首页 > 最新文献

2022 18th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning 仪式:一个量化监督机器学习可信度的平台
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965139
Alberto Huertas Celdrán, Jan Bauer, Melike Demirci, Joel Leupp, M. Franco, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, G. Pérez, B. Stiller
This demo presents RITUAL, a platform composed of a novel algorithm and a Web application quantifying the trustworthiness level of supervised Machine and Deep Learning (ML/DL) models according to their fairness, explainability, robustness, and accountability. The algorithm is deployed on a Web application to allow users to quantify and compare the trustworthiness of their ML/DL models. Finally, a scenario with ML/DL models classifying network cyberattacks demonstrates the platform applicability.
这个演示展示了RITUAL,一个由新算法和Web应用程序组成的平台,根据其公平性、可解释性、鲁棒性和可问责性来量化监督机器和深度学习(ML/DL)模型的可信度水平。该算法部署在Web应用程序上,允许用户量化和比较其ML/DL模型的可信度。最后,使用ML/DL模型对网络攻击进行分类的场景验证了该平台的适用性。
{"title":"RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning","authors":"Alberto Huertas Celdrán, Jan Bauer, Melike Demirci, Joel Leupp, M. Franco, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, G. Pérez, B. Stiller","doi":"10.23919/CNSM55787.2022.9965139","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965139","url":null,"abstract":"This demo presents RITUAL, a platform composed of a novel algorithm and a Web application quantifying the trustworthiness level of supervised Machine and Deep Learning (ML/DL) models according to their fairness, explainability, robustness, and accountability. The algorithm is deployed on a Web application to allow users to quantify and compare the trustworthiness of their ML/DL models. Finally, a scenario with ML/DL models classifying network cyberattacks demonstrates the platform applicability.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"17 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decentralized Intent-driven Coordination of Multi-Domain IP-Optical Networks 多域ip光网络的分散意图驱动协调
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964606
Filippos Christou
Intent-based networking is increasingly used to improve network control and management. Network operators have already begun to adopt this paradigm, which leads to a simplified and automatized network operation. The operators can interact with their intent-driven networks through the Northbound Interface (NBI). Given a standardized NBI, the same approach can scale to coordinate intent provisioning across multi-domain networks in a decentralized fashion. This can outdate traditional decentralized protocols and open new opportunities for flexible and scalable communication mechanisms. This paper proposes a minimal and general high-level architecture, relying on a standard IBN (Intent-Based Networking) architecture, for multi-domain intent deployment in IP-optical networks. Our architecture is consistent between diverse network operators that use the same NBI, respects confidential information, promotes accountability, and can scale for various network services. To achieve this, we introduce a hierarchical system-generated intent schema with automatic intent delegation between the different domains.
基于意图的组网越来越多地用于改善网络控制和管理。网络运营商已经开始采用这种模式,从而实现网络运营的简化和自动化。运营商可以通过北向接口(NBI)与他们的意图驱动网络进行交互。给定标准化的NBI,相同的方法可以扩展到以分散的方式跨多域网络协调意图供应。这可能会使传统的去中心化协议过时,并为灵活和可扩展的通信机制提供新的机会。本文提出了一种基于标准IBN(基于意图的网络)架构的最小化通用高层架构,用于ip光网络中的多域意图部署。我们的架构在使用相同NBI的不同网络运营商之间是一致的,尊重机密信息,促进问责制,并且可以扩展到各种网络服务。为了实现这一点,我们引入了一个分层系统生成的意图模式,在不同的域之间自动进行意图委托。
{"title":"Decentralized Intent-driven Coordination of Multi-Domain IP-Optical Networks","authors":"Filippos Christou","doi":"10.23919/CNSM55787.2022.9964606","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964606","url":null,"abstract":"Intent-based networking is increasingly used to improve network control and management. Network operators have already begun to adopt this paradigm, which leads to a simplified and automatized network operation. The operators can interact with their intent-driven networks through the Northbound Interface (NBI). Given a standardized NBI, the same approach can scale to coordinate intent provisioning across multi-domain networks in a decentralized fashion. This can outdate traditional decentralized protocols and open new opportunities for flexible and scalable communication mechanisms. This paper proposes a minimal and general high-level architecture, relying on a standard IBN (Intent-Based Networking) architecture, for multi-domain intent deployment in IP-optical networks. Our architecture is consistent between diverse network operators that use the same NBI, respects confidential information, promotes accountability, and can scale for various network services. To achieve this, we introduce a hierarchical system-generated intent schema with automatic intent delegation between the different domains.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129296215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Effect of the Russian-Ukrainian Conflict from the Perspective of Internet eXchanges 从互联网交换看俄乌冲突的影响
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964765
Cristian Trusin, L. Bertholdo, J. J. Santanna
In 2022 the Russian invasion of Ukraine began. It is known that Ukraine faced outages because of the damage to their infrastructure. It is also known that Russia was boycotted by the international community. However the impact on the telecommunications of the two countries remains unknown. In this paper we quantified the degree to which the Internet was affected in both countries by analyzing routing tables from five large Internet Exchange Points (IXPs). IXPs provide a central point of interconnection where internet traffic can be freely exchanged between Autonomous Systems (ASes). This centrality makes IXPs a good vantage point for analyzing changes in the Internet infrastructure. With data collected before and after the start of the conflict we observed considerable damage to the Ukrainian Internet network with numerous outages and minimal damage to the Russian network. An average of 11.12% of Ukrainian ASes were unreachable at each IXP. We identified the biggest outages and the events responsible for them. This paper highlights resilience issues during conflicts to the network and management community, and serves as a basis for future more in-depth research.
