首页 > 最新文献

2009 7th International Workshop on Design of Reliable Communication Networks最新文献

英文 中文
Whole fiber switched p-cycles 整个光纤切换p周期
Pub Date : 2009-11-20 DOI: 10.1109/DRCN.2009.5340026
Diane Prisca Onguetou, W. Grover
In the design of survivable optical networks, the cost and complexity of wavelength assignment and conversion and wavelength-selective switching is always a dominant consideration. And yet, while nodes and single DWDM channels may fail, a pre-dominant source of unavailability is physical damage to optical cables. Thus, we have considered: If it is ultimately glass that fails, what if we just replace the glass directly? More specifically, what if p-cycles were used to rapidly, simply and efficiently provide for the direct replacement of failed fiber sections with whole replacement fibers? As long as the loss budgets are adequate, entire DWDM wavebands could be restored with no switching or manipulation of individual lightpaths. Following a substitution transient, the DWDM layer would never know the break happened. In environments where fiber switching devices are low cost, and ducts are full of dark fiber, this could provide a very low cost alternative to protect an entire DWDM transport layer (or working capacity envelope) against the single largest cause of outage. Here, we make a first proposal of considering this approach. A main motivation is to remove the complexity due to wavelength assignment and wavelength continuity constraints when configuring p-cycles in a fully transparent network context. Another objective is the overall real CAPEX and OPEX cost reductions.
在生存型光网络的设计中,波长分配与转换以及波长选择交换的成本和复杂性一直是主要考虑的问题。然而,虽然节点和单一DWDM通道可能会出现故障,但不可用的主要原因是光缆的物理损坏。因此,我们考虑过:如果最终是玻璃坏了,如果我们直接更换玻璃呢?更具体地说,如果使用p-cycles快速、简单和有效地直接用整个替换纤维替换失效的纤维段,会怎么样?只要损耗预算足够,整个DWDM波段可以在不切换或操纵单个光路的情况下恢复。在替换瞬态之后,DWDM层永远不会知道中断发生了。在光纤交换设备成本低,管道充满暗光纤的环境中,这可以提供一种非常低成本的替代方案,以保护整个DWDM传输层(或工作容量信封)免受单个最大中断原因的影响。在此,我们首次提出考虑这种方法的建议。一个主要动机是在完全透明的网络环境中配置p环时,消除由于波长分配和波长连续性限制而导致的复杂性。另一个目标是降低整体实际资本支出和运营成本。
{"title":"Whole fiber switched p-cycles","authors":"Diane Prisca Onguetou, W. Grover","doi":"10.1109/DRCN.2009.5340026","DOIUrl":"https://doi.org/10.1109/DRCN.2009.5340026","url":null,"abstract":"In the design of survivable optical networks, the cost and complexity of wavelength assignment and conversion and wavelength-selective switching is always a dominant consideration. And yet, while nodes and single DWDM channels may fail, a pre-dominant source of unavailability is physical damage to optical cables. Thus, we have considered: If it is ultimately glass that fails, what if we just replace the glass directly? More specifically, what if p-cycles were used to rapidly, simply and efficiently provide for the direct replacement of failed fiber sections with whole replacement fibers? As long as the loss budgets are adequate, entire DWDM wavebands could be restored with no switching or manipulation of individual lightpaths. Following a substitution transient, the DWDM layer would never know the break happened. In environments where fiber switching devices are low cost, and ducts are full of dark fiber, this could provide a very low cost alternative to protect an entire DWDM transport layer (or working capacity envelope) against the single largest cause of outage. Here, we make a first proposal of considering this approach. A main motivation is to remove the complexity due to wavelength assignment and wavelength continuity constraints when configuring p-cycles in a fully transparent network context. Another objective is the overall real CAPEX and OPEX cost reductions.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"16 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121001049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of a cognitive radio network with tolerable service degradation 可容忍服务退化的认知无线网络性能
Pub Date : 2009-11-20 DOI: 10.1109/DRCN.2009.5340006
Shensheng Tang, B. L. Mark
We analyze the performance of a cognitive radio wireless network, where secondary users opportunistically share the radio spectrum with primary users through spectrum sensing and may cause service degradation to the primary users due to unreliable spectrum sensing. When a secondary user occupying a channel detects the presence of a primary call arriving to the channel, it switches from its current channel to another channel, if one is available, to continue its service; however, if the secondary user fails to detect the presence of the primary call, it remains on the channel and both calls will receive degraded service. Based on a queueing network model, we derive closed-form solutions for the equilibrium system state in terms of generating functions, and derive several performance metrics of interest. In particular, we introduce the system supportability metric to evaluate the extent to which the system can support secondary users and the interference factor to evaluate the degree of service degradation imposed on primary users by the secondary users. Numerical results are presented to show the impact of system parameters on the derived performance metrics.
