions and services for these applications, and in particular considers those delay sensitive ones. Here, we account for services with deadlines and formulate the joint problem of network function mapping, routing and scheduling mathematically and highlight its complexity. Then, we present an efficient method for solving these sub-problems sequentially and validate its performance numerically. We also propose and characterize the performance of a Tabu search-based approach that we design to solve the problem. Our numerical evaluation reveals the efficiency of our sequential method and the scalability of our Tabu-based algorithm.
第五代(5G)蜂窝网络正在成为杀手级实时应用的关键推动者,如触觉互联网、增强和虚拟现实、远程驾驶、自动驾驶等,为他们提供急需的超可靠和超低延迟服务。这些应用预计将充分利用云和边缘计算领域的最新发展,并利用软件定义网络(SDN)和网络功能虚拟化(NFV)等新兴工业计划。通常,这些5G应用程序需要网络功能(例如,ids,负载平衡器等)来满足其端到端服务。本文重点研究了这些应用的网络功能和业务链,并特别考虑了那些延迟敏感的应用。在这里,我们考虑了具有最后期限的服务,用数学的方法表述了网络功能映射、路由和调度的联合问题,并突出了其复杂性。在此基础上,提出了一种求解这些子问题的有效方法,并对其性能进行了数值验证。我们还提出并描述了基于禁忌搜索的方法的性能,我们设计了该方法来解决这个问题。数值计算结果表明了序列方法的有效性和禁忌算法的可扩展性。
{"title":"Scheduling service function chains for ultra-low latency network services","authors":"H. Alameddine, Long Qu, C. Assi","doi":"10.23919/CNSM.2017.8256017","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256017","url":null,"abstract":"The fifth generation (5G) of cellular networks is emerging as the key enabler of killer real-time applications, such as tactile Internet, augmented and virtual reality, tele-driving, autonomous driving, etc., providing them with the much needed ultra-reliable and ultra-low latency services. Such applications are expected to take full advantages of recent developments in the areas of cloud and edge computing, and exploit emerging industrial initiatives such as Software Defined Networks (SDN) and Network Function Virtualization (NFV). Often, these 5G applications require network functions (e.g., IDSs, load balancers, etc.) to cater for their end-to-end services. This paper focuses on chaining network functions and services for these applications, and in particular considers those delay sensitive ones. Here, we account for services with deadlines and formulate the joint problem of network function mapping, routing and scheduling mathematically and highlight its complexity. Then, we present an efficient method for solving these sub-problems sequentially and validate its performance numerically. We also propose and characterize the performance of a Tabu search-based approach that we design to solve the problem. Our numerical evaluation reveals the efficiency of our sequential method and the scalability of our Tabu-based algorithm.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115679503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An empirical study of software reliability in SDN controllers SDN控制器软件可靠性的实证研究
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256002
P. Vizarreta, Kishor S. Trivedi, B. Helvik, P. Heegaard, W. Kellerer, C. M. Machuca
Software Defined Networking (SDN) exposes critical networking decisions, such as traffic routing or enforcement of the critical security policies, to a software entity known as the SDN controller. Controller software, as written by humans, is intrinsically prone to bugs, which may impair the network performance as a whole, if activated. Software reliability growth models (SRGM) are often used to estimate and predict the reliability of the software in the operational phase based on the fault report data during the testing phase. These models can be used to predict the number of residual bugs in the software, as well as failure intensity, software reliability and optimal software release time. In this paper we analyze ten releases of ONOS open source controller, whose uncensored fault reports are available online.