2022年,俄罗斯开始入侵乌克兰。据悉,乌克兰因基础设施受损而面临停电。据悉,俄罗斯也遭到了国际社会的抵制。然而,对两国电信的影响尚不清楚。在本文中,我们通过分析来自五个大型互联网交换点(ixp)的路由表,量化了互联网在这两个国家受到影响的程度。ixp提供了一个互连中心点,互联网流量可以在自治系统(ase)之间自由交换。这种中心性使ixp成为分析Internet基础设施中的变化的一个很好的有利位置。根据冲突开始前后收集的数据,我们观察到乌克兰互联网受到了相当大的破坏,多次中断,而俄罗斯网络受到的损害很小。在每个IXP上,平均有11.12%的乌克兰ase无法到达。我们确定了最大的中断和导致它们的事件。本文向网络和管理层强调了冲突中的弹性问题,为未来更深入的研究奠定了基础。
{"title":"The Effect of the Russian-Ukrainian Conflict from the Perspective of Internet eXchanges","authors":"Cristian Trusin, L. Bertholdo, J. J. Santanna","doi":"10.23919/CNSM55787.2022.9964765","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964765","url":null,"abstract":"In 2022 the Russian invasion of Ukraine began. It is known that Ukraine faced outages because of the damage to their infrastructure. It is also known that Russia was boycotted by the international community. However the impact on the telecommunications of the two countries remains unknown. In this paper we quantified the degree to which the Internet was affected in both countries by analyzing routing tables from five large Internet Exchange Points (IXPs). IXPs provide a central point of interconnection where internet traffic can be freely exchanged between Autonomous Systems (ASes). This centrality makes IXPs a good vantage point for analyzing changes in the Internet infrastructure. With data collected before and after the start of the conflict we observed considerable damage to the Ukrainian Internet network with numerous outages and minimal damage to the Russian network. An average of 11.12% of Ukrainian ASes were unreachable at each IXP. We identified the biggest outages and the events responsible for them. This paper highlights resilience issues during conflicts to the network and management community, and serves as a basis for future more in-depth research.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129161925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Time-sensitive Multi-Flow Routing in Highly Utilized MANETs 高利用率manet中的时间敏感多流路由
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964689
Klement Hagenhoff, Eike Viehmann, G. Rodosek
MANETs comprise several mobile nodes, wirelessly connected with each other. These networks are self-organized, each participant is responsible for routing and data forwarding. Routing protocols only provide local or outdated topology knowledge because participants are moving continuously. Also, transmission capacities are limited which often results in over-utilized network segments. Capacity conform path distribution is challenging since nodes route based on their incomplete topology knowledge. Recent work showed that an up-to-date and complete network topology representation can quickly be delivered to a controller, which is instantiated on an arbitrary node. Now, routing and path deployment can be outsourced to the controller. With this knowledge, we introduce several path finding approaches to answer the question if and to which extent non over-utilizing routes for several flows can be found where common MANET routing techniques would fail. Also, paths have to be computed quickly since topologies change due to the mobility of nodes. Our path finding techniques also focus on routes aiming for long connection lifetime. We compare our approaches regarding capacity usage, computation times, and connection lifetimes, taking into consideration typical MANET behavior.