我们分析了认知无线网络的性能,其中次要用户通过频谱感知机会性地与主要用户共享无线电频谱,并且可能由于不可靠的频谱感知而导致主要用户的服务降级。当占用信道的辅助用户检测到到达该信道的主呼叫存在时,它从当前信道切换到另一个信道(如果有可用的)以继续其服务;但是,如果辅助用户未能检测到主呼叫的存在,则它将留在通道上,并且两个呼叫都将接收降级的服务。基于一个排队网络模型,我们从生成函数的角度推导出系统平衡状态的封闭解,并推导出几个感兴趣的性能指标。特别地,我们引入了系统可支持性度量来评估系统对次要用户的支持程度,以及干扰因子来评估次要用户对主要用户的服务退化程度。数值结果显示了系统参数对导出的性能指标的影响。
{"title":"Performance of a cognitive radio network with tolerable service degradation","authors":"Shensheng Tang, B. L. Mark","doi":"10.1109/DRCN.2009.5340006","DOIUrl":"https://doi.org/10.1109/DRCN.2009.5340006","url":null,"abstract":"We analyze the performance of a cognitive radio wireless network, where secondary users opportunistically share the radio spectrum with primary users through spectrum sensing and may cause service degradation to the primary users due to unreliable spectrum sensing. When a secondary user occupying a channel detects the presence of a primary call arriving to the channel, it switches from its current channel to another channel, if one is available, to continue its service; however, if the secondary user fails to detect the presence of the primary call, it remains on the channel and both calls will receive degraded service. Based on a queueing network model, we derive closed-form solutions for the equilibrium system state in terms of generating functions, and derive several performance metrics of interest. In particular, we introduce the system supportability metric to evaluate the extent to which the system can support secondary users and the interference factor to evaluate the degree of service degradation imposed on primary users by the secondary users. Numerical results are presented to show the impact of system parameters on the derived performance metrics.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116154933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Protection for MPLS-TP multicast services MPLS-TP组播业务保护
Pub Date : 2009-11-20 DOI: 10.1109/DRCN.2009.5339994
Jiang Zhang, S. Ruepp, M. Berger, H. Wessing
This paper proposes three innovative point-to-multipoint protection schemes to provide efficient and reliable MPLS Transport Profile multicast services, which is particularly relevant for the fast growing IPTV broadcast service. The three proposed protection schemes are all based on the interconnected rings structure, which is a widely deployed topology of legacy networks and has the natural ability to support resiliency. The first protection scheme extends the protection methods defined in the latest IETF draft standard to the interconnected rings structure. The second protection scheme introduces an adapted OAM function, which has the ability to monitor the multicast service's status, such as configuration failures, software failures and performance degradation, to ensure the reliability of the whole branches and leaves of the multicast service. Furthermore, the interconnecting nodes of the rings make the protection switching decision, which releases the work to upgrade every node on the existing ring and thereby eases the MPLS Transport Profile network deployment. Instead of having one working path in one direction and the other direction being used as protection path, in the third protection scheme, the paths in both directions are used as working paths. When there is a failure, the two working paths protect each other, which increases the efficiency of the network resources. The traffic distribution on the ring is divided by these two separated working paths, which lowers the amount of affected entities when a failure occurs.