软件定义网络(SDN)向称为SDN控制器的软件实体公开关键的网络决策,例如流量路由或关键安全策略的实施。由人类编写的控制器软件本质上容易出现错误,如果激活,可能会损害整个网络的性能。软件可靠性增长模型(SRGM)常用于基于测试阶段的故障报告数据来估计和预测软件在运行阶段的可靠性。这些模型可以用来预测软件中残留bug的数量,以及故障强度、软件可靠性和最优软件发布时间。本文分析了10个版本的ONOS开源控制器,它们的故障报告都是在线提供的。
{"title":"An empirical study of software reliability in SDN controllers","authors":"P. Vizarreta, Kishor S. Trivedi, B. Helvik, P. Heegaard, W. Kellerer, C. M. Machuca","doi":"10.23919/CNSM.2017.8256002","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256002","url":null,"abstract":"Software Defined Networking (SDN) exposes critical networking decisions, such as traffic routing or enforcement of the critical security policies, to a software entity known as the SDN controller. Controller software, as written by humans, is intrinsically prone to bugs, which may impair the network performance as a whole, if activated. Software reliability growth models (SRGM) are often used to estimate and predict the reliability of the software in the operational phase based on the fault report data during the testing phase. These models can be used to predict the number of residual bugs in the software, as well as failure intensity, software reliability and optimal software release time. In this paper we analyze ten releases of ONOS open source controller, whose uncensored fault reports are available online.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Pre-provisioning of local protection for handling dual-failures in OpenFlow-based networks 在基于openflow的网络中,预置本地保护,处理双故障
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256050
P. Thorat, Seil Jeon, S. M. Raza, Hyunseung Choo
An essential requirement in operating a carriergrade network (CGN) is ensuring the high availability and reliability. Software-defined networking (SDN) is expected to address such requirement while improving the network management. One challenging issue faced in the process of enhancing the reliability of SDN-enabled CGN is how to achieve rapid recovery with minimal effort. There are two well-known approaches to determine the failover scope: end-to-end (global) detouring and local detouring. Particularly, the local detouring approach provides an efficient means to achieve faster recovery, as it locally detours the disrupted flows around the failed network components using a preconfigured alternative path. However, it requires thousands of flow entries per switch to be configured. To address the technical challenges, we propose a fault-tolerant forwarding table design (FFTD), which groups the flows using group entries and aggregates the flows using a tagging mechanism for scalable and rapid recovery from the dual-failures of switches or links without overburdening the controller and the flow table's memory. Our extensive emulation results reveal that the proposed FFTD satisfies the CGN's 50 ms recovery requirement. Additionally, it reduces the alternate path flow storage requirement by up to 99%.
保证高可用性和高可靠性是运营运营商级网络(CGN)的基本要求。软件定义网络(SDN)有望在改善网络管理的同时解决这一需求。在提高sdn支持的中广核可靠性的过程中,面临的一个具有挑战性的问题是如何以最小的努力实现快速恢复。确定故障转移范围有两种众所周知的方法:端到端(全局)绕行和局部绕行。特别是,局部绕行方法提供了一种实现更快恢复的有效手段,因为它使用预先配置的替代路径在故障网络组件周围局部绕行中断流。但是,它需要配置每个交换机数千个流条目。为了解决技术挑战,我们提出了一种容错转发表设计(FFTD),它使用组条目对流进行分组,并使用标记机制对流进行聚合,以便从交换机或链路的双重故障中进行可扩展和快速恢复,而不会使控制器和流表的内存负担过重。广泛的仿真结果表明,所提出的FFTD满足CGN 50 ms的恢复要求。此外,它减少了替代路径流存储要求高达99%。
{"title":"Pre-provisioning of local protection for handling dual-failures in OpenFlow-based networks","authors":"P. Thorat, Seil Jeon, S. M. Raza, Hyunseung Choo","doi":"10.23919/CNSM.2017.8256050","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256050","url":null,"abstract":"An essential requirement in operating a carriergrade network (CGN) is ensuring the high availability and reliability. Software-defined networking (SDN) is expected to address such requirement while improving the network management. One challenging issue faced in the process of enhancing the reliability of SDN-enabled CGN is how to achieve rapid recovery with minimal effort. There are two well-known approaches to determine the failover scope: end-to-end (global) detouring and local detouring. Particularly, the local detouring approach provides an efficient means to achieve faster recovery, as it locally detours the disrupted flows around the failed network components using a preconfigured alternative path. However, it requires thousands of flow entries per switch to be configured. To address the technical challenges, we propose a fault-tolerant forwarding table design (FFTD), which groups the flows using group entries and aggregates the flows using a tagging mechanism for scalable and rapid recovery from the dual-failures of switches or links without overburdening the controller and the flow table's memory. Our extensive emulation results reveal that the proposed FFTD satisfies the CGN's 50 ms recovery requirement. Additionally, it reduces the alternate path flow storage requirement by up to 99%.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114744672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automated synthesis of NFV topology: A security requirement-oriented design NFV拓扑的自动合成:面向安全需求的设计
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256033
A. Jakaria, M. Rahman, Carol J. Fung
Cyber defense today heavily depends on expensive and proprietary hardware deployed at fixed locations. Network functions virtualization (NFV) reduces the limitations of these vendor specific hardware by allowing a flexible and dynamic implementation of virtual network functions in virtual machines running on commercial off-the-shelf servers. These network functions can work as a filter to distinguish between a legitimate packet and an attack packet, and can be deployed dynamically to balance the variable attack load. However, allocating resources to these virtual machines is an NP-hard problem. In this work, we propose a solution to this problem and determine the number and placement of the VMs. We design and implement NFVSynth, an automated framework that models the resource specifications, incoming packet processing requirements, and network bandwidth constraints. It uses satisfiability modulo theories (SMT) for modeling this synthesis problem and provides a satisfiable solution. We also present simulated experiments to demonstrate the scalability and usability of the solution.