manet由几个相互无线连接的移动节点组成。这些网络是自组织的,每个参与者负责路由和数据转发。路由协议只提供本地或过时的拓扑知识,因为参与者是不断移动的。此外,传输能力有限,这往往导致过度利用的网段。容量一致性路径分布具有挑战性,因为节点的路由是基于它们不完全的拓扑知识。最近的研究表明,最新和完整的网络拓扑表示可以快速地传递给控制器,控制器在任意节点上实例化。现在,路由和路径部署可以外包给控制器。有了这些知识,我们介绍了几种寻路方法来回答这个问题,如果以及在多大程度上可以找到几个流的非过度利用路由,而普通的MANET路由技术会失败。此外,由于节点的移动性,拓扑结构会发生变化,因此必须快速计算路径。我们的寻径技术也专注于长连接寿命的路由。考虑到典型的MANET行为,我们比较了关于容量使用、计算时间和连接寿命的方法。
{"title":"Time-sensitive Multi-Flow Routing in Highly Utilized MANETs","authors":"Klement Hagenhoff, Eike Viehmann, G. Rodosek","doi":"10.23919/CNSM55787.2022.9964689","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964689","url":null,"abstract":"MANETs comprise several mobile nodes, wirelessly connected with each other. These networks are self-organized, each participant is responsible for routing and data forwarding. Routing protocols only provide local or outdated topology knowledge because participants are moving continuously. Also, transmission capacities are limited which often results in over-utilized network segments. Capacity conform path distribution is challenging since nodes route based on their incomplete topology knowledge. Recent work showed that an up-to-date and complete network topology representation can quickly be delivered to a controller, which is instantiated on an arbitrary node. Now, routing and path deployment can be outsourced to the controller. With this knowledge, we introduce several path finding approaches to answer the question if and to which extent non over-utilizing routes for several flows can be found where common MANET routing techniques would fail. Also, paths have to be computed quickly since topologies change due to the mobility of nodes. Our path finding techniques also focus on routes aiming for long connection lifetime. We compare our approaches regarding capacity usage, computation times, and connection lifetimes, taking into consideration typical MANET behavior.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124194047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers IPv6 DNS解析器ECS的行为和隐私分析
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965032
Leyao Nie, Lin He, Guanglei Song, Hao Gao, Chenglong Li, Zhiliang Wang, Jiahai Yang
The Domain Name System (DNS) is critical to Internet communications. EDNS Client Subnet (ECS), a DNS extension, allows recursive resolvers to include client subnet information in DNS queries to improve CDN end-user mapping, extending the visibility of client information to a broader range. Major content delivery network (CDN) vendors, content providers (CP), and public DNS service providers (PDNS) are accelerating their IPv6 infrastructure development. With the increasing deployment of IPv6-enabled services and DNS being the most foundational system of the Internet, it becomes important to analyze the behavioral and privacy status of IPv6 resolvers. However, there is a lack of research on ECS for IPv6 DNS resolvers.In this paper, we study the ECS deployment and compliance status of IPv6 resolvers. Our measurement shows that 11.12% IPv6 open resolvers implement ECS. We discuss abnormal noncompliant scenarios that exist in both IPv6 and IPv4 that raise privacy and performance issues. Additionally, we measured if the sacrifice of clients’ privacy can enhance IPv6 CDN performance. We find that in some cases ECS helps end-user mapping but with an unnecessary privacy loss. And even worse, the exposure of client address information can sometimes backfire, which deserves attention from both Internet users and PDNSes.