本文提出了三种创新的点对多点保护方案,以提供高效可靠的MPLS传输配置文件组播服务,这与快速发展的IPTV广播业务特别相关。提出的三种保护方案都基于互连环结构,这是一种广泛部署的传统网络拓扑结构,具有支持弹性的天然能力。第一个保护方案将最新IETF标准草案中定义的保护方法扩展到互连环结构。第二种保护方案引入了自适应的OAM功能,该功能能够监控组播服务的状态,如配置故障、软件故障和性能下降,以确保组播服务的整个分支和叶子的可靠性。此外,环上的互连节点做出保护交换决策,从而减少了对现有环上每个节点的升级工作,从而简化了MPLS Transport Profile网络的部署。在第三种保护方案中,不再使用一个方向上的一条工作路径,而使用另一个方向上的路径作为保护路径,而是使用两个方向上的路径作为工作路径。当发生故障时,两条工作路径相互保护,提高了网络资源的使用效率。环路上的流量分布由这两条独立的工作路径划分,从而减少了故障发生时受影响实体的数量。
{"title":"Protection for MPLS-TP multicast services","authors":"Jiang Zhang, S. Ruepp, M. Berger, H. Wessing","doi":"10.1109/DRCN.2009.5339994","DOIUrl":"https://doi.org/10.1109/DRCN.2009.5339994","url":null,"abstract":"This paper proposes three innovative point-to-multipoint protection schemes to provide efficient and reliable MPLS Transport Profile multicast services, which is particularly relevant for the fast growing IPTV broadcast service. The three proposed protection schemes are all based on the interconnected rings structure, which is a widely deployed topology of legacy networks and has the natural ability to support resiliency. The first protection scheme extends the protection methods defined in the latest IETF draft standard to the interconnected rings structure. The second protection scheme introduces an adapted OAM function, which has the ability to monitor the multicast service's status, such as configuration failures, software failures and performance degradation, to ensure the reliability of the whole branches and leaves of the multicast service. Furthermore, the interconnecting nodes of the rings make the protection switching decision, which releases the work to upgrade every node on the existing ring and thereby eases the MPLS Transport Profile network deployment. Instead of having one working path in one direction and the other direction being used as protection path, in the third protection scheme, the paths in both directions are used as working paths. When there is a failure, the two working paths protect each other, which increases the efficiency of the network resources. The traffic distribution on the ring is divided by these two separated working paths, which lowers the amount of affected entities when a failure occurs.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116841842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Diverse routing based on shared risk link groups 基于共享风险链接组的不同路由
Pub Date : 2009-11-20 DOI: 10.1109/DRCN.2009.5340011
M. Kiese, V. Marcheva, J. Eberspächer, D. Schupke
This paper investigates the diverse routing problem in the presence of shared risk link groups (SRLGs) and proposes two ILP models for partial SRLG-disjoint protection based on grouping of the individual SRLGs in classes. We demonstrate our approach with SRLGs constructed from seismic maps, hence reducing the likelihood of a single earthquake affecting large portions of the network. Compared with the traditional diverse routing, our two models provide higher survivability with no increase in the overall routing cost, measured in terms of the total number of edges used.