如今的网络防御严重依赖于部署在固定地点的昂贵专有硬件。网络功能虚拟化(NFV)允许在商用现成服务器上运行的虚拟机中灵活、动态地实现虚拟网络功能,从而减少了这些供应商特定硬件的限制。这些网络功能可以作为一个过滤器,区分合法报文和攻击报文,并可以动态部署,以平衡不同的攻击负载。然而,为这些虚拟机分配资源是一个np难题。在这项工作中,我们提出了一个解决这个问题的方案,并确定了虚拟机的数量和位置。我们设计并实现NFVSynth,这是一个自动化框架,可以对资源规范、传入数据包处理需求和网络带宽限制进行建模。利用可满足模理论(SMT)对该综合问题进行建模,并给出了一个可满足的解。我们还提供了模拟实验来证明该解决方案的可扩展性和可用性。
{"title":"Automated synthesis of NFV topology: A security requirement-oriented design","authors":"A. Jakaria, M. Rahman, Carol J. Fung","doi":"10.23919/CNSM.2017.8256033","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256033","url":null,"abstract":"Cyber defense today heavily depends on expensive and proprietary hardware deployed at fixed locations. Network functions virtualization (NFV) reduces the limitations of these vendor specific hardware by allowing a flexible and dynamic implementation of virtual network functions in virtual machines running on commercial off-the-shelf servers. These network functions can work as a filter to distinguish between a legitimate packet and an attack packet, and can be deployed dynamically to balance the variable attack load. However, allocating resources to these virtual machines is an NP-hard problem. In this work, we propose a solution to this problem and determine the number and placement of the VMs. We design and implement NFVSynth, an automated framework that models the resource specifications, incoming packet processing requirements, and network bandwidth constraints. It uses satisfiability modulo theories (SMT) for modeling this synthesis problem and provides a satisfiable solution. We also present simulated experiments to demonstrate the scalability and usability of the solution.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129643437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A prediction-based dynamic resource management approach for network virtualization 一种基于预测的网络虚拟化动态资源管理方法
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255980
Jiacong Li, Ying Wang, Zhanwei Wu, Sixiang Feng, Xue-song Qiu
In network virtualization environment, multiple virtual networks share the same resource of a physical network. Since the physical resources of a substrate network is limited, it is necessary to improve the utilization of physical resources. Considering the resource requirement of a virtual network may change over its lifetime, we propose a prediction-based resource management mechanism. To increase the utilization of the substrate network, we can adjust the resource allocated to the virtual network based on the result of prediction. Additionally, in order to avoid the result of prediction deviates from the real requirement, we compare our prediction result with the collection of the resource utilization at real time to ensure the correctness of our result. The simulation results show that our approach can increase the utilization of the physical resource and improve the virtual network acceptance ratio while ensuring the requirement of the virtual networks.
在网络虚拟化环境中,多个虚拟网络共享同一个物理网络的资源。由于基板网络的物理资源是有限的,因此有必要提高物理资源的利用率。考虑到虚拟网络的资源需求在其生命周期中可能发生变化,提出了一种基于预测的资源管理机制。为了提高底层网络的利用率,我们可以根据预测结果调整分配给虚拟网络的资源。另外,为了避免预测结果与实际需求的偏差,我们将预测结果与资源利用率的实时采集进行比较,以保证预测结果的正确性。仿真结果表明,该方法在保证虚拟网络要求的前提下,提高了物理资源的利用率,提高了虚拟网络的接受率。
{"title":"A prediction-based dynamic resource management approach for network virtualization","authors":"Jiacong Li, Ying Wang, Zhanwei Wu, Sixiang Feng, Xue-song Qiu","doi":"10.23919/CNSM.2017.8255980","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255980","url":null,"abstract":"In network virtualization environment, multiple virtual networks share the same resource of a physical network. Since the physical resources of a substrate network is limited, it is necessary to improve the utilization of physical resources. Considering the resource requirement of a virtual network may change over its lifetime, we propose a prediction-based resource management mechanism. To increase the utilization of the substrate network, we can adjust the resource allocated to the virtual network based on the result of prediction. Additionally, in order to avoid the result of prediction deviates from the real requirement, we compare our prediction result with the collection of the resource utilization at real time to ensure the correctness of our result. The simulation results show that our approach can increase the utilization of the physical resource and improve the virtual network acceptance ratio while ensuring the requirement of the virtual networks.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134194892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 13th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1