域名系统(DNS)对互联网通信至关重要。EDNS客户端子网(ECS)是一种DNS扩展,允许递归解析器在DNS查询中包含客户端子网信息,以改善CDN最终用户映射,将客户端信息的可见性扩展到更大的范围。主要的内容分发网络(CDN)、内容提供商(CP)和公共DNS服务提供商(PDNS)正在加快IPv6基础设施的开发。随着支持IPv6的业务越来越多的部署,以及DNS作为互联网最基础的系统,分析IPv6解析器的行为和隐私状态变得非常重要。然而,对于IPv6 DNS解析器的ECS,目前还缺乏相关研究。本文研究了IPv6解析器的ECS部署和遵从性状况。我们的测量表明,11.12%的IPv6开放解析器实现了ECS。我们讨论了IPv6和IPv4中存在的异常不兼容场景,这些场景会引起隐私和性能问题。此外,我们还测量了牺牲客户端的隐私是否可以提高IPv6 CDN的性能。我们发现,在某些情况下,ECS可以帮助最终用户映射,但会带来不必要的隐私损失。更糟糕的是,客户端地址信息的暴露有时会适得其反,这需要引起互联网用户和pdnse的注意。
{"title":"Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers","authors":"Leyao Nie, Lin He, Guanglei Song, Hao Gao, Chenglong Li, Zhiliang Wang, Jiahai Yang","doi":"10.23919/CNSM55787.2022.9965032","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965032","url":null,"abstract":"The Domain Name System (DNS) is critical to Internet communications. EDNS Client Subnet (ECS), a DNS extension, allows recursive resolvers to include client subnet information in DNS queries to improve CDN end-user mapping, extending the visibility of client information to a broader range. Major content delivery network (CDN) vendors, content providers (CP), and public DNS service providers (PDNS) are accelerating their IPv6 infrastructure development. With the increasing deployment of IPv6-enabled services and DNS being the most foundational system of the Internet, it becomes important to analyze the behavioral and privacy status of IPv6 resolvers. However, there is a lack of research on ECS for IPv6 DNS resolvers.In this paper, we study the ECS deployment and compliance status of IPv6 resolvers. Our measurement shows that 11.12% IPv6 open resolvers implement ECS. We discuss abnormal noncompliant scenarios that exist in both IPv6 and IPv4 that raise privacy and performance issues. Additionally, we measured if the sacrifice of clients’ privacy can enhance IPv6 CDN performance. We find that in some cases ECS helps end-user mapping but with an unnecessary privacy loss. And even worse, the exposure of client address information can sometimes backfire, which deserves attention from both Internet users and PDNSes.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Geometric Approach to Real-time Quality of Experience Prediction in Volatile Edge Networks 易变边缘网络中实时经验质量预测的几何方法
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964775
Tom Goethals, B. Volckaert, F. Turck
In recent years, the continuing growth of the network edge, along with increasing user demands, has led to the need for increasingly complex and responsive management strategies for edge services. Many of these strategies are cloud-based, offering near-perfect solutions at the cost of requiring massive computational power, or edge-based, offering reactive strategies to changing edge conditions. This paper presents a decentralized, pro-active Quality of Experience (QoE) based architecture designed to run on edge nodes, which allows nodes to predict optimal service providers (fog nodes) in advance and request their services. The concepts behind the components of the architecture are explained, as well as geometry-inspired design decisions to limit model size. Evaluations on an NVIDIA Jetson Nano show that the architecture can predict optimal service providers for an edge node in real-time for 5 to 20 QoS (Quality of Service) and QoE parameters, with at least 50 potential fog nodes, and that overall QoE resulting from its use is improved by 1% to 18% over previous work such as SoSwirly, depending on the scenario.
近年来,网络边缘的持续增长以及用户需求的不断增加,导致对边缘服务的管理策略的需求日益复杂和响应迅速。这些策略中的许多都是基于云的,以需要大量计算能力为代价提供近乎完美的解决方案,或者基于边缘的,为不断变化的边缘条件提供响应策略。本文提出了一种分散的、主动的基于体验质量(QoE)的架构,设计用于运行在边缘节点上,该架构允许节点提前预测最佳服务提供商(雾节点)并请求其服务。解释了架构组件背后的概念,以及限制模型大小的几何启发设计决策。对NVIDIA Jetson Nano的评估表明,该架构可以实时预测边缘节点的5到20个QoS(服务质量)和QoE参数的最佳服务提供商,至少有50个潜在的雾节点,并且使用该架构产生的总体QoE比以前的工作(如SoSwirly)提高了1%到18%,具体取决于场景。
{"title":"A Geometric Approach to Real-time Quality of Experience Prediction in Volatile Edge Networks","authors":"Tom Goethals, B. Volckaert, F. Turck","doi":"10.23919/CNSM55787.2022.9964775","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964775","url":null,"abstract":"In recent years, the continuing growth of the network edge, along with increasing user demands, has led to the need for increasingly complex and responsive management strategies for edge services. Many of these strategies are cloud-based, offering near-perfect solutions at the cost of requiring massive computational power, or edge-based, offering reactive strategies to changing edge conditions. This paper presents a decentralized, pro-active Quality of Experience (QoE) based architecture designed to run on edge nodes, which allows nodes to predict optimal service providers (fog nodes) in advance and request their services. The concepts behind the components of the architecture are explained, as well as geometry-inspired design decisions to limit model size. Evaluations on an NVIDIA Jetson Nano show that the architecture can predict optimal service providers for an edge node in real-time for 5 to 20 QoS (Quality of Service) and QoE parameters, with at least 50 potential fog nodes, and that overall QoE resulting from its use is improved by 1% to 18% over previous work such as SoSwirly, depending on the scenario.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125149124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Network Delay Prediction Model with Mixed Multi-layer Perceptron Architecture for Edge Computing 一种基于混合多层感知器结构的边缘计算网络延迟预测模型