研究了共享风险链路组(SRLGs)存在时的多种路由问题,提出了基于单个SRLGs分类的部分SRLGs不相交保护的两个ILP模型。我们用地震图构建的SRLGs演示了我们的方法,从而减少了一次地震影响大部分网络的可能性。与传统的多样化路由相比,我们的两种模型在不增加总体路由成本的情况下提供了更高的生存性,以使用的总边数来衡量。
{"title":"Diverse routing based on shared risk link groups","authors":"M. Kiese, V. Marcheva, J. Eberspächer, D. Schupke","doi":"10.1109/DRCN.2009.5340011","DOIUrl":"https://doi.org/10.1109/DRCN.2009.5340011","url":null,"abstract":"This paper investigates the diverse routing problem in the presence of shared risk link groups (SRLGs) and proposes two ILP models for partial SRLG-disjoint protection based on grouping of the individual SRLGs in classes. We demonstrate our approach with SRLGs constructed from seismic maps, hence reducing the likelihood of a single earthquake affecting large portions of the network. Compared with the traditional diverse routing, our two models provide higher survivability with no increase in the overall routing cost, measured in terms of the total number of edges used.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129416510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A wavelength sharing and assignment heuristic to minimize the number of wavelength converters in resilient WDM networks 弹性WDM网络中波长转换器数量最小化的波长共享和分配启发式算法
Pub Date : 2009-11-20 DOI: 10.1109/DRCN.2009.5339989
Shreejith Billenahalli, M. Razo, Wanjun Huang, Arularasi Sivasankaran, L. Tang, Hars Vardhan, P. Monti, M. Tacca, A. Fumagalli
With the successful introduction of reconfigurable optical add-drop multiplexers (ROADMs) and related technologies, WDM networks are now growing in the number of optical nodes, wavelengths, and lambda services supported. In addition, shared path protection mechanisms — whereby lambda services are allowed to share protection wavelength channels — are possible at the optical (WDM) layer. Efficient strategies must be devised to both determine the set of services that must share a common protection wavelength channel and assign wavelengths to every service. One objective of these strategies is to minimize the total number of wavelength converters (WCs), which are required every time the wavelength continuity constraint cannot be met. This paper presents a scalable and efficient heuristic, whose goal is to minimize the number of WCs in resilient WDM networks supporting static sets of shared path protection lambda services. The heuristic comprises a set of polynomial algorithms that are executed sequentially to obtain a sub-optimal solution. In small size instances of the problem, the heuristic is compared against the optimal solution obtained from ILP formulation. For large size instances — tens of thousands of lambda services and hundreds of nodes — the heuristic yields an average number of WCs that is close to be linear in the number of services, despite the fact that the wavelength sharing factor increases.
随着可重构光路复用器(roadm)和相关技术的成功引入,WDM网络支持的光节点、波长和lambda服务的数量正在不断增长。此外,共享路径保护机制——允许lambda服务共享保护波长通道——在光学(WDM)层是可能的。必须设计有效的策略来确定必须共享公共保护波长通道的服务集,并为每个服务分配波长。这些策略的一个目标是最小化波长转换器(WCs)的总数,因为每次波长连续性约束不能满足时都需要波长转换器。本文提出了一种可扩展且高效的启发式算法,其目标是在支持静态共享路径保护lambda服务集的弹性WDM网络中最大限度地减少wc的数量。启发式包括一组多项式算法,这些算法依次执行以获得次优解。在问题的小尺寸实例中,将启发式方法与从ILP公式获得的最优解进行比较。对于大型实例——数以万计的lambda服务和数百个节点——尽管波长共享因子增加了,但启发式算法产生的wc的平均数量在服务数量上接近线性。
{"title":"A wavelength sharing and assignment heuristic to minimize the number of wavelength converters in resilient WDM networks","authors":"Shreejith Billenahalli, M. Razo, Wanjun Huang, Arularasi Sivasankaran, L. Tang, Hars Vardhan, P. Monti, M. Tacca, A. Fumagalli","doi":"10.1109/DRCN.2009.5339989","DOIUrl":"https://doi.org/10.1109/DRCN.2009.5339989","url":null,"abstract":"With the successful introduction of reconfigurable optical add-drop multiplexers (ROADMs) and related technologies, WDM networks are now growing in the number of optical nodes, wavelengths, and lambda services supported. In addition, shared path protection mechanisms — whereby lambda services are allowed to share protection wavelength channels — are possible at the optical (WDM) layer. Efficient strategies must be devised to both determine the set of services that must share a common protection wavelength channel and assign wavelengths to every service. One objective of these strategies is to minimize the total number of wavelength converters (WCs), which are required every time the wavelength continuity constraint cannot be met. This paper presents a scalable and efficient heuristic, whose goal is to minimize the number of WCs in resilient WDM networks supporting static sets of shared path protection lambda services. The heuristic comprises a set of polynomial algorithms that are executed sequentially to obtain a sub-optimal solution. In small size instances of the problem, the heuristic is compared against the optimal solution obtained from ILP formulation. For large size instances — tens of thousands of lambda services and hundreds of nodes — the heuristic yields an average number of WCs that is close to be linear in the number of services, despite the fact that the wavelength sharing factor increases.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123999832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survivable design of reconfigurable MPLS VPN networks 可重构MPLS VPN网络的生存性设计
Pub Date : 2009-11-20 DOI: 10.1109/DRCN.2009.5340021
R. Cotter, D. Medhi
MPLS has become an increasingly common technology for guaranteed transport services for carrying customer traffic. We consider the survivable design problem from the perspective of an MPLS VPN network provider where the data rate required is dynamically configurable based on customers' traffic demands. Network optimization formulations for global design and end-to-end fast reroute design are presented. For the global design model, we present two variations: global sequential redesign and selective sequential redesign. Through computational work, we observe that as networks get larger, the relative cost of making that network survivable goes down. Furthermore, as a network of a given number of nodes increases its connectivity, the cost of survivability goes down. Finally, the global sequential redesign and selective sequential redesign methods produce survivable design costs that are comparable, while they are approximately 28% less expensive than the end-to-end fast reroute design approach for survivability.
MPLS已经成为承载客户流量的保证传输服务的一种越来越普遍的技术。我们从MPLS VPN网络提供商的角度考虑可生存设计问题,其中所需的数据速率是根据客户的流量需求动态配置的。给出了全局设计和端到端快速路由设计的网络优化公式。对于全局设计模型,我们提出了两种变体:全局顺序再设计和选择性顺序再设计。通过计算工作,我们观察到,随着网络变得越来越大,使网络生存的相对成本就会下降。此外,当给定节点数量的网络增加其连通性时,生存性的成本就会下降。最后,全局顺序重新设计和选择性顺序重新设计方法产生的可生存设计成本是相当的,而它们比端到端快速改道设计方法的可生存设计成本低约28%。
{"title":"Survivable design of reconfigurable MPLS VPN networks","authors":"R. Cotter, D. Medhi","doi":"10.1109/DRCN.2009.5340021","DOIUrl":"https://doi.org/10.1109/DRCN.2009.5340021","url":null,"abstract":"MPLS has become an increasingly common technology for guaranteed transport services for carrying customer traffic. We consider the survivable design problem from the perspective of an MPLS VPN network provider where the data rate required is dynamically configurable based on customers' traffic demands. Network optimization formulations for global design and end-to-end fast reroute design are presented. For the global design model, we present two variations: global sequential redesign and selective sequential redesign. Through computational work, we observe that as networks get larger, the relative cost of making that network survivable goes down. Furthermore, as a network of a given number of nodes increases its connectivity, the cost of survivability goes down. Finally, the global sequential redesign and selective sequential redesign methods produce survivable design costs that are comparable, while they are approximately 28% less expensive than the end-to-end fast reroute design approach for survivability.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117308502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lightweight scheme for generating stealthy probes 产生隐形探测器的轻量级方案
Pub Date : 2009-11-20 DOI: 10.1109/DRCN.2009.5340003
S. Ganesh, A. Sethi, R. Hardy
Probing based approaches have been effectively used for network monitoring in the past. Probes such as ICMP pings provide an effective tool for detecting compromised nodes which try to delay or drop traffic. But an intelligent attacker may evade detection by giving preferential treatment to probe traffic. This is usually possible because probe packets have a different format from regular application packets and are easily distinguishable. The solution to this problem is to create stealthy probes which are indistinguishable from normal application traffic. In this paper, we build upon our earlier work on the design approaches for stealthy probing, and we propose a lightweight and effective scheme for generating stealthy probes.