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964552
Honglin Fang, Peng Yu, Ying Wang, Wenjing Li, F. Zhou, Run Ma
Network delay is a crucial indicator for realizing delay-sensitive task offloading, network management, and optimization in B5G/6G edge computing networks. However, the delay prediction for edge networks becomes complicated due to diverse access strategies and heterogeneous services’ storage, computing, and communication resource requirements. Current GNN-based delay prediction models such as RouteNet and PLNet lack the ability to express the complex associations between links and paths, so the predicted delay is not accurate. In this paper, we propose a novel end-to-end delay prediction model named MixerNet for edge computing, which is based on the mixed multi-layer perceptron (MLP). In this model, a mixed MLP architecture is applied to represent the association between links in the network topology and various paths. Observing that each link may have different effects on various paths, a weight matrix is then defined and multiplied by the path matrix to express it. Thus, a complete mapping frame from network characteristics (e.g., traffic intensity and routing schemes) to delay indicator is constructed. Finally, we perform extensive experiments on NSFNET and GEANT2 datasets and regard RouteNet as the baseline model. Experimental results show that MixerNet can accurately predict end-to-end delay results on various network topologies and the mean absolute error is merely about 0.36%. MixerNet also outperforms the baseline model in most evaluation indicators, especially the mean square error has a 3-fold decrease in NSFNET.
在B5G/6G边缘计算网络中,网络时延是实现时延敏感任务卸载、网络管理和优化的重要指标。然而,由于接入策略的多样化以及异构业务对存储、计算和通信资源的需求,使得边缘网络的时延预测变得复杂。目前基于gnn的时延预测模型如RouteNet和PLNet缺乏表达链路和路径之间复杂关联的能力,因此预测的时延不准确。本文提出了一种基于混合多层感知器(MLP)的边缘计算端到端延迟预测模型MixerNet。在该模型中,采用混合MLP体系结构来表示网络拓扑中的链路与各种路径之间的关联。观察到每个环节可能对不同的路径有不同的影响,然后定义一个权重矩阵,并乘以路径矩阵来表示它。从而构建了从网络特征(如流量强度、路由方案)到时延指标的完整映射框架。最后,我们在NSFNET和GEANT2数据集上进行了大量的实验,并将RouteNet作为基线模型。实验结果表明,MixerNet可以准确预测各种网络拓扑下的端到端延迟结果,平均绝对误差仅为0.36%左右。MixerNet在大多数评价指标上也优于基线模型,尤其是NSFNET的均方误差降低了3倍。
{"title":"A Novel Network Delay Prediction Model with Mixed Multi-layer Perceptron Architecture for Edge Computing","authors":"Honglin Fang, Peng Yu, Ying Wang, Wenjing Li, F. Zhou, Run Ma","doi":"10.23919/CNSM55787.2022.9964552","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964552","url":null,"abstract":"Network delay is a crucial indicator for realizing delay-sensitive task offloading, network management, and optimization in B5G/6G edge computing networks. However, the delay prediction for edge networks becomes complicated due to diverse access strategies and heterogeneous services’ storage, computing, and communication resource requirements. Current GNN-based delay prediction models such as RouteNet and PLNet lack the ability to express the complex associations between links and paths, so the predicted delay is not accurate. In this paper, we propose a novel end-to-end delay prediction model named MixerNet for edge computing, which is based on the mixed multi-layer perceptron (MLP). In this model, a mixed MLP architecture is applied to represent the association between links in the network topology and various paths. Observing that each link may have different effects on various paths, a weight matrix is then defined and multiplied by the path matrix to express it. Thus, a complete mapping frame from network characteristics (e.g., traffic intensity and routing schemes) to delay indicator is constructed. Finally, we perform extensive experiments on NSFNET and GEANT2 datasets and regard RouteNet as the baseline model. Experimental results show that MixerNet can accurately predict end-to-end delay results on various network topologies and the mean absolute error is merely about 0.36%. MixerNet also outperforms the baseline model in most evaluation indicators, especially the mean square error has a 3-fold decrease in NSFNET.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127617007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessing e-Government DNS Resilience 评估电子政府DNS弹性
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965155
Raffaele Sommese, M. Jonker, J. V. D. Ham, G. Moura
Electronic government (e-gov) enables citizens and residents to digitally interact with their government via the Internet. Underpinning these services is the Internet Domain Name Systems (DNS), which maps e-gov domain names to Internet addresses. Structuring DNS with multiple levels of redundancy that can withstand stress events such as denial-of-service (DoS) attacks is a challenging task. While the operator community has established best practices to this end, adopting them all involves expert knowledge and resources. In this work, we obtain and study a list of e-gov domain names used by four countries (The Netherlands, Sweden, Switzerland, and the United States) and measure the DNS structuring of these domains. We show the adoption of best practices, inter-country differences such as the use of anycast, and provide recommendations to improve DNS service robustness.