过去,基于探测的方法已被有效地用于网络监控。诸如ICMP ping之类的探测提供了一种有效的工具,用于检测试图延迟或丢弃流量的受损节点。但是,智能攻击者可以通过优先处理探测流量来逃避检测。这通常是可能的,因为探测数据包的格式与常规应用程序数据包不同,很容易区分。该问题的解决方案是创建与正常应用程序流量无法区分的隐形探测。在本文中,我们在先前关于隐身探测设计方法的工作的基础上,提出了一种轻量级和有效的方案来生成隐身探测。
{"title":"Lightweight scheme for generating stealthy probes","authors":"S. Ganesh, A. Sethi, R. Hardy","doi":"10.1109/DRCN.2009.5340003","DOIUrl":"https://doi.org/10.1109/DRCN.2009.5340003","url":null,"abstract":"Probing based approaches have been effectively used for network monitoring in the past. Probes such as ICMP pings provide an effective tool for detecting compromised nodes which try to delay or drop traffic. But an intelligent attacker may evade detection by giving preferential treatment to probe traffic. This is usually possible because probe packets have a different format from regular application packets and are easily distinguishable. The solution to this problem is to create stealthy probes which are indistinguishable from normal application traffic. In this paper, we build upon our earlier work on the design approaches for stealthy probing, and we propose a lightweight and effective scheme for generating stealthy probes.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Darkstar: Using exploratory data mining to raise the bar on network reliability and performance Darkstar:使用探索性数据挖掘来提高网络可靠性和性能
Pub Date : 2009-11-20 DOI: 10.1109/DRCN.2009.5340032
C. Kalmanek, Ihui Ge, Seungjoon Lee, C. Lund, Dan Pei, J. Seidel, J. Merwe, Jennifer Ates
Networks have become a critical infrastructure, and performance requirements for network-based applications are becoming increasingly stringent. This trend challenges service providers to raise the bar on the performance and reliability of network services. To achieve this, new network and service management systems are needed that enable providers to continually improve performance, identify issues that are flying under the radar of network operations, and troubleshoot complex issues. This paper presents the Darkstar system, which allows analysts to address these challenges using exploratory data mining and sophisticated correlation tools. We present an overview of key applications that are built on top of the Darkstar system to illustrate the power of the approach.
网络已经成为关键的基础设施,基于网络的应用程序的性能要求也越来越严格。这种趋势对服务提供商提出了挑战,要求他们提高网络服务的性能和可靠性。为了实现这一目标,需要新的网络和服务管理系统,使提供商能够不断提高性能,识别在网络操作雷达下飞行的问题,并排除复杂问题。本文介绍了Darkstar系统,该系统允许分析人员使用探索性数据挖掘和复杂的关联工具来解决这些挑战。我们提出了建立在暗星系统之上的关键应用的概述,以说明该方法的力量。
{"title":"Darkstar: Using exploratory data mining to raise the bar on network reliability and performance","authors":"C. Kalmanek, Ihui Ge, Seungjoon Lee, C. Lund, Dan Pei, J. Seidel, J. Merwe, Jennifer Ates","doi":"10.1109/DRCN.2009.5340032","DOIUrl":"https://doi.org/10.1109/DRCN.2009.5340032","url":null,"abstract":"Networks have become a critical infrastructure, and performance requirements for network-based applications are becoming increasingly stringent. This trend challenges service providers to raise the bar on the performance and reliability of network services. To achieve this, new network and service management systems are needed that enable providers to continually improve performance, identify issues that are flying under the radar of network operations, and troubleshoot complex issues. This paper presents the Darkstar system, which allows analysts to address these challenges using exploratory data mining and sophisticated correlation tools. We present an overview of key applications that are built on top of the Darkstar system to illustrate the power of the approach.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130633099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Model based evaluation of policies for end-node driven fault recovery 基于模型的终端节点驱动故障恢复策略评估
Pub Date : 2009-11-20 DOI: 10.1109/DRCN.2009.5339983
Jesper Grønbæk, H. Schwefel, T. Toftegaard
In evolving ubiquitous networking environments some end-nodes will rely on highly critical end-user services in infrastructure and ad-hoc networks. As future networks will be dominated by mobility and unreliable wireless links, providing such critical end-user services is a challenge. In this work we target the problem of managing faults in such networking systems by fault management driven by the end-node. We introduce a system model to evaluate recovery decision policies based on fault diagnosis capabilities. The model method is applied in a scenario of hand-over between wireless access points. Evaluated policies are (1) no fail-over, (2) fail-over at fault diagnosis and (3) time restricted fail-over. Comparison to detailed simulations show that the developed Markov model is suitable to maximize end-user service reliability - in this case for the example of an SCTP file transfer. The numerical results from the model allow to determine the best strategy and its parameters depending on properties of the fault-diagnosis component.