电子政府(e-gov)使公民和居民能够通过互联网与政府进行数字化互动。这些服务的基础是互联网域名系统(DNS),它将e-gov域名映射到互联网地址。构建具有多级冗余的DNS以抵御诸如拒绝服务(DoS)攻击等压力事件是一项具有挑战性的任务。虽然作业者已经为此建立了最佳实践,但采用它们都需要专业知识和资源。在这项工作中,我们获得并研究了四个国家(荷兰、瑞典、瑞士和美国)使用的e-gov域名列表,并测量了这些域名的DNS结构。我们展示了最佳实践的采用,国家间的差异,如使用任播,并提供建议,以提高DNS服务的稳健性。
{"title":"Assessing e-Government DNS Resilience","authors":"Raffaele Sommese, M. Jonker, J. V. D. Ham, G. Moura","doi":"10.23919/CNSM55787.2022.9965155","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965155","url":null,"abstract":"Electronic government (e-gov) enables citizens and residents to digitally interact with their government via the Internet. Underpinning these services is the Internet Domain Name Systems (DNS), which maps e-gov domain names to Internet addresses. Structuring DNS with multiple levels of redundancy that can withstand stress events such as denial-of-service (DoS) attacks is a challenging task. While the operator community has established best practices to this end, adopting them all involves expert knowledge and resources. In this work, we obtain and study a list of e-gov domain names used by four countries (The Netherlands, Sweden, Switzerland, and the United States) and measure the DNS structuring of these domains. We show the adoption of best practices, inter-country differences such as the use of anycast, and provide recommendations to improve DNS service robustness.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wake-up Receiver based routing protocol for indoor Wireless Sensor Networks 基于唤醒接收器的室内无线传感器网络路由协议
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964540
M. Weber, Ghofrane Fersi, F. Derbel
Wake-up Receiver (WuRx) is one of the most trivial and effective solutions for energy-constrained networks and a promising solution for monitoring various phenomena in the sense of the Internet of Things (IoT). The most important and challenging issue in WuRx-based networks is the time efficient routing process in an energy efficient manner. Effectively, awaking each node needed in the routing process recursively requires a lot of time which is not suitable for time-critical applications. In this paper, we propose a novel Wake-up Receiver based routing protocol called Time Efficient WuRx-based Routing (TEW) that ensures energy optimised and time efficient routing in indoor scenarios. In our proposed approach, the network is divided into clusters at which each Fog Node manages the routes for data transmission in an asymmetric manner. When the Sink requires data from a specific set of nodes of a particular cluster, the Sink transmits a DataPts request to the corresponding Fog Node. In addition, the Fog Node sends instructions by means of a single Request (REQ) packet informing the corresponding nodes how often they should act as relays before switching to the sleeping mode. The measurement results show that our proposed approach has higher energy efficiency and achieves significant performance improvements in data delivery delay.
唤醒接收器(WuRx)是能量受限网络中最简单、最有效的解决方案之一,也是物联网(IoT)意义上监测各种现象的有前途的解决方案。在基于wurx的网络中,最重要也是最具挑战性的问题是如何以高效节能的方式实现高效的路由过程。有效地,递归唤醒路由过程中所需的每个节点需要大量的时间,这并不适合时间要求严格的应用程序。在本文中,我们提出了一种新的基于唤醒接收器的路由协议,称为基于时间效率的wurx路由(TEW),该协议确保在室内场景中进行能量优化和时间效率的路由。在我们提出的方法中,网络被分成簇,其中每个雾节点以不对称的方式管理数据传输的路由。当Sink需要来自特定集群的一组特定节点的数据时,Sink向相应的Fog Node发送DataPts请求。此外,Fog节点通过单个请求(REQ)数据包发送指令,通知相应节点在切换到休眠模式之前应该多久充当中继。测试结果表明,我们的方法具有更高的能源效率,并且在数据传输延迟方面取得了显着的性能改进。
{"title":"Wake-up Receiver based routing protocol for indoor Wireless Sensor Networks","authors":"M. Weber, Ghofrane Fersi, F. Derbel","doi":"10.23919/CNSM55787.2022.9964540","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964540","url":null,"abstract":"Wake-up Receiver (WuRx) is one of the most trivial and effective solutions for energy-constrained networks and a promising solution for monitoring various phenomena in the sense of the Internet of Things (IoT). The most important and challenging issue in WuRx-based networks is the time efficient routing process in an energy efficient manner. Effectively, awaking each node needed in the routing process recursively requires a lot of time which is not suitable for time-critical applications. In this paper, we propose a novel Wake-up Receiver based routing protocol called Time Efficient WuRx-based Routing (TEW) that ensures energy optimised and time efficient routing in indoor scenarios. In our proposed approach, the network is divided into clusters at which each Fog Node manages the routes for data transmission in an asymmetric manner. When the Sink requires data from a specific set of nodes of a particular cluster, the Sink transmits a DataPts request to the corresponding Fog Node. In addition, the Fog Node sends instructions by means of a single Request (REQ) packet informing the corresponding nodes how often they should act as relays before switching to the sleeping mode. The measurement results show that our proposed approach has higher energy efficiency and achieves significant performance improvements in data delivery delay.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134228067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-access Edge Computing as a Service 多访问边缘计算即服务
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964650
Pedro Escaleira, Miguel Mota, D. Gomes, J. Barraca, Rui L. Aguiar
Standardization organizations, such as the European Telecommunications Standards Institute (ETSI), have been gathering efforts to specify the Edge Computing paradigm. However, there is still a lack of complete, interface-wise, actual implementations and evaluations of a fully functional Edge Computing architecture. On these grounds, the work presented in this paper proposes a new Multi-access Edge Computing (MEC)-Network Functions Virtualization (NFV) architecture for a challenging Business to Business to Consumer (B2B2C) model, based on the references provided by ETSI, and provides a prototype implementation to demonstrate its viability. The tests conducted show that the proposed framework can be efficiently deployed, allowing Telecommunications Operators to rapidly instantiate and provide an elastic Edge Infrastructure to their customers.
标准化组织,如欧洲电信标准协会(ETSI),一直在努力指定边缘计算范式。然而,仍然缺乏完整的、接口明智的、实际的实现和对全功能边缘计算架构的评估。基于这些理由,本文提出了一种新的多访问边缘计算(MEC)-网络功能虚拟化(NFV)架构,该架构基于ETSI提供的参考,用于具有挑战性的企业对企业对消费者(B2B2C)模型,并提供了一个原型实现来证明其可行性。测试表明,所提出的框架可以有效地部署,允许电信运营商快速实例化并为其客户提供弹性边缘基础设施。
{"title":"Multi-access Edge Computing as a Service","authors":"Pedro Escaleira, Miguel Mota, D. Gomes, J. Barraca, Rui L. Aguiar","doi":"10.23919/CNSM55787.2022.9964650","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964650","url":null,"abstract":"Standardization organizations, such as the European Telecommunications Standards Institute (ETSI), have been gathering efforts to specify the Edge Computing paradigm. However, there is still a lack of complete, interface-wise, actual implementations and evaluations of a fully functional Edge Computing architecture. On these grounds, the work presented in this paper proposes a new Multi-access Edge Computing (MEC)-Network Functions Virtualization (NFV) architecture for a challenging Business to Business to Consumer (B2B2C) model, based on the references provided by ETSI, and provides a prototype implementation to demonstrate its viability. The tests conducted show that the proposed framework can be efficiently deployed, allowing Telecommunications Operators to rapidly instantiate and provide an elastic Edge Infrastructure to their customers.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130143580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 18th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1