在不断发展的无处不在的网络环境中,一些终端节点将依赖于基础设施和自组织网络中高度关键的终端用户服务。由于未来的网络将以移动性和不可靠的无线链路为主导,提供如此关键的终端用户服务是一项挑战。在本工作中,我们针对这种网络系统的故障管理问题,提出了由终端节点驱动的故障管理。我们引入了一个基于故障诊断能力的系统模型来评估恢复决策策略。该模型方法应用于无线接入点之间的切换场景。评估的策略是(1)无故障转移,(2)故障诊断故障转移和(3)有时间限制的故障转移。与详细模拟的比较表明,所开发的马尔可夫模型适合于最大化最终用户服务的可靠性——在本例中,用于SCTP文件传输的示例。该模型的数值结果允许根据故障诊断组件的特性确定最佳策略及其参数。
{"title":"Model based evaluation of policies for end-node driven fault recovery","authors":"Jesper Grønbæk, H. Schwefel, T. Toftegaard","doi":"10.1109/DRCN.2009.5339983","DOIUrl":"https://doi.org/10.1109/DRCN.2009.5339983","url":null,"abstract":"In evolving ubiquitous networking environments some end-nodes will rely on highly critical end-user services in infrastructure and ad-hoc networks. As future networks will be dominated by mobility and unreliable wireless links, providing such critical end-user services is a challenge. In this work we target the problem of managing faults in such networking systems by fault management driven by the end-node. We introduce a system model to evaluate recovery decision policies based on fault diagnosis capabilities. The model method is applied in a scenario of hand-over between wireless access points. Evaluated policies are (1) no fail-over, (2) fail-over at fault diagnosis and (3) time restricted fail-over. Comparison to detailed simulations show that the developed Markov model is suitable to maximize end-user service reliability - in this case for the example of an SCTP file transfer. The numerical results from the model allow to determine the best strategy and its parameters depending on properties of the fault-diagnosis component.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121126305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimizing the IP router update process with traffic-driven updates 通过流量驱动更新优化IP路由器更新过程
Pub Date : 2009-11-20 DOI: 10.1109/DRCN.2009.5340018
W. Tavernier, D. Papadimitriou, D. Colle, M. Pickavet, P. Demeester
The update process in an IP router after a failure is detected, is a complex process involving more than just recalculating shortest paths. When statistics related to forwarded traffic are not taken into account, which is generally the case, we show that packet loss can be significantly higher than is strictly needed. In this paper we present a combined control and traffic-driven routing table update scheme which minimizes the packet loss during the switchover, based on an efficient use and planning of the central router process quantum. We discuss the parameters of the algorithm and show its value in a simulation environment.
IP路由器在检测到故障后的更新过程是一个复杂的过程,不仅仅是重新计算最短路径。如果不考虑与转发流量相关的统计数据(通常是这种情况),我们会发现丢包量可能明显高于严格要求的值。本文提出了一种结合控制和流量驱动的路由表更新方案,该方案在有效利用和规划中心路由器进程量的基础上,最大限度地减少了切换过程中的丢包。讨论了该算法的参数,并在仿真环境中给出了其值。
{"title":"Optimizing the IP router update process with traffic-driven updates","authors":"W. Tavernier, D. Papadimitriou, D. Colle, M. Pickavet, P. Demeester","doi":"10.1109/DRCN.2009.5340018","DOIUrl":"https://doi.org/10.1109/DRCN.2009.5340018","url":null,"abstract":"The update process in an IP router after a failure is detected, is a complex process involving more than just recalculating shortest paths. When statistics related to forwarded traffic are not taken into account, which is generally the case, we show that packet loss can be significantly higher than is strictly needed. In this paper we present a combined control and traffic-driven routing table update scheme which minimizes the packet loss during the switchover, based on an efficient use and planning of the central router process quantum. We discuss the parameters of the algorithm and show its value in a simulation environment.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123454723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2009 7th International Workshop on Design of Reliable Